id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-877x-7xf2-qfc6 | A Cross-site Scripting (XSS) vulnerability in manage_account.php in Sourcecodester Cab Management System 1.0 allows remote authenticated users to inject arbitrary web scripts via the "First Name," "Middle Name," and "Last Name" fields. | [] |
|
CVE-2013-5159 | WebKit in Apple iOS before 7 allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive information about use of the window.webkitRequestAnimationFrame API via an IFRAME element. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-f654-xq37-47w4 | Cross-site scripting (XSS) vulnerability in Adobe ColdFusion MX 7 7.0 and 7.0.1, when Global Script Protection is not enabled, allows remote attackers to inject arbitrary HTML and web script via unknown vectors, possibly related to Linkdirect.cfm, Topnav.cfm, and Welcomedoc.cfm. | [] |
|
GHSA-hhqm-f4m4-pq39 | RaspAP raspap-webgui Command Injection vulnerability | Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form. | [] |
GHSA-9hqw-38w2-29xc | A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the VRED Design application. Exploitation of this vulnerability may lead to code execution. | [] |
|
GHSA-2xqh-v5fc-3q4g | Unrestricted file upload vulnerability in upload/upload.php in Japanese PHP Gallery Hosting, when Open directory mode is enabled, allows remote attackers to upload and execute arbitrary PHP code via a ServerPath parameter specifying a filename with a double extension. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2024-9710 | PostHog database_schema Server-Side Request Forgery Information Disclosure Vulnerability | PostHog database_schema Server-Side Request Forgery Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PostHog. Authentication is required to exploit this vulnerability.
The specific flaw exists within the implementation of the database_schema method. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-25351. | [
"cpe:2.3:a:posthog:posthog:*:*:*:*:*:*:*:*"
] |
GHSA-fr39-wf38-f5w3 | The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks. | [] |
|
CVE-2011-0222 | WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] |
|
GHSA-2hg5-44f2-x8xw | An issue was discovered in Moxa EDR-810 Industrial Secure Router. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access configuration and log files (PRIVILEGE ESCALATION). | [] |
|
CVE-2024-27333 | Kofax Power PDF GIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Kofax Power PDF GIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of GIF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21976. | [] |
GHSA-3p4h-43x6-7rg4 | In the Linux kernel, the following vulnerability has been resolved:ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data()The nullity of sps->cstream should be checked similarly as it is done in
sof_set_stream_data_offset() function.
Assuming that it is not NULL if sps->stream is NULL is incorrect and can
lead to NULL pointer dereference. | [] |
|
CVE-2023-38505 | DietPi-Dashboard Insufficient TLS Handshake Pool | DietPi-Dashboard is a web dashboard for the operating system DietPi. The dashboard only allows for one TLS handshake to be in process at a given moment. Once a TCP connection is established in HTTPS mode, it will assume that it should be waiting for a handshake, and will stay this way indefinitely until a handshake starts or some error occurs. In version 0.6.1, this can be exploited by simply not starting the handshake, preventing any other TLS handshakes from getting through. An attacker can lock the dashboard in a state where it is waiting for a TLS handshake from the attacker, who won't provide it. This prevents any legitimate traffic from getting to the dashboard, and can last indefinitely. Version 0.6.2 has a patch for this issue. As a workaround, do not use HTTPS mode on the open internet where anyone can connect. Instead, put a reverse proxy in front of the dashboard, and have it handle any HTTPS connections. | [
"cpe:2.3:a:dietpi-dashboard_project:dietpi-dashboard:0.6.1:*:*:*:*:rust:*:*"
] |
CVE-2024-31378 | WordPress MailChimp Forms by MailMunch plugin <= 3.2.1 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in MailMunch MailChimp Forms by MailMunch.This issue affects MailChimp Forms by MailMunch: from n/a through 3.2.1.
| [] |
CVE-2013-6979 | The VTY authentication implementation in Cisco IOS XE 03.02.xxSE and 03.03.xxSE incorrectly relies on the Linux-IOS internal-network configuration, which allows remote attackers to bypass authentication by leveraging access to a 192.168.x.2 source IP address, aka Bug ID CSCuj90227. | [
"cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:*"
] |
|
CVE-2004-1145 | Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files. | [
"cpe:2.3:a:ethereal_group:ethereal:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*",
"cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*"
] |
|
GHSA-vcfw-5xfq-9pf2 | A stored cross site scripting (XSS) vulnerability in /administration/settings_registration.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Registration" field. | [] |
|
GHSA-jhff-r4p4-pgxx | The (1) sgetstr and (2) getint functions in Sauerbraten 2006_02_28, as derived from the Cube engine, allow remote attackers to cause a denial of service (segmentation fault) via long streams of input data that trigger an out-of-bounds read, as demonstrated using SV_EXT tag data in the Cube engine, which is not properly handled by getint. | [] |
|
GHSA-5vg3-7h25-fmw4 | SQL injection vulnerability in authcheck.php in warforge.NEWS 1.0, with magic_quotes_gpc disabled, allows remote attackers to execute arbitrary SQL commands via the (1) authusername and possibly the (2) authpassword cookie. | [] |
|
CVE-2021-20674 | Untrusted search path vulnerability in Installer of MagicConnect Client program distributed before 2021 March 1 allows an attacker to gain privileges and via a Trojan horse DLL in an unspecified directory and to execute arbitrary code with the privilege of the user invoking the installer when a terminal is connected remotely using Remote desktop. | [
"cpe:2.3:a:ntt-tx:magicconnect:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-5742 | CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
vulnerability exists when an authenticated user modifies configuration parameters on the web server | [] |
|
GHSA-3xp5-27h2-jqvx | Integer overflow in the Shockwave 3D Asset x32 component in Adobe Shockwave Player before 11.6.0.626 allows remote attackers to execute arbitrary code via a crafted subrecord in a DEMX chunk, which triggers a heap-based buffer overflow. | [] |
|
CVE-2019-17189 | totemodata 3.0.0_b936 has XSS via a folder name. | [
"cpe:2.3:a:totemo:totemodata:3.0.0_b936:*:*:*:*:*:*:*"
] |
|
CVE-2022-35977 | Integer overflow in certain command arguments can drive Redis to OOM panic | Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*"
] |
GHSA-c83p-437r-fpv6 | A vulnerability classified as critical was found in Telecommunication Software SAMwin Contact Center Suite 5.1. This vulnerability affects the function passwordScramble in the library SAMwinLIBVB.dll of the component Password Handler. Incorrect implementation of a hashing function leads to predictable authentication possibilities. Upgrading to version 6.2 is able to address this issue. It is recommended to upgrade the affected component. | [] |
|
GHSA-fh6v-2hrq-2w9g | Buffer overflow in Pegasus Mail 3.11 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long email message containing binary data. | [] |
|
GHSA-qxwj-fm5r-rhx8 | Improper input validation in Algosec FireFlow VisualFlow workflow editor via Name, Description and Configuration File field in version A32.20, A32.50, A32.60 allows an attacker to initiate an XSS attack by injecting malicious executable scripts into the code of application. Fixed in version A32.20 (b600 and
above), A32.50 (b430 and
above), A32.60 (b250 and
above) | [] |
|
GHSA-pmrx-695r-4349 | dbt allows Binding to an Unrestricted IP Address via socketsocket | SummaryBinding to `INADDR_ANY (0.0.0.0)` or `IN6ADDR_ANY (::)` exposes an application on all network interfaces, increasing the risk of unauthorized access.While doing some static analysis and code inspection, I found the following code binding a socket to `INADDR_ANY` by passing `""` as the address. This effectively binds to any network interface on the local system, not just localhost (127.0.0.1).DetailsAs stated in the Python docs, a special form for address is accepted instead of a host address: `''` represents `INADDR_ANY`, equivalent to `"0.0.0.0"`. On systems with IPv6, '' represents `IN6ADDR_ANY`, which is equivalent to `"::"`.https://github.com/dbt-labs/dbt-core/blob/main/core/dbt/task/docs/serve.py#L23C38-L23C39The text around this code also imply the intention is to host docs only on localhost.PoCTo recreate, run the docs ServeTask.run() to stand up the HTTP server. Then run `netstat` to see what addresses this process is bound.ImpactA user who serves docs on an unsecured public network, may unknowingly be hosting an unsecured (http) web site for any remote user/system to access on the same network.Further references:
https://docs.python.org/3/library/socket.html#socket-families
https://docs.securesauce.dev/rules/PY030
https://cwe.mitre.org/data/definitions/1327.htmlPatchesThe issue has has been mitigated in [dbt-core v1.6.15](https://github.com/dbt-labs/dbt-core/releases/tag/v1.6.15), [dbt-core v1.7.15](https://github.com/dbt-labs/dbt-core/releases/tag/v1.7.15), and [dbt-core v1.8.1](https://github.com/dbt-labs/dbt-core/releases/tag/v1.8.1) by binding to localhost explicitly by default in `dbt docs serve` (https://github.com/dbt-labs/dbt-core/issues/10209). | [] |
GHSA-6qmw-fm65-3cg3 | Incorrect security UI in PWAs in Google Chrome prior to 84.0.4147.89 allowed a remote attacker who had persuaded the user to install a PWA to spoof the contents of the Omnibox (URL bar) via a crafted PWA. | [] |
|
CVE-2016-0103 | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0102, CVE-2016-0106, CVE-2016-0108, CVE-2016-0109, and CVE-2016-0114. | [
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] |
|
GHSA-2wqv-jwmj-rrvv | DPEC Online Courseware allows an attacker to change another user's password without knowing the original password. | [] |
|
GHSA-5hv4-qhm2-g82w | Heap-based buffer overflow in the Key Distribution Center (KDC) in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a certain valid TCP or UDP request. | [] |
|
GHSA-j2q4-4x34-58rx | An arbitrary file upload and directory traversal vulnerability exists in the file upload functionality of DownloadFileServlet in Draytek VigorConnect 1.6.0-B3. An unauthenticated attacker could leverage this vulnerability to upload files to any location on the target operating system with root privileges. | [] |
|
GHSA-wqqq-56cg-6762 | In WindowManager, there is a possible way to start non-exported and protected activities due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-205996115 | [] |
|
CVE-2005-1677 | Unknown vulnerability in Groove Virtual Office before 3.1 build 2338, before 3.1a build 2364, and Groove Workspace before 2.5n build 1871 allows remote attackers to bypass restrictions on COM objects. | [
"cpe:2.3:a:groove:groove_workspace:*:*:*:*:*:*:*:*",
"cpe:2.3:a:groove:virtual_office:*:*:*:*:*:*:*:*"
] |
|
GHSA-f3w5-37vq-pj32 | LoboEvolution version < 9b75694cedfa4825d4a2330abf2719d470c654cd contains a XML External Entity (XXE) vulnerability in XML Parsing when viewing the XML file in the browser that can result in disclosure of confidential data, denial of service, server side request forgery. This attack appear to be exploitable via Specially crafted XML file. | [] |
|
GHSA-q887-j27x-jj4x | A vulnerability classified as problematic has been found in Campcodes Legal Case Management System 1.0. Affected is an unknown function of the file /admin/judge. The manipulation of the argument judge_name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263808. | [] |
|
GHSA-3pw3-6rxr-cp65 | An exploitable Information Disclosure vulnerability exists in the ACEManager EmbeddedAceGet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The EmbeddedAceTLGet_Task.cgi executable is used to retrieve MSCII configuration values within the configuration manager of the AirLink ES450. This binary does not have any restricted configuration settings, so once the MSCIID is discovered, any authenticated user can send configuration changes using the /cgi-bin/Embedded_Ace_TLGet_Task.cgi endpoint. | [] |
|
GHSA-56w8-jpp8-hv9x | In camera driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862973; Issue ID: ALPS05862973. | [] |
|
CVE-2018-14015 | The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin/dwarf.c. | [
"cpe:2.3:a:radare:radare2:2.7.0:*:*:*:*:*:*:*"
] |
|
GHSA-qw4x-f4hv-xh4w | SQL injection vulnerability in liste.php in ID-Commerce 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the idFamille parameter. | [] |
|
CVE-2024-41773 | IBM Global Configuration Management incorrect ownership assignment | IBM Global Configuration Management 7.0.2 and 7.0.3 could allow an authenticated user to archive a global baseline due to improper access controls. | [
"cpe:2.3:a:ibm:global_configuration_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:global_configuration_management:7.0.3:*:*:*:*:*:*:*"
] |
CVE-2020-36370 | Stack overflow vulnerability in parse_unary Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file. | [
"cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*"
] |
|
CVE-2023-21454 | Improper authorization in Samsung Keyboard prior to SMR Mar-2023 Release 1 allows physical attacker to access users text history on the lockscreen. | [
"cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*"
] |
|
GHSA-wrhq-63m5-3pfr | A vulnerability in Red Lion Europe mbNET/mbNET.rokey and Helmholz REX 200 and REX 250 devices with firmware lower 7.3.2 allows an
authenticated remote attacker to store an arbitrary JavaScript payload on the diagnosis page of the device.
That page is loaded immediately after login in to the device and runs the stored payload, allowing the
attacker to read and write browser data and reduce system performance. | [] |
|
GHSA-6jp8-vgw3-8h23 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codexpert, Inc CoDesigner WooCommerce Builder for Elementor allows Stored XSS.This issue affects CoDesigner WooCommerce Builder for Elementor: from n/a through 4.7.17.2. | [] |
|
GHSA-c5x8-wmm9-q2mc | Directory traversal vulnerability in Groupmax World Wide Web (GmaxWWW) 2 and 3, and Desktop 5, 6, and Desktop for Jichitai allows remote authenticated users to read arbitrary .html files via the template name parameter. | [] |
|
CVE-2016-9126 | Revive Adserver before 3.2.3 suffers from persistent XSS. Usernames are not properly escaped when displayed in the audit trail widget of the dashboard upon login, allowing persistent XSS attacks. An authenticated user with enough privileges to create other users could exploit the vulnerability to access the administrator account. | [
"cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-6089 | Multiple stack-based buffer overflows in the canoniseFileName function in os/pl-os.c in SWI-Prolog before 6.2.5 and 6.3.x before 6.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted filename. | [
"cpe:2.3:a:swi-prolog:swi-prolog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.50:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.51:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.52:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.53:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.54:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.55:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.56:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.57:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.58:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.59:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.61:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.62:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.63:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.6.64:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:5.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:swi-prolog:swi-prolog:6.3.6:*:*:*:*:*:*:*"
] |
|
CVE-2002-1880 | LokwaBB 1.2.2 allows remote attackers to read arbitrary messages by modifying the pmid parameter to pm.php. | [
"cpe:2.3:a:lokwa:lokwabb:1.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2006-7195 | Cross-site scripting (XSS) vulnerability in implicit-objects.jsp in Apache Tomcat 5.0.0 through 5.0.30 and 5.5.0 through 5.5.17 allows remote attackers to inject arbitrary web script or HTML via certain header values. | [
"cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*"
] |
|
GHSA-rv49-vc49-4rpp | nopCommerce 4.50.1 is vulnerable to Cross Site Scripting (XSS). At Apply for vendor account feature, an attacker can upload an arbitrary file to the system. | [] |
|
CVE-2001-1410 | Internet Explorer 6 and earlier allows remote attackers to create chromeless windows using the Javascript window.createPopup method, which could allow attackers to simulate a victim's display and conduct unauthorized activities or steal sensitive data via social engineering. | [
"cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-mgxx-qj86-p4ch | The Tutor LMS – eLearning and online course solution WordPress plugin before 1.9.2 did not escape the Summary field of Announcements (when outputting it in an attribute), which can be created by users as low as Tutor Instructor. This lead to a Stored Cross-Site Scripting issue, which is triggered when viewing the Announcements list, and could result in privilege escalation when viewed by an admin. | [] |
|
GHSA-2rh2-h4h3-63w4 | Multiple cross-site scripting (XSS) vulnerabilities in cms/front_content.php in Contenido before 4.9.6, when advanced mod rewrite (AMR) is disabled, allow remote attackers to inject arbitrary web script or HTML via the (1) idart, (2) lang, or (3) idcat parameter. | [] |
|
GHSA-rh87-q4vg-m45j | TensorFlow vulnerable to integer overflow in math ops | ImpactWhen [`RangeSize`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ops/math_ops.cc) receives values that do not fit into an `int64_t`, it crashes.PatchesWe have patched the issue in GitHub commit [37e64539cd29fcfb814c4451152a60f5d107b0f0](https://github.com/tensorflow/tensorflow/commit/37e64539cd29fcfb814c4451152a60f5d107b0f0).
The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | [] |
GHSA-vwxc-3cfr-37jq | GoLismero symlink attack | libs/updater.py in GoLismero 0.6.3, and other versions before Git revision 2b3bb43d6867, as used in backtrack and possibly other products, allows local users to overwrite arbitrary files via a symlink attack on GoLismero-controlled files, as demonstrated using Admin/changes.dat. | [] |
CVE-2010-4271 | SQL injection vulnerability in ImpressCMS before 1.2.3 RC2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:impresscms:impresscms:*:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.1:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.2:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.3:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.1.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2.1:final:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:impresscms:impresscms:1.2.3:beta:*:*:*:*:*:*"
] |
|
CVE-2024-24476 | A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-58105 | A vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager could allow a local attacker to bypass existing security and execute arbitrary code on affected installations.
This CVE address an addtional bypass not covered in CVE-2024-58104.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [] |
|
CVE-2016-2792 | The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800. | [
"cpe:2.3:a:sil:graphite2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2006-5669 | PHP remote file inclusion vulnerability in gestion/savebackup.php in Gepi 1.4.0 and earlier, and possibly other versions before 1.4.4, allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. | [
"cpe:2.3:a:gepi:gepi:1.4.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-27798 | privileged directory transversal.in Brocade Fabric OS versions 7.4.1.x and 7.3.x | A vulnerability in Brocade Fabric OS versions 7.4.1b and 7.3.1d could allow local users to conduct privileged directory transversal. Brocade Fabric OS versions 7.4.1.x and 7.3.x have reached end of life. Brocade Fabric OS Users should upgrade to supported versions as described in the Product End-of-Life published report. | [
"cpe:2.3:o:broadcom:fabric_operating_system:7.3.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:broadcom:fabric_operating_system:7.4.1b:*:*:*:*:*:*:*"
] |
GHSA-cp4c-qjgv-3j5v | The method PVRSRVBridgePMRPDumpSymbolicAddr allocates puiMemspaceNameInt on the heap, fills the contents of the buffer via PMR_PDumpSymbolicAddr, and then copies the buffer to userspace. The method PMR_PDumpSymbolicAddr may fail, and if it does the buffer will be left uninitialized and despite the error will still be copied to userspace. Kernel leak of uninitialized heap data with no privs required.Product: AndroidVersions: Android SoCAndroid ID: A-236846966 | [] |
|
GHSA-f3m5-ch6q-9pr2 | The LDAP service in Symantec Encryption Management Server (SEMS) 3.3.2 before MP12 allows remote attackers to cause a denial of service (heap memory corruption and service outage) via crafted requests. | [] |
|
CVE-2016-3480 | Unspecified vulnerability in the Solaris Cluster component in Oracle Sun Systems Products Suite 3.3 and 4.3 allows local users to affect confidentiality via vectors related to HA for Postgresql. | [
"cpe:2.3:a:oracle:solaris_cluster:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:solaris_cluster:4.3:*:*:*:*:*:*:*"
] |
|
CVE-2014-3602 | Red Hat OpenShift Enterprise before 2.2 allows local users to obtain IP address and port number information for remote systems by reading /proc/net/tcp. | [
"cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:2.0.1:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:2.0.2:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:2.0.3:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:2.0.4:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:2.0.5:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:2.0.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:2.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:2.1.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:2.1.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:2.1.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:2.1.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:2.1.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:2.1.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:redhat:openshift:2.1.7:*:*:*:enterprise:*:*:*"
] |
|
CVE-2019-12347 | In pfSense 2.4.4-p3, a stored XSS vulnerability occurs when attackers inject a payload into the Name or Description field via an acme_accountkeys_edit.php action. The vulnerability occurs due to input validation errors. | [
"cpe:2.3:a:netgate:pfsense:2.4.4:p3:*:*:*:*:*:*"
] |
|
CVE-2022-32130 | 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/down_resume/total/nature. | [
"cpe:2.3:a:74cms:74cmsse:3.5.1:*:*:*:*:*:*:*"
] |
|
GHSA-gc3c-rwfr-qx72 | There is a permission and access control vulnerability of ZTE's ZXV10 XT802/ET301 product.Attackers with common permissions can log in the terminal web and change the password of the administrator illegally by intercepting requests to change the passwords. | [] |
|
GHSA-cf5r-3pvm-w64w | typo3-appointments vulnerable to Cross-site Scripting | A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The name of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability. | [] |
GHSA-gmr7-jhwx-3h3j | McAfee Total Protection prior to version 16.0.49 contains an uncontrolled search path element vulnerability due to the use of a variable pointing to a subdirectory that may be controllable by an unprivileged user. This may have allowed the unprivileged user to execute arbitrary code with system privileges. | [] |
|
GHSA-pvhj-w3gx-3cqx | Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /classes/Master.php?f=delete_category. | [] |
|
CVE-2024-11903 | WP eCards <= 1.3.904 - Authenticated (Contributor+) Stored Cross-Site Scripting | The WP eCards plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ecard' shortcode in all versions up to, and including, 1.3.904 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
CVE-2024-36440 | An issue was discovered on Swissphone DiCal-RED 4009 devices. An attacker with access to the file /etc/deviceconfig may recover the administrative device password via password-cracking methods, because unsalted MD5 is used. | [
"cpe:2.3:a:swissphone:dical-red:4009:*:*:*:*:*:*:*"
] |
|
CVE-2023-7145 | gopeak MasterLab HTTP POST Request Framework.php sqlInject sql injection | A vulnerability classified as critical was found in gopeak MasterLab up to 3.3.10. This vulnerability affects the function sqlInject of the file app/ctrl/Framework.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249148. | [
"cpe:2.3:a:masterlab:masterlab:*:*:*:*:*:*:*:*"
] |
GHSA-ppc5-qvp7-3j6h | Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. Vulnerable parameters: 1 - "Newsletter" tab, &yith_maintenance_newsletter_submit_label parameter: payload should start with a single quote (') symbol to break the context, i.e.: NOTIFY ME' autofocus onfocus=alert(/Visse/);// v=' - this payload will be auto triggered while admin visits this page/tab. 2 - "General" tab issues, vulnerable parameters: &yith_maintenance_message, &yith_maintenance_custom_style, &yith_maintenance_mascotte, &yith_maintenance_title_font[size], &yith_maintenance_title_font[family], &yith_maintenance_title_font[color], &yith_maintenance_paragraph_font[size], &yith_maintenance_paragraph_font[family], &yith_maintenance_paragraph_font[color], &yith_maintenance_border_top. 3 - "Background" tab issues, vulnerable parameters: &yith_maintenance_background_image, &yith_maintenance_background_color. 4 - "Logo" tab issues, vulnerable parameters: &yith_maintenance_logo_image, &yith_maintenance_logo_tagline, &yith_maintenance_logo_tagline_font[size], &yith_maintenance_logo_tagline_font[family], &yith_maintenance_logo_tagline_font[color]. 5 - "Newsletter" tab issues, vulnerable parameters: &yith_maintenance_newsletter_email_font[size], &yith_maintenance_newsletter_email_font[family], &yith_maintenance_newsletter_email_font[color], &yith_maintenance_newsletter_submit_font[size], &yith_maintenance_newsletter_submit_font[family], &yith_maintenance_newsletter_submit_font[color], &yith_maintenance_newsletter_submit_background, &yith_maintenance_newsletter_submit_background_hover, &yith_maintenance_newsletter_title, &yith_maintenance_newsletter_action, &yith_maintenance_newsletter_email_label, &yith_maintenance_newsletter_email_name, &yith_maintenance_newsletter_submit_label, &yith_maintenance_newsletter_hidden_fields. 6 - "Socials" tab issues, vulnerable parameters: &yith_maintenance_socials_facebook, &yith_maintenance_socials_twitter, &yith_maintenance_socials_gplus, &yith_maintenance_socials_youtube, &yith_maintenance_socials_rss, &yith_maintenance_socials_skype, &yith_maintenance_socials_email, &yith_maintenance_socials_behance, &yith_maintenance_socials_dribble, &yith_maintenance_socials_flickr, &yith_maintenance_socials_instagram, &yith_maintenance_socials_pinterest, &yith_maintenance_socials_tumblr, &yith_maintenance_socials_linkedin. | [] |
|
GHSA-2856-2658-h48j | A stack-based buffer over-read exists in PostScriptFunction::transform in Function.cc in Xpdf 4.01.01 because GfxSeparationColorSpace and GfxDeviceNColorSpace mishandle tint transform functions. It can, for example, be triggered by sending a crafted PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data. | [] |
|
GHSA-4fp8-99qh-27p3 | Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function. | [] |
|
GHSA-qrj3-hrgj-fm7r | rdiffweb's unlimited length email field can lead to DoS | rdiffweb prior to 2.4.8 does not validate email length, allowing users to insert an email longer than 255 characters. If a user signs up with an email with a length of 1 million or more characters and logs in, withdraws, or changes their email, the server may cause denial of service due to overload. Version 2.4.8 sets length limits for username, email, and root directory. | [] |
GHSA-3vf5-967m-jfcw | A CWE-306 "Missing Authentication for Critical Function" in maxprofile/setup/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to factory reset the device via crafted HTTP requests. | [] |
|
CVE-2022-20029 | In cmdq driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05747150; Issue ID: ALPS05747150. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] |
|
GHSA-7j7g-3q5g-7694 | Unspecified vulnerability in the calendar component in Horde Groupware Webmail Edition before 1.0, and Groupware before 1.0, allows remote attackers to include certain files via unspecified vectors. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2024-27899 | Security misconfiguration vulnerability in SAP NetWeaver AS Java User Management Engine | Self-Registration and Modify your own profile in User Admin Application of NetWeaver AS Java does not enforce proper security requirements for the content of the newly defined security answer. This can be leveraged by an attacker to cause profound impact on confidentiality and low impact on both integrity and availability.
| [] |
CVE-2023-4726 | The Ultimate Dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 3.7.7. due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [
"cpe:2.3:a:davidvongries:ultimate_dashboard:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2016-4887 | Cross-site request forgery (CSRF) vulnerability in baserCMS plugin Uploader version 3.0.10 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. | [
"cpe:2.3:a:basercms:basercms:3.0.10:*:*:*:*:*:*:*"
] |
|
GHSA-c8x3-rg72-fwwg | Privilege escalation in Hashicorp Nomad | HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4. | [] |
GHSA-29m6-68fv-pgx2 | Apache Traffic Server before 2.0.1, and 2.1.x before 2.1.2-unstable, does not properly choose DNS source ports and transaction IDs, and does not properly use DNS query fields to validate responses, which makes it easier for man-in-the-middle attackers to poison the internal DNS cache via a crafted response. | [] |
|
CVE-2025-31164 | fig2dev heap-buffer overflow | heap-buffer overflow in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via create_line_with_spline. | [] |
GHSA-jhf6-v54v-3q55 | Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/menu/ via the path=component/menu/&menu_filter=3 parameter. | [] |
|
GHSA-3r2j-2m96-x2cp | Privilege Escalation vulnerability in the command line interface in McAfee Advanced Threat Defense (ATD) 4.x prior to 4.8.2 allows local users to execute arbitrary code via improper access controls on the sudo command. | [] |
|
GHSA-r956-7c4h-fwq7 | An issue was discovered in the Keybase command-line client before 2.8.0-20181023124437 for Linux. An untrusted search path vulnerability in the keybase-redirector application allows a local, unprivileged user on Linux to gain root privileges via a Trojan horse binary. | [] |
|
CVE-2004-0796 | SpamAssassin 2.5x, and 2.6x before 2.64, allows remote attackers to cause a denial of service via certain malformed messages. | [
"cpe:2.3:a:spamassassin:spamassassin:2.40:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:2.41:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:2.42:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:2.43:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:2.44:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:2.50:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:2.55:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:spamassassin:spamassassin:2.63:*:*:*:*:*:*:*"
] |
|
GHSA-mhhp-c3cm-2r86 | Test code in published microsoft-graph-core package exposes phpinfo() | ImpactThe Microsoft Graph Core PHP SDK published packages which contained test code that enabled the use of the phpInfo() function from any application that could access and execute the file at vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php. The phpInfo function exposes system information.The vulnerability affects the GetPhpInfo.php script of the PHP SDK which contains a call to the phpinfo() function.This vulnerability requires a misconfiguration of the server to be present so it can be exploited. For example, making the PHP application’s /vendor directory web accessible.The combination of the vulnerability and the server misconfiguration would allow an attacker to craft an HTTP request that executes the phpinfo() method. The attacker would then be able to get access to system information like configuration, modules, and environment variables and later on use the compromised secrets to access additional data.PatchesThis problem has been patched in version 2.0.2.WorkaroundsIf an immediate deployment with the updated vendor package is not available, you can perform the following temporary workarounds:delete the vendor/microsoft/microsoft-graph-core/tests/GetPhpInfo.php fileremove access to the /vendor directory will remove this vulnerabilitydisable the phpinfo functionReferencesFor more information about the vulnerability and the patch, users can refer to the following sources:https://nvd.nist.gov/vuln/detail/CVE-2023-49103https://github.com/microsoftgraph/msgraph-beta-sdk-php/compare/2.0.0...2.0.1https://github.com/microsoftgraph/msgraph-sdk-php-core/compare/2.0.1...2.0.2https://github.com/microsoftgraph/msgraph-sdk-php/compare/1.109.0...1.109.1https://owncloud.com/security-advisories/disclosure-of-sensitive-credentials-and-configuration-in-containerized-deployments/ | [] |
GHSA-fvhw-w3qc-hw2r | A vulnerability classified as problematic was found in Grocy up to 4.2.0. This vulnerability affects unknown code of the file /api/files/recipepictures/ of the component SVG File Upload Handler. The manipulation of the argument force_serve_as with the input picture' leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. NOTE: The project maintainer explains that "this is 'nonsense' and practically irrelevant according to the project's security policy" which expects additional authentication for the software. | [] |
|
GHSA-4h65-5qp6-cgrp | The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Name and Comment field when commenting on photo gallery entries in all versions up to, and including, 26.0.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2022-30816 | elitecms 1.01 is vulnerable to SQL Injection via /admin/edit_sidebar.php. | [
"cpe:2.3:a:elitecms:elite_cms:1.01:*:*:*:-:*:*:*"
] |
|
GHSA-jxmc-6r2r-2hx5 | The CoreProcesses component in Apple Mac OS X 10.7 before 10.7.2 does not prevent a system window from receiving keystrokes in the locked-screen state, which might allow physically proximate attackers to bypass intended access restrictions by typing into this window. | [] |
|
GHSA-fv92-fjc5-jj9h | mapstructure May Leak Sensitive Information in Logs When Processing Malformed Data | SummaryUse of this library in a security-critical context may result in leaking sensitive information, if used to process sensitive fields.DetailsOpenBao (and presumably HashiCorp Vault) have surfaced error messages from `mapstructure` as follows:https://github.com/openbao/openbao/blob/98c3a59c040efca724353ca46ca79bd5cdbab920/sdk/framework/field_data.go#L43-L50where this calls `mapstructure.WeakDecode(...)`: https://github.com/openbao/openbao/blob/98c3a59c040efca724353ca46ca79bd5cdbab920/sdk/framework/field_data.go#L181-L193Notably, `WeakDecode(...)` eventually calls one of the decode helpers, which surfaces the original value:https://github.com/go-viper/mapstructure/blob/1a66224d5e54d8757f63bd66339cf764c3292c21/mapstructure.go#L679-L686https://github.com/go-viper/mapstructure/blob/1a66224d5e54d8757f63bd66339cf764c3292c21/mapstructure.go#L726-L730https://github.com/go-viper/mapstructure/blob/1a66224d5e54d8757f63bd66339cf764c3292c21/mapstructure.go#L783-L787& more.PoCTo reproduce with OpenBao:and in a new tab:ImpactThis is an information disclosure bug with little mitigation. See https://discuss.hashicorp.com/t/hcsec-2025-09-vault-may-expose-sensitive-information-in-error-logs-when-processing-malformed-data-with-the-kv-v2-plugin/74717 for a previous version. That version was fixed, but this is in the second part of that error message (starting at `'' expected a map, got 'string'` -- when the field type is `string` and a `map` is provided, we see the above information leak -- the previous example had a `map` type field with a `string` value provided).This was rated 4.5 Medium by HashiCorp in the past iteration. | [] |
CVE-2012-6513 | Cross-site scripting (XSS) vulnerability in index.php/Admin_Preferences in gpEasy CMS 2.3.3 allows remote attackers to inject arbitrary web script or HTML via the jsoncallback parameter. | [
"cpe:2.3:a:gpeasy:gpeasy_cms:2.3.3:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.