Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-h49v-gcm2-4fm3
Use of default credentials vulnerability in MR-GM2 firmware Ver. 3.00.03 and earlier, and MR-GM3 (-D/-K/-S/-DK/-DKS/-M/-W) firmware Ver. 1.03.45 and earlier allows a network-adjacent unauthenticated attacker to intercept wireless LAN communication, when the affected product performs the communication without changing the pre-shared key from the factory-default configuration.
[]
CVE-2007-1846
SQL injection vulnerability in index.php in the MyAds 2.04jp and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the cid parameter, different vectors than CVE-2006-3341.
[ "cpe:2.3:a:xoops:malaika_system_myads_module:*:*:*:*:*:*:*:*" ]
CVE-2002-2269
Directory traversal vulnerability in Webster HTTP Server allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.
[ "cpe:2.3:a:webster:webster_http_server:*:*:*:*:*:*:*:*" ]
CVE-2013-3836
Unspecified vulnerability in the Oracle Web Cache component in Oracle Fusion Middleware 11.1.1.6 and 11.1.1.7 allows remote authenticated users to affect confidentiality via vectors related to ESI/Partial Page Caching.
[ "cpe:2.3:a:oracle:fusion_middleware:11.1.1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.7.0:*:*:*:*:*:*:*" ]
CVE-2021-0961
In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196046570References: Upstream kernel
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
CVE-2019-5307
Some Huawei 4G LTE devices, P30 versions before ELE-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1) and P30 Pro versions before VOG-AL00 9.1.0.162(C01E160R1P12/C01E160R2P1), are exposed to a message replay vulnerability. For the sake of better compatibility, these devices implement a less strict check on the NAS message sequence number (SN), specifically NAS COUNT. As a result, an attacker can construct a rogue base station and replay the GUTI reallocation command message in certain conditions to tamper with GUTIs, or replay the Identity request message to obtain IMSIs. (Vulnerability ID: HWPSIRT-2019-04107)
[ "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*" ]
CVE-2019-10155
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.
[ "cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*", "cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*", "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*" ]
GHSA-c5h7-mjwp-4pvr
The default configuration of Oracle 9i Application Server 1.0.2.x allows remote anonymous users to access sensitive services without authentication, including Dynamic Monitoring Services (1) dms0, (2) dms/DMSDump, (3) servlet/DMSDump, (4) servlet/Spy, (5) soap/servlet/Spy, and (6) dms/AggreSpy; and Oracle Java Process Manager (7) oprocmgr-status and (8) oprocmgr-service, which can be used to control Java processes.
[]
CVE-2009-3406
Unspecified vulnerability in the JD Edwards Tools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.98.2.1 allows remote authenticated users to affect confidentiality via unknown vectors.
[ "cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.98.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise:8.98.2.1:*:*:*:*:*:*:*" ]
GHSA-9cvx-cr48-6ghq
The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks.
[]
GHSA-2hv6-78vc-qvw9
Multiple cross-site scripting (XSS) vulnerabilities in FLV Players 8 allow remote attackers to inject arbitrary web script or HTML via the url parameter to (1) player.php or (2) popup.php.
[]
CVE-2001-0010
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.
[ "cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p3:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p4:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p5:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p6:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:p7:*:*:*:*:*:*" ]
CVE-2007-0359
PHP remote file inclusion vulnerability in frontpage.php in Uberghey CMS 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the setup_folder parameter.
[ "cpe:2.3:a:uberghey:cms:0.3.1:*:*:*:*:*:*:*" ]
CVE-2020-7640
pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization.
[ "cpe:2.3:a:pixlcore:pixl-class:*:*:*:*:*:node.js:*:*" ]
CVE-2005-1548
SQL injection vulnerability in index.php in Advanced Guestbook 2.3.1 allows remote attackers to execute arbitrary SQL commands via the entry parameter.
[ "cpe:2.3:a:advanced_guestbook:advanced_guestbook:2.3.1:*:*:*:*:*:*:*" ]
GHSA-895q-vqrm-2jch
In S+ Operations and S+ Historian, not all client commands correctly check user permission as expected. Authenticated but Unauthorized remote users could execute a Denial-of-Service (DoS) attack, execute arbitrary code, or obtain more privilege than intended on the machines.
[]
GHSA-h7qh-xjxg-vww9
Windows Journal in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted Journal (aka .JNT) file, aka "Windows Journal Remote Code Execution Vulnerability."
[]
GHSA-mpj5-8r3q-68mq
lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories.
[]
CVE-2019-10266
An issue was discovered in Ahsay Cloud Backup Suite before 8.1.1.50. When sending an out-of-bounds XML document to a URL, it is possible to read the file structure and even the content of files without authentication.
[ "cpe:2.3:a:ahsay:cloud_backup_suite:*:*:*:*:*:*:*:*" ]
CVE-2024-28094
Blind SQL Injection in Chat functionality in Schoolbox
Chat functionality in Schoolbox application before version 23.1.3 is vulnerable to blind SQL Injection enabling the authenticated attackers to read, modify, and delete database records.
[]
CVE-2014-4628
Cross-site scripting (XSS) vulnerability in EMC Isilon InsightIQ 2.x and 3.x before 3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:emc:isilon_insightiq:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:isilon_insightiq:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:isilon_insightiq:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:isilon_insightiq:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:isilon_insightiq:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:isilon_insightiq:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:emc:isilon_insightiq:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:isilon_insightiq:3.0.1:*:*:*:*:*:*:*" ]
CVE-2020-12883
Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased correspondingly. The pointer is restricted by the size of the received buffer, as well as by the option delta and option length bytes. The actual input packet length is not verified against the number of bytes read when processing the option extended delta and the option extended length. Moreover, the calculation of the message_left variable, in the case of non-extended option deltas, is incorrect and indicates more data left for processing than provided in the function input. All of these lead to heap-based or stack-based memory location read access that is outside of the intended boundary of the buffer. Depending on the platform-specific memory management mechanisms, it can lead to processing of unintended inputs or system memory access violation errors.
[ "cpe:2.3:o:arm:mbed_os:5.15.3:*:*:*:*:*:*:*" ]
CVE-2020-5720
MikroTik WinBox before 3.21 is vulnerable to a path traversal vulnerability that allows creation of arbitrary files wherevere WinBox has write permissions. WinBox is vulnerable to this attack if it connects to a malicious endpoint or if an attacker mounts a man in the middle attack.
[ "cpe:2.3:o:mikrotik:winbox:*:*:*:*:*:*:*:*" ]
CVE-2013-3502
monarch_scan.cgi in the MONARCH component in GroundWork Monitor Enterprise 6.7.0 allows remote authenticated users to execute arbitrary commands, and consequently obtain sensitive information, by leveraging a JOSSO SSO cookie.
[ "cpe:2.3:a:gwos:groundwork_monitor:6.7.0:-:enterprise:*:*:*:*:*" ]
GHSA-hwqv-mgvv-f7g4
Machform prior to version 16 is vulnerable to cross-site request forgery due to a lack of CSRF tokens in place.
[]
GHSA-8prj-gx2p-fgx6
In the Linux kernel, the following vulnerability has been resolved:media: imx: csc/scaler: fix v4l2_ctrl_handler memory leakFree the memory allocated in v4l2_ctrl_handler_init on release.
[]
GHSA-6w59-822p-m435
An issue was discovered in Mattermost Server before 5.7, 5.6.3, 5.5.2, and 4.10.5. It mishandles permissions for user-access token creation.
[]
GHSA-qqwm-p976-w7mm
The image rendering component (createGenericPreview) of the Open Whisper Signal app through 2.29.0 for iOS fails to check for unreasonably large images before manipulating received images. This allows for a large image sent to a user to exhaust all available memory when the image is displayed, resulting in a forced restart of the device.
[]
GHSA-38mv-w2q2-hpqq
IBM Security Verify Information Queue 10.0.2 could allow a user to obtain sensitive information that could be used in further attacks against the system. IBM X-Force ID: 230818.
[]
GHSA-rmf7-vj4c-j2c9
This vulnerability allows remote attackers to bypass authentication on affected installations of Inductive Automation Ignition 8.1.15 (b2022030114). Authentication is not required to exploit this vulnerability. The specific flaw exists within com.inductiveautomation.ignition.gateway.web.pages. The issue results from the lack of proper authentication prior to access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-17211.
[]
GHSA-j87w-85w8-q3v3
PHPGurukul Small CRM 3.0 is vulnerable to SQL Injection on the Users login panel because of "password" parameter is directly used in the SQL query without any sanitization and the SQL Injection payload being executed.
[]
GHSA-65rr-c397-rjhm
Unspecified vulnerability in the Oracle ODBC Driver for Oracle Database 10.1.0.4 has unknown impact and attack vectors, aka Oracle Vuln# 10.1.0.4.
[]
CVE-2020-16143
The seafile-client client 7.0.8 for Seafile is vulnerable to DLL hijacking because it loads exchndl.dll from the current working directory.
[ "cpe:2.3:a:seafile:seafile-client:7.0.8:*:*:*:*:seafile:*:*" ]
CVE-2016-1191
Directory traversal vulnerability in the Files function in Cybozu Garoon 3.x and 4.x before 4.2.1 allows remote attackers to modify settings via unspecified vectors.
[ "cpe:2.3:a:cybozu:garoon:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:3.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:garoon:4.2.0:*:*:*:*:*:*:*" ]
CVE-2015-1879
Cross-site scripting (XSS) vulnerability in the Google Doc Embedder plugin before 2.5.19 for WordPress allows remote attackers to inject arbitrary web script or HTML via the profile parameter in an edit action in the gde-settings page to wp-admin/options-general.php.
[ "cpe:2.3:a:google_doc_embedder:google_doc_embedder:2.5.18:*:*:*:*:wordpress:*:*" ]
GHSA-hpgx-jp4h-3qqq
Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) in EMC Avamar Server before 7.3.0-233 allow local users to obtain root access via a crafted parameter to a command that is available in the sudo configuration.
[]
GHSA-r7g6-9h4x-rfpf
AirPort in Apple Mac OS X 10.6 before 10.6.7 allows remote attackers to cause a denial of service (divide-by-zero error and reboot) via Wi-Fi frames on the local wireless network, a different vulnerability than CVE-2011-0162.
[]
GHSA-hpcw-47wp-rc8h
Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Exim. Authentication is not required to exploit this vulnerability.The specific flaw exists within the smtp service, which listens on TCP port 25 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account. Was ZDI-CAN-17643.
[]
CVE-2021-43941
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to modify several resources (including CsvFieldMappingsPage.jspa and ImporterValueMappingsPage.jspa) via a Cross-Site Request Forgery (CSRF) vulnerability in the jira-importers-plugin. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3.
[ "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ]
GHSA-jmpc-v965-868j
The Cisco Firewall Services Module (FWSM) 2.x, 3.1 before 3.1(16), 3.2 before 3.2(13), and 4.0 before 4.0(6) for Cisco Catalyst 6500 switches and Cisco 7600 routers allows remote attackers to cause a denial of service (traffic-handling outage) via a series of malformed ICMP messages.
[]
GHSA-qfh3-8w9w-vh9f
A cross-site scripting vulnerability has been identified in Geutebruck G-Cam/EFD-2250 Version 1.12.0.4 and Topline TopFD-2125 Version 3.15.1 IP cameras, which may allow remote code execution.
[]
GHSA-cj9v-p8wr-46mp
The video carousel slider with lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the responsive_video_gallery_with_lightbox_video_management_func() function. This makes it possible for unauthenticated attackers to delete videos hosted from the video slider via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
CVE-2018-0754
The Windows Adobe Type Manager Font Driver (Atmfd.dll) in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are handled in memory, aka "OpenType Font Driver Information Disclosure Vulnerability".
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*" ]
CVE-2021-32972
Panasonic FPWIN Pro, all Versions 7.5.1.1 and prior, allows an attacker to craft a project file specifying a URI that causes the XML parser to access the URI and embed the contents, which may allow the attacker to disclose information that is accessible in the context of the user executing software.
[ "cpe:2.3:a:panasonic:fpwin_pro:*:*:*:*:*:*:*:*" ]
GHSA-q2xc-6c48-r5px
The T-Soft E-Commerce 4 web application is susceptible to SQL injection (SQLi) attacks when authenticated as an admin or privileged user. This vulnerability allows attackers to access and manipulate the database through crafted requests. By exploiting this flaw, attackers can bypass authentication mechanisms, view sensitive information stored in the database, and potentially exfiltrate data.
[]
GHSA-63j4-pqpq-mx6j
Multiple cross-site scripting (XSS) vulnerabilities in Jinzora Media Jukebox 2.7.5 allow remote attackers to inject arbitrary web script or HTML via the (1) frontend, (2) set_frontend, (3) jz_path, (4) theme, and (5) set_theme parameters to (a) index.php; the frontend, theme, and (6) language parameters to (b) ajax_request.php; the jz_path parameter to (c) slim.php; the frontend, theme, and jz_path parameters to (d) popup.php; the (13) PATH_INFO to index.php and (e) slim.php; and the (14) query parameter in a playlistedit action and (15) siteNewsData parameter in a sitenews action to (f) popup.php.
[]
CVE-2019-7769
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-gj55-2xf9-67rq
HTML injection in JupyterLite leading to DOM Clobbering
ImpactThe vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature.A malicious user can access any data accessible from JupyterLite and perform arbitrary actions in JupyterLite environment.PatchesJupyterLite 0.4.1 was patched.WorkaroundsThere is no workaround for the underlying DOM Clobbering susceptibility. However, select plugins can be disabled on deployments which cannot update in a timely fashion to minimise the risk. These are:`@jupyterlab/mathjax-extension:plugin` - users will loose ability to preview mathematical equations`@jupyterlab/markdownviewer-extension:plugin` - users will loose ability to open Markdown previews`@jupyterlab/mathjax2-extension:plugin` (if installed with optional `jupyterlab-mathjax2` package) - an older version of the mathjax plugin for JupyterLab 4.xTo disable these extensions populate the `disabledExtensions` key in `jupyter-config-data` stanza of `jupyter-lite.json` as documented on https://jupyterlite.readthedocs.io/en/stable/howto/configure/config_files.html#jupyter-lite-jsonTo confirm that the plugins were disabled manual inspection of the built page is required.ReferencesUpstream advisory: https://github.com/jupyterlab/jupyterlab/security/advisories/GHSA-9q39-rmj3-p4r2NotesThis change has a potential to break rendering of some markdown. There is a setting in Sanitizer which allows to revert to the previous sanitizer settings (`allowNamedProperties`).
[]
GHSA-w88c-j332-rfjj
An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with chipset Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, Modem 5123, and Modem 5300. A USAT out-of-bounds write due to a heap buffer overflow can lead to a Denial of Service.
[]
CVE-2007-4383
PHP remote file inclusion vulnerability in tracking.php in Trackeur 1 allows remote attackers to execute arbitrary PHP code via a URL in the header parameter. NOTE: CVE and a third party dispute this vulnerability because header is defined before use. The researcher is known to be unreliable
[ "cpe:2.3:a:trackeur:trackeur:1:*:*:*:*:*:*:*" ]
CVE-2023-35929
Tuleap Cross-site Scripting vulnerability in the card field of the agile dashboard apps
Tuleap is a free and open source suite to improve management of software development and collaboration. Prior to version 14.10.99.4 of Tuleap Community Edition and prior to versions 14.10-2 and 14.9-5 of Tuleap Enterprise Edition, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. A malicious user with the capability to create an artifact or to edit a field used as a card field could force victim to execute uncontrolled code. Tuleap Community Edition 14.10.99.4, Tuleap Enterprise Edition 14.10-2, and Tuleap Enterprise Edition 14.9-5 contain a fix.
[ "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*" ]
GHSA-x6f2-rfj4-r2g4
Due to lack of proper memory management, when a victim opens manipulated AutoCAD (.dxf, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application.
[]
CVE-2025-30879
WordPress MC Woocommerce Wishlist plugin <= 1.8.9 - SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in moreconvert MC Woocommerce Wishlist allows SQL Injection. This issue affects MC Woocommerce Wishlist: from n/a through 1.8.9.
[]
GHSA-6jj3-gr44-xxfm
Unspecified vulnerability in the Oracle Access Manager component in Oracle Fusion Middleware 11.1.1.5 allows remote authenticated users to affect availability via unknown vectors related to Webserver Plugin.
[]
GHSA-r7p4-vr76-hpx7
PHP Scripts Mall Professional Service Script has CSRF via admin/general_settingupd.php, as demonstrated by modifying a setting in the user panel.
[]
GHSA-3ggx-jrrh-fgmw
SQL injection vulnerability in ogp_show.php in esoftpro Online Guestbook Pro 5.1 allows remote attackers to execute arbitrary SQL commands via the search parameter.
[]
CVE-2023-20893
The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
[ "cpe:2.3:a:vmware:vcenter_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*" ]
GHSA-38hh-r6wr-38f6
yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allows remote attackers to cause a denial of service (crash) via a Hello packet containing a large size value, which triggers a buffer over-read in the HASHwithTransform::Update function in hash.cpp.
[]
CVE-2017-17580
FS Linkedin Clone 1.0 has SQL Injection via the group.php grid parameter, profile.php fid parameter, or company_details.php id parameter.
[ "cpe:2.3:a:linkedin_clone_project:linkedin_clone:1.0:*:*:*:*:*:*:*" ]
CVE-2024-1036
openBI Icon Screen.php uploadIcon unrestricted upload
A vulnerability was found in openBI up to 1.0.8 and classified as critical. This issue affects the function uploadIcon of the file /application/index/controller/Screen.php of the component Icon Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252311.
[ "cpe:2.3:a:openbi:openbi:*:*:*:*:*:*:*:*" ]
CVE-2023-40454
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to delete files for which it does not have permission.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
GHSA-3358-4f7f-p4j4
Use after free in generic-array
An issue was discovered in the generic-array crate before 0.13.3 for Rust. It violates soundness by using the arr! macro to extend lifetimes.
[]
CVE-2021-36613
Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerability in the ptp process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
[ "cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*" ]
GHSA-5pqc-4j66-r4q3
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in YYDevelopment Back To The Top Button plugin <= 2.1.5 versions.
[]
CVE-2023-47768
WordPress Footer Putter Plugin <= 1.17 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Russell Jamieson Footer Putter plugin <= 1.17 versions.
[ "cpe:2.3:a:diywebmastery:footer_putter:*:*:*:*:*:wordpress:*:*" ]
GHSA-9g5v-572f-c456
Zoho ManageEngine Applications Manager 12 through 14 allows FaultTemplateOptions.jsp resourceid SQL injection. Subsequently, an unauthenticated user can gain the authority of SYSTEM on the server by uploading a malicious file via the "Execute Program Action(s)" feature.
[]
CVE-2023-47663
WordPress Foyer plugin <= 1.7.5 - Content Injection vulnerability
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Menno Luitjes Foyer allows Code Injection.This issue affects Foyer: from n/a through 1.7.5.
[]
GHSA-cmrc-q43h-xrrq
Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
[]
CVE-2006-1511
Buffer overflow in the ILASM assembler in the Microsoft .NET 1.0 and 1.1 Framework might allow user-assisted attackers to execute arbitrary code via a .il file that calls a function with a long name.
[ "cpe:2.3:a:microsoft:.net_framework:1.0:*:sdk:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:1.0:sp1:sdk:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:1.0:sp2:sdk:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:1.1:*:sdk:*:*:*:*:*", "cpe:2.3:a:microsoft:.net_framework:1.1:sp1:sdk:*:*:*:*:*" ]
GHSA-r49h-f389-j4hc
The web interface for SOHO Routefinder 550 firmware 4.63 and earlier, and possibly later versions, has a default "admin" account with a blank password, which could allow attackers on the LAN side to conduct unauthorized activities.
[]
CVE-2021-34570
Phoenix Contact: DoS for PLCnext Control devices in versions prior to 2021.0.5 LTS
Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.
[ "cpe:2.3:o:phoenixcontact:plcnext_technology_starterkit_firmware:*:*:*:*:lts:*:*:*", "cpe:2.3:h:phoenixcontact:plcnext_technology_starterkit:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:axc_f_2152_starterkit_firmware:*:*:*:*:lts:*:*:*", "cpe:2.3:h:phoenixcontact:axc_f_2152_starterkit:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:rfc_4072s_firmware:*:*:*:*:lts:*:*:*", "cpe:2.3:h:phoenixcontact:rfc_4072s:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:axc_f_3152_firmware:*:*:*:*:lts:*:*:*", "cpe:2.3:h:phoenixcontact:axc_f_3152:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:axc_f_1152_firmware:*:*:*:*:lts:*:*:*", "cpe:2.3:h:phoenixcontact:axc_f_1152:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:axc_f_2152_firmware:*:*:*:*:lts:*:*:*", "cpe:2.3:h:phoenixcontact:axc_f_2152:-:*:*:*:*:*:*:*" ]
CVE-2024-29092
WordPress Permalink Manager Lite plugin <= 2.4.3 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maciej Bis Permalink Manager Lite allows Reflected XSS.This issue affects Permalink Manager Lite: from n/a through 2.4.3.
[]
CVE-2017-3141
Windows service and uninstall paths are not quoted when BIND is installed
The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.
[ "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.2.6:p2:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.3.2:p1:*:*:*:*:*:*" ]
CVE-2013-4963
Multiple cross-site request forgery (CSRF) vulnerabilities in Puppet Enterprise (PE) before 3.0.1 allow remote attackers to hijack the authentication of users for requests that deleting a (1) report, (2) group, or (3) class or possibly have other unspecified impact.
[ "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.8.3:*:*:*:*:*:*:*" ]
CVE-2005-3202
Multiple cross-site scripting (XSS) vulnerabilities in Oracle HTML DB (HTMLDB) 1.3 through 1.3.6 allow remote attackers to inject arbitrary web script or HTML, and subsequently execute SQL statements via the (1) p or (2) p_t02 parameters.
[ "cpe:2.3:a:oracle:html_db:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:html_db:1.3.6:*:*:*:*:*:*:*" ]
CVE-2025-22327
WordPress EO4WP plugin <= 1.0.7 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer EO4WP allows Stored XSS.This issue affects EO4WP: from n/a through 1.0.7.
[]
GHSA-h2qv-f8w8-72wh
The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'question_id' parameter in all versions up to, and including, 9.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
GHSA-xm4c-7jqp-5wcr
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1379, CVE-2020-1477, CVE-2020-1478, CVE-2020-1492, CVE-2020-1525.
[]
GHSA-hmx6-wg4q-3825
TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to contain a stack overflow in the function setIpv6Cfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via the relay6to4 parameters.
[]
CVE-2019-1227
Windows Kernel Information Disclosure Vulnerability
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
[ "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_1803:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
GHSA-m8mj-rx2h-m764
A user with administrative privileges in Distributed Data Systems WebHMI 4.1.1.7662 can store a script that could impact other logged in users.
[]
CVE-2012-2768
Multiple cross-site scripting (XSS) vulnerabilities in the topic administration page in the RTFM extension 2.0.4 through 2.4.3 for Best Practical Solutions RT allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:best_practical_solutions:request_tracker:2.4.3:*:*:*:*:*:*:*" ]
GHSA-c2gj-fphg-qv3q
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NIKON NIS-Elements Viewer 1.2100.1483.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of TIF images. Crafted data in a TIF file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15166.
[]
GHSA-975h-h4pp-737q
The Windows installer for Apache Tomcat 6.0.0 through 6.0.20, 5.5.0 through 5.5.28, and possibly earlier versions uses a blank default password for the administrative user, which allows remote attackers to gain privileges.
[]
CVE-2024-42340
CyberArk - CWE-602: Client-Side Enforcement of Server-Side Security
CyberArk - CWE-602: Client-Side Enforcement of Server-Side Security
[ "cpe:2.3:a:cyberark:identity:*:*:*:*:*:*:*:*" ]
CVE-2024-3383
PAN-OS: Improper Group Membership Change Vulnerability in Cloud Identity Engine (CIE)
A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied or allowed access to resources based on your existing Security Policy rules.
[]
GHSA-3jr9-r246-qqvc
The unprivileged user portal part of CentOS Web Panel is affected by a Command Injection vulnerability leading to root Remote Code Execution.
[]
GHSA-j5ww-rm5w-356w
An issue was discovered on Samsung mobile devices with P(9.0) (SM6150, SM8150, SM8150_FUSION, exynos7885, exynos9610, and exynos9820 chipsets) software. Arbitrary memory read and write operations can occur in RKP. The Samsung ID is SVE-2019-15143 (October 2019).
[]
CVE-1999-0501
A Unix account has a guessable password.
[]
CVE-2024-28148
Apache Superset: Incorrect datasource authorization on explore REST API
An authenticated user could potentially access metadata for a datasource they are not authorized to view by submitting a targeted REST API request.This issue affects Apache Superset: before 3.1.2. Users are recommended to upgrade to version 3.1.2 or above, which fixes the issue.
[]
GHSA-86j3-8qqw-575j
An invalid memory address dereference was discovered in load_pnm in frompnm.c in libsixel before 1.8.3.
[]
GHSA-94wm-9j29-vhm4
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
GHSA-gx38-54cf-m5hf
A vulnerability was found in SourceCodester Purchase Order Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the component Supplier Handler. The manipulation of the argument Supplier Name/Address/Contact person/Contact leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210832.
[]
GHSA-pgrc-mhqr-gxg2
Cross-site scripting vulnerability (XSS) in AN HTTP 1.41e allows remote attackers to execute arbitrary web script or HTML as other users via a URL containing the script.
[]
CVE-2007-6191
Multiple PHP remote file inclusion vulnerabilities in Armin Burger p.mapper 3.2.0 beta3 allow remote attackers to execute arbitrary PHP code via a URL in the _SESSION[PM_INCPHP] parameter to (1) incphp/globals.php or (2) plugins/export/mc_table.php. NOTE: it could be argued that this vulnerability is caused by a problem in PHP and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in p.mapper.
[ "cpe:2.3:a:pmapper:p.mapper:3.2.0_beta3:*:*:*:*:*:*:*" ]
CVE-2024-29661
A File Upload vulnerability in DedeCMS v5.7 allows a local attacker to execute arbitrary code via a crafted payload.
[ "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*" ]
CVE-2018-13001
An XSS issue was discovered in Sandoba CP:Shop v2016.1. The vulnerability is located in the `admin.php` file of the `./cpshop/` module. Remote attackers are able to inject their own script codes to the client-side requested vulnerable web-application parameters. The attack vector of the vulnerability is non-persistent and the request method to inject/execute is GET with the path, search, rename, or dir parameter.
[ "cpe:2.3:a:sandoba:cp\\:\\:shop:2016.1:*:*:*:*:*:*:*" ]
GHSA-35xg-724r-fcfx
RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the articleid parameter at /default/article.php.
[]
CVE-2020-2201
Jenkins Sonargraph Integration Plugin 3.0.0 and earlier does not escape the file path for the Log file field form validation, resulting in a stored cross-site scripting vulnerability.
[ "cpe:2.3:a:jenkins:sonargraph_integration:*:*:*:*:*:jenkins:*:*" ]
GHSA-9xx7-rp3v-8694
A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions before 16.10.6, version 16.11 before 16.11.3, and 17.0 before 17.0.1. It is possible for an attacker to cause a denial of service using a crafted wiki page.
[]