id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-9vgj-3874-c5g7 | SLiM Simple Login Manager 1.3.0 places the X authority magic cookie (mcookie) on the command line when invoking xauth from (1) app.cpp and (2) switchuser.cpp, which allows local users to access the X session by listing the process and its arguments. | [] |
|
GHSA-xfmc-8c9w-j8xv | SQL injection vulnerability in the simple Glossar (simple_glossar) extension 1.0.3 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [] |
|
CVE-2018-6228 | A SQL injection vulnerability in a Trend Micro Email Encryption Gateway 5.5 policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system. | [
"cpe:2.3:a:trendmicro:email_encryption_gateway:5.5:*:*:*:*:*:*:*"
] |
|
CVE-2022-28788 | Improper buffer size check logic in aviextractor library prior to SMR May-2022 Release 1 allows out of bounds read leading to possible temporary denial of service. The patch adds buffer size check logic. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] |
|
GHSA-236h-r3w7-c85c | Cross-site Scripting in Apache Atlas | Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Stored Cross-Site Scripting in the edit-tag functionality. | [] |
GHSA-4vqx-vxhx-jpph | The Windows kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability when it improperly handles objects in memory, aka "Win32k Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8678, CVE-2017-8680, CVE-2017-8677, and CVE-2017-8681. | [] |
|
CVE-2023-26460 | Improper Access Control in SAP NetWeaver AS Java (Cache Management Service) | Cache Management Service in SAP NetWeaver Application Server for Java - version 7.50, does not perform any authentication checks for functionalities that require user identity
| [
"cpe:2.3:a:sap:netweaver_application_server_for_java:7.50:*:*:*:*:*:*:*"
] |
GHSA-jx33-373q-67x5 | A vulnerability was found in D-Link DIR-605L 2.13B01. It has been classified as critical. This affects the function formSetWAN_Wizard534. The manipulation of the argument curTime leads to buffer overflow. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer. | [] |
|
GHSA-97gr-2f7v-5fhf | Multiple vulnerabilities exist in the AOS-CX command line interface that could lead to authenticated command injection. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete switch compromise in ArubaOS-CX version(s): AOS-CX 10.09.xxxx: 10.09.1030 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.06.xxxx: 10.06.0180 and below. Aruba has released upgrades for ArubaOS-CX Switch Devices that address these security vulnerabilities. | [] |
|
GHSA-f3c2-96cw-j95g | Zenphoto 1.4.14 has multiple cross-site scripting (XSS) vulnerabilities via different URL parameters. | [] |
|
GHSA-c9p4-xwr9-rfhx | Zot IdP group membership revocation ignored | SummaryThe group data stored for users in the boltdb database (meta.db) is an append-list so group revocations/removals are ignored in the API.Details[SetUserGroups](https://github.com/project-zot/zot/blob/5e30fec65c49e3139907e2819ccb39b2e3bd784e/pkg/meta/boltdb/boltdb.go#L1665) is alled on login, but instead of replacing the group memberships, they are appended. This may be due to some conflict with the group definitions in the config file, but that wasn't obvious to me if it were the case.PoCLogin with group claims, logout, remove the user from a group from at IdP and log in again, the API still grants access and the new list of groups is appended creating meaningless duplicate entries and no longer mathing the expected groups from the IdP. The behavior can be verified by seeing the API or UI still presenting images it should not or by viewing the data directly: `bbolt get meta.db UserData <user>`, eg:Note this example also has duplicates due to group hierarchy changes that were left in the database.ImpactAny Zot configuration that relies on group-based authorization will not respect group remove/revocation by an IdP. | [] |
CVE-2023-52107 | Vulnerability of permissions being not strictly verified in the WMS module. Successful exploitation of this vulnerability may affect service confidentiality. | [
"cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-6fx6-p6wj-5g53 | registration.PHP in ATutor 1.5.1 pl2 allows remote attackers to execute arbitrary SQL commands via an e-mail address that ends in a NULL character, which bypasses the PHP regular expression check. NOTE: it is possible that this is actually a bug in PHP code, in which case this should not be treated as a vulnerability in ATutor. | [] |
|
GHSA-qvmq-4rhq-mfvp | Missing Authorization vulnerability in WP Event Manager WP Event Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Event Manager: from n/a through 3.1.47. | [] |
|
CVE-2013-4139 | The Stage File Proxy module 7.x-1.x before 7.x-1.4 for Drupal allows remote attackers to cause a denial of service (file operations performance degradation and failure) via a large number of requests. | [
"cpe:2.3:a:stage_file_proxy_project:stage_file_proxy:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:stage_file_proxy_project:stage_file_proxy:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:stage_file_proxy_project:stage_file_proxy:7.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:stage_file_proxy_project:stage_file_proxy:7.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:stage_file_proxy_project:stage_file_proxy:7.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-8043 | Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-7263 | Cross-site scripting (XSS) vulnerability in ULTRAPOP.JP i-HTTPD allows remote attackers to inject arbitrary web script or HTML via a crafted HTTP header, a different vulnerability than CVE-2014-7261. | [
"cpe:2.3:a:ultrapop:i-httpd:-:*:*:*:*:*:*:*"
] |
|
GHSA-g4rj-4g63-8r2h | Windows 2012R2 stemcells, versions prior to 1200.17, contain an information exposure vulnerability on vSphere. A remote user with the ability to push apps can execute crafted commands to read the IaaS metadata from the VM, which may contain BOSH credentials. | [] |
|
GHSA-g7hw-jh4p-75wr | TYPO3 Cross-Site Scripting in Filelist Module | It has been discovered that the output table listing in the “Files” backend module is vulnerable to cross-site scripting when a file extension contains malicious sequences.Access to the file system of the server - either directly or through synchronization - is required to exploit the vulnerability. | [] |
CVE-2023-35062 | Improper access control in some Intel(R) DSA software before version 23.4.33 may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:dsa_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:driver_\\&_support_assistant:*:*:*:*:*:*:*:*"
] |
|
GHSA-r9jp-3v2v-qr5m | The WPKoi Templates for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Advanced Heading widget in all versions up to, and including, 2.5.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-f8mj-2m92-pmqv | Drupal 5.x before 5.3 does not apply its Drupal Forms API protection against the user deletion form, which allows remote attackers to delete users via a cross-site request forgery (CSRF) attack. | [] |
|
CVE-2009-4720 | SQL injection vulnerability in cgi-bin/gnudip.cgi in GnuDIP 2.1.1 allows remote attackers to execute arbitrary SQL commands via the username parameter. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:gnudip:gnudip:2.1.1:*:*:*:*:*:*:*"
] |
|
CVE-2006-0729 | SQL injection vulnerability in functions.php in Teca Diary PE 1.0 allows remote attackers to execute arbitrary SQL commands via the (1) yy, (2) mm, and (3) dd parameters. | [
"cpe:2.3:a:teca_scripts:teca_diary:personal_1.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-46001 | Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data. | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gpac:gpac:2.3-dev-rev573-g201320819-master:*:*:*:*:*:*:*"
] |
|
GHSA-r47f-52cf-34c7 | The Zoom Client for Meetings Installer for macOS (Standard and for IT Admin) before version 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to root. | [] |
|
GHSA-ffxg-xm4w-3wg9 | Command Injection in corenlp-js-interface | All versions of package corenlp-js-interface are vulnerable to Command Injection via the main function. | [] |
GHSA-f6qx-4w44-966h | Cross-Site Request Forgery (CSRF) vulnerability in The Events Calendar.This issue affects The Events Calendar: from n/a through 6.3.0. | [] |
|
CVE-2025-32953 | z80pack Vulnerable to Exposure of the GITHUB_TOKEN in Workflow Run Artifact | z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916. | [] |
GHSA-qrh5-67c8-cw6q | Phpgurukul User Registration & User Management System v3.0 was discovered to contain multiple stored cross-site scripting (XSS) vulnerabilities via the firstname and lastname parameters of the registration form & login pages. | [] |
|
CVE-2022-48944 | sched: Fix yet more sched_fork() races | In the Linux kernel, the following vulnerability has been resolved:
sched: Fix yet more sched_fork() races
Where commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an
invalid sched_task_group") fixed a fork race vs cgroup, it opened up a
race vs syscalls by not placing the task on the runqueue before it
gets exposed through the pidhash.
Commit 13765de8148f ("sched/fair: Fix fault in reweight_entity") is
trying to fix a single instance of this, instead fix the whole class
of issues, effectively reverting this commit. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.10.80:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.14.19:*:*:*:*:*:*:*"
] |
CVE-2018-3215 | Vulnerability in the Oracle Endeca Information Discovery Integrator component of Oracle Fusion Middleware (subcomponent: Integrator ETL). Supported versions that are affected are 3.1.0 and 3.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Endeca Information Discovery Integrator. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Endeca Information Discovery Integrator accessible data as well as unauthorized read access to a subset of Oracle Endeca Information Discovery Integrator accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-49501 | Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the config_eq_output function in the libavfilter/asrc_afirsrc.c:495:30 component. | [
"cpe:2.3:a:ffmpeg:ffmpeg:-:*:*:*:*:*:*:*"
] |
|
GHSA-mrv6-53xm-wqhf | The MaxiBlocks: 2200+ Patterns, 190 Pages, 14.2K Icons & 100 Styles plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the maxi_remove_custom_image_size and maxi_add_custom_image_size functions in all versions up to, and including, 1.9.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | [] |
|
GHSA-pqph-446w-r3p4 | The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors. | [] |
|
CVE-2025-6352 | code-projects Automated Voting System Backend vote.php direct request | A vulnerability classified as problematic has been found in code-projects Automated Voting System 1.0. Affected is an unknown function of the file /vote.php of the component Backend. The manipulation leads to direct request. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
CVE-2021-34298 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The BMP_Loader.dll library in affected applications lacks proper validation of user-supplied data prior to performing further free operations on an object when parsing BMP files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13060) | [
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
] |
|
CVE-2009-2377 | Buffer overflow in the Avax Vector ActiveX control in avPreview.ocx in AVAX-software Avax Vector ActiveX 1.3 allows remote attackers to cause a denial of service (application crash) via a long PrinterName property. | [
"cpe:2.3:a:avax-software:avax_vector_activex:1.3:*:*:*:*:*:*:*"
] |
|
GHSA-qf67-vmxx-gp4j | A vulnerability, which was classified as problematic, was found in HkCms 2.2.4.230206. This affects an unknown part of the file /admin.php/appcenter/local.html?type=addon of the component External Plugin Handler. The manipulation leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223365 was assigned to this vulnerability. | [] |
|
CVE-2019-10792 | bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. | [
"cpe:2.3:a:bodymen_project:bodymen:*:*:*:*:*:node.js:*:*"
] |
|
CVE-2013-0838 | Google Chrome before 24.0.1312.52 on Linux uses weak permissions for shared memory segments, which has unspecified impact and attack vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1290.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1291.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1292.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1296.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1298.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-8j2x-wq4x-63v8 | A stored Cross-Site Scripting vulnerability in the GitLab Flavored Markdown in GitLab CE/EE version 8.4 and above allowed an attacker to execute arbitrary JavaScript code on the victim's behalf. | [] |
|
GHSA-jmc2-x4g4-xmv9 | bsmtpd 2.3 and earlier does not properly sanitize e-mail addresses, which allows remote attackers to execute arbitrary commands. | [] |
|
GHSA-rmr6-w429-5j5w | Multiple untrusted search path vulnerabilities in the (1) Presentation, (2) Writer, and (3) Spreadsheets components in Kingsoft Office 2010 6.6.0.2477 allow local users to gain privileges via a Trojan horse plgpf.dll file in the current working directory, as demonstrated by a directory that contains a .xls, .ppt, .rtf, or .doc file. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2020-24639 | There is a vulnerability caused by unsafe Java deserialization that allows for arbitrary command execution in a containerized environment within Airwave Glass before 1.3.3. Successful exploitation can lead to complete compromise of the underlying host operating system. | [
"cpe:2.3:a:arubanetworks:airwave_glass:*:*:*:*:*:*:*:*"
] |
|
GHSA-2p4q-mvv4-rjr2 | Netbox Community 4.1.7 is vulnerable to Cross Site Scripting (XSS) via the maintenance banner` in maintenance mode. | [] |
|
CVE-2017-17087 | fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382. | [
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] |
|
CVE-2006-6929 | Multiple cross-site scripting (XSS) vulnerabilities in Rapid Classified 3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to (a) reply.asp or (b) view_print.asp, the (2) SH1 parameter to (c) search.asp, the (3) name parameter to reply.asp, or the (4) dosearch parameter to (d) advsearch.asp. | [
"cpe:2.3:a:ga_soft:rapid_classified:3.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-45711 | IP-COM M50 V15.11.0.33(10768) was discovered to contain a command injection vulnerability via the hostname parameter in the formSetNetCheckTools function. | [
"cpe:2.3:o:ip-com:m50_firmware:15.11.0.33:*:*:*:*:*:*:*",
"cpe:2.3:h:ip-com:m50:-:*:*:*:*:*:*:*"
] |
|
GHSA-rj64-3q6q-qjm9 | Unspecified vulnerability in BEA WebLogic Portal 8.1 through SP6 allows remote attackers to bypass entitlements for instances of a floatable WLP portlet via unknown vectors. | [] |
|
GHSA-4hw9-4wwx-jm82 | An exploitable SQL injection vulnerability exists in the authenticated part of ERPNext v10.1.6. Specially crafted web requests can cause SQL injections resulting in data compromise. The employee and sort_order parameter can be used to perform an SQL injection attack. An attacker can use a browser to trigger these vulnerabilities, and no special tools are required. | [] |
|
GHSA-7wm2-j9cm-6464 | PHP remote file inclusion vulnerability in mutant_functions.php in the Mutant 0.9.2 portal for phpBB 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [] |
|
GHSA-vx56-xwhw-6m46 | Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiIsolator version 2.4.0 through 2.4.5 allows an authenticated attacker with at least read-only admin permission and CLI access to execute unauthorized code via specifically crafted CLI commands. | [] |
|
CVE-2024-35952 | drm/ast: Fix soft lockup | In the Linux kernel, the following vulnerability has been resolved:
drm/ast: Fix soft lockup
There is a while-loop in ast_dp_set_on_off() that could lead to
infinite-loop. This is because the register, VGACRI-Dx, checked in
this API is a scratch register actually controlled by a MCU, named
DPMCU, in BMC.
These scratch registers are protected by scu-lock. If suc-lock is not
off, DPMCU can not update these registers and then host will have soft
lockup due to never updated status.
DPMCU is used to control DP and relative registers to handshake with
host's VGA driver. Even the most time-consuming task, DP's link
training, is less than 100ms. 200ms should be enough. | [] |
CVE-2010-2627 | Multiple directory traversal vulnerabilities in the Refractor 2 engine, as used in Battlefield 2 1.50 (1.5.3153-802.0) and earlier, and Battlefield 2142 (1.10.48.0) and earlier, allow remote servers to overwrite arbitrary files on the client via "..\" (dot dot backslash) sequences in URLs for the (1) sponsor or (2) community logos, and other URLs related to (3) DemoDownloadURL, (4) DemoIndexURL and (5) CustomMapsURL. | [
"cpe:2.3:a:ea:battlefield_2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ea:battlefield_2142:*:*:*:*:*:*:*:*"
] |
|
GHSA-2pgm-5x83-qh65 | RuoYi v3.8.3 has a Weak password vulnerability in the management system. | [] |
|
GHSA-p7wc-5x23-73f7 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PortOne PORTONE 우커머스 결제 allows Reflected XSS. This issue affects PORTONE 우커머스 결제: from n/a through 3.2.4. | [] |
|
CVE-2011-0419 | Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd. | [
"cpe:2.3:a:apache:portable_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*"
] |
|
CVE-2023-0485 | An issue has been discovered in GitLab affecting all versions starting from 13.11 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible that a project member demoted to a user role to read project updates by doing a diff with a pre-existing fork. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-37098 | A path traversal vulnerability exists in HPE Insight Remote Support (IRS) prior to v7.15.0.646. | [] |
|
CVE-2025-47637 | WordPress STAGGS <= 2.11.0 - Arbitrary File Upload Vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in STAGGS STAGGS allows Upload a Web Shell to a Web Server. This issue affects STAGGS: from n/a through 2.11.0. | [] |
CVE-2020-5653 | Buffer overflow vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are '02' or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are '01' or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are '08' or before, RD81MES96N MES Interface Module First 2 digits of serial number are '04' or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are '04' or before) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. | [
"cpe:2.3:o:mitsubishielectric:melsec_iq-rj71eip91_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-rj71eip91:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:melsec_iq-rj71pn92_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-rj71pn92:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:melsec_iq-rd81dl96_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-rd81dl96:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:melsec_iq-rd81mes96n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-rd81mes96n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:melsec_iq-rd81opc96_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:melsec_iq-rd81opc96:-:*:*:*:*:*:*:*"
] |
|
GHSA-cmc5-q5p8-hw92 | SQL injection vulnerability in BackLinkSpider allows remote attackers to execute arbitrary SQL commands via the cat_id parameter to a site-specific component name such as link.php or backlinkspider.php. | [] |
|
CVE-2013-1834 | notes/edit.php in Moodle 1.9.x through 1.9.19, 2.x through 2.1.10, 2.2.x before 2.2.8, 2.3.x before 2.3.5, and 2.4.x before 2.4.2 allows remote authenticated users to reassign notes via a modified (1) userid or (2) courseid field. | [
"cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.17:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.18:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.9.19:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*"
] |
|
GHSA-f4h5-fx46-qjxf | There is a resource management error vulnerability in eCNS280_TD V100R005C10SPC650. An attacker needs to perform specific operations to exploit the vulnerability on the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices. | [] |
|
GHSA-w7pw-h6p8-3fh3 | OpenBSD 2.9 through 3.1 allows local users to cause a denial of service (resource exhaustion) and gain root privileges by filling the kernel's file descriptor table and closing file descriptors 0, 1, or 2 before executing a privileged process, which is not properly handled when OpenBSD fails to open an alternate descriptor. | [] |
|
CVE-2019-20798 | An XSS issue was discovered in handler_server_info.c in Cherokee through 1.2.104. The requested URL is improperly displayed on the About page in the default configuration of the web server and its administrator panel. The XSS in the administrator panel can be used to reconfigure the server and execute arbitrary commands. | [
"cpe:2.3:a:cherokee-project:cherokee:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-10776 | A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack. | [
"cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-0375 | JMS Client in IBM MessageSight 1.1.x through 1.1.0.1, 1.2.x through 1.2.0.3, and 2.0.x through 2.0.0.0 allows remote authenticated users to obtain administrator privileges for executing arbitrary commands via unspecified vectors. | [
"cpe:2.3:a:ibm:messagesight:1.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:messagesight:1.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:messagesight:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:messagesight:1.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:messagesight:1.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:messagesight:1.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:messagesight:1.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:messagesight:2.0.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-25wj-f645-7mjg | X-Micro WLAN 11b Broadband Router 1.2.2, 1.2.2.3, 1.2.2.4, and 1.6.0.0 has a hardcoded "super" username and password, which could allow remote attackers to gain access. | [] |
|
CVE-2017-12119 | An exploitable unhandled exception vulnerability exists in multiple APIs of CPP-Ethereum JSON-RPC. Specially crafted JSON requests can cause an unhandled exception resulting in denial of service. An attacker can send malicious JSON to trigger this vulnerability. | [
"cpe:2.3:a:ethereum:cpp-ethereum:-:*:*:*:*:*:*:*"
] |
|
GHSA-7gpj-6r54-x2fv | In Usage Access, there is a possible way to display a Settings usage access restriction toggle screen due to a permissions bypass. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. | [] |
|
CVE-2009-4398 | Cross-site scripting (XSS) vulnerability in the Parish of the Holy Spirit Religious Art Gallery (hs_religiousartgallery) extension 0.1.2 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:fr.simon_rundell:hs_religiousartgallery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-2693 | ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path. | [
"cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-43998 | An issue in Books-futaba mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token. | [
"cpe:2.3:a:linecorp:line:13.6.1:*:*:*:*:*:*:*"
] |
|
CVE-2020-7251 | ESConfig Tool able to edit configuration for newer version | Improper access control vulnerability in Configuration Tool in McAfee Mcafee Endpoint Security (ENS) Prior to 10.6.1 February 2020 Update allows local users to disable security features via unauthorised use of the configuration tool from older versions of ENS. | [
"cpe:2.3:a:mcafee:endpoint_security:*:*:*:*:*:*:*:*"
] |
CVE-2020-6868 | There is an input validation vulnerability in a PON terminal product of ZTE, which supports the creation of WAN connections through WEB management pages. The front-end limits the length of the WAN connection name that is created, but the HTTP proxy is available to be used to bypass the limitation. An attacker can exploit the vulnerability to tamper with the parameter value. This affects: ZTE F680 V9.0.10P1N6 | [
"cpe:2.3:o:zte:f680_firmware:zxhn_f680v9.0.10p1n6:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:f680:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-2574 | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality via unknown vectors related to Text Utilities. | [
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"
] |
|
CVE-2023-3219 | EventON < 2.1.2 - Unauthenticated Post Access via IDOR | The EventON WordPress plugin before 2.1.2 does not validate that the event_id parameter in its eventon_ics_download ajax action is a valid Event, allowing unauthenticated visitors to access any Post (including unpublished or protected posts) content via the ics export functionality by providing the numeric id of the post. | [
"cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*"
] |
GHSA-x6qx-38ch-f4w9 | Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. | [] |
|
CVE-2021-21334 | environment variable leak | In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability has been fixed in containerd 1.3.10 and containerd 1.4.4. Users should update to these versions. | [
"cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] |
CVE-2023-21785 | 3D Builder Remote Code Execution Vulnerability | 3D Builder Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:3d_builder:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:3d_builder:*:*:*:*:*:*:*:*"
] |
CVE-2020-3965 | VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine. | [
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*"
] |
|
GHSA-7gfp-vw4p-pwq6 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Hara allows PHP Local File Inclusion. This issue affects Hara: from n/a through 1.2.10. | [] |
|
GHSA-rwmp-fffg-59g6 | Cisco Unified Communications Manager (CUCM) 8.6 before 8.6(2a)su2, 8.6 BE3k before 8.6(4) BE3k, and 9.x before 9.0(1) allows remote attackers to cause a denial of service (CPU consumption and GUI and voice outages) via malformed packets to unused UDP ports, aka Bug ID CSCtx43337. | [] |
|
GHSA-4ghp-r97r-f275 | NVIDIA Linux kernel distributions on Jetson Xavier contain a vulnerability in camera firmware where a user can change input data after validation, which may lead to complete denial of service and serious data corruption of all kernel components. | [] |
|
CVE-2019-20837 | An issue was discovered in Foxit Reader and PhantomPDF before 9.5. It allows signature validation bypass via a modified file or a file with non-standard signatures. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-56170 | A validation integrity issue was discovered in Fort through 1.6.4 before 2.0.0. RPKI manifests are listings of relevant files that clients are supposed to verify. Assuming everything else is correct, the most recent version of a manifest should be prioritized over other versions, to prevent replays, accidental or otherwise. Manifests contain the manifestNumber and thisUpdate fields, which can be used to gauge the relevance of a given manifest, when compared to other manifests. The former is a serial-like sequential number, and the latter is the date on which the manifest was created. However, the product does not compare the up-to-dateness of the most recently fetched manifest against the cached manifest. As such, it's prone to a rollback to a previous version if it's served a valid outdated manifest. This leads to outdated route origin validation. | [] |
|
GHSA-q8vq-355x-4874 | A Code Injection issue was discovered in CyberVision Kaa IoT Platform, Version 0.7.4. An insufficient-encapsulation vulnerability has been identified, which may allow remote code execution. | [] |
|
CVE-2024-12423 | Contact Form 7 Redirect & Thank You Page <= 1.0.7 - Reflected Cross-Site Scripting | The Contact Form 7 Redirect & Thank You Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'post' parameter in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
CVE-2021-41196 | Crash in `max_pool3d` when size argument is 0 or negative | TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative. This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] |
CVE-2001-1143 | IBM DB2 7.0 allows a remote attacker to cause a denial of service (crash) via a single byte to (1) db2ccs.exe on port 6790, or (2) db2jds.exe on port 6789. | [
"cpe:2.3:a:ibm:db2_universal_database:7.0:*:linux:*:*:*:*:*"
] |
|
GHSA-p5g3-6w3j-v5qc | Tenda W18E v2.0 v16.01.0.11 was discovered to contain a stack overflow in the wifiPwd parameter at /goform/setModules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | [] |
|
CVE-2024-9113 | FastStone Image Viewer TGA File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | FastStone Image Viewer TGA File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FastStone Image Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of TGA files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25140. | [
"cpe:2.3:a:faststone:image_viewer:7.8:*:*:*:*:*:*:*"
] |
GHSA-wf5c-q6vq-584r | An attacker is able to launch a Reflected XSS attack using a crafted URL. | [] |
|
GHSA-wpp8-x44c-v39q | The filefield_file_download function in FileField 6.x-3.1, a module for Drupal, does not properly check node-access permissions for Drupal core private files, which allows remote attackers to access unauthorized files via unspecified vectors. | [] |
|
CVE-2018-1340 | Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain. | [
"cpe:2.3:a:apache:guacamole:*:*:*:*:*:*:*:*"
] |
|
GHSA-4hqx-53cj-v46r | Multiple SQL injection vulnerabilities in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allow remote attackers to execute arbitrary SQL commands via the sort_mode parameter in (1) tiki-usermenu.php, (2) tiki-list_file_gallery.php, (3) tiki-directory_ranking.php, (4) tiki-browse_categories.php, (5) tiki-index.php, (6) tiki-user_tasks.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-file_galleries.php, (10) tiki-list_faqs.php, (11) tiki-list_trackers.php, (12) tiki-list_blogs.php, or via the offset parameter in (13) tiki-usermenu.php, (14) tiki-browse_categories.php, (15) tiki-index.php, (16) tiki-user_tasks.php, (17) tiki-list_faqs.php, (18) tiki-list_trackers.php, or (19) tiki-list_blogs.php. | [] |
|
GHSA-hg5p-m73j-gf56 | A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code. | [] |
|
CVE-2022-34676 | NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds read may lead to denial of service, information disclosure, or data tampering. | [
"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:cloud_gaming:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.