Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2018-11027
A reflected XSS vulnerability on Ruckus ICX7450-48 devices allows remote attackers to inject arbitrary web script or HTML.
[ "cpe:2.3:o:ruckussecurity:icx7450-48_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ruckussecurity:icx7450-48:-:*:*:*:*:*:*:*" ]
CVE-2018-16472
A prototype pollution attack in cached-path-relative versions <=1.0.1 allows an attacker to inject properties on Object.prototype which are then inherited by all the JS objects through the prototype chain causing a DoS attack.
[ "cpe:2.3:a:cached-path-relative_project:cached-path-relative:*:*:*:*:*:node.js:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
CVE-2023-3088
The WP Mail Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:wpvibes:wp_mail_log:*:*:*:*:*:wordpress:*:*" ]
CVE-2022-28025
Student Grading System v1.0 was discovered to contain a SQL injection vulnerability via /student-grading-system/rms.php?page=school_year.
[ "cpe:2.3:a:student_grading_system_project:student_grading_system:1.0:*:*:*:*:*:*:*" ]
GHSA-p53r-qcgq-cr5q
The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.
[]
GHSA-2gg5-p9w4-vr2g
Teraway FileStream 1.0 allows remote attackers to bypass authentication and gain administrative access by setting the twFSadmin cookie to 1.
[]
CVE-2024-56192
In wl_notify_gscan_event of wl_cfgscan.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
GHSA-8vq3-x8qc-6gpc
RIOT through 2019.07 contains a memory leak in the TCP implementation (gnrc_tcp), allowing an attacker to consume all memory available for network packets and thus effectively stopping all network threads from working. This is related to _receive in sys/net/gnrc/transport_layer/tcp/gnrc_tcp_eventloop.c upon receiving an ACK before a SYN.
[]
CVE-2023-23534
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5. Processing a maliciously crafted image may result in disclosure of process memory.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
GHSA-qwx7-fp8p-2j3c
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
[]
CVE-2019-15804
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. The menu is believed to be accessible using a serial console.
[ "cpe:2.3:o:zyxel:gs1900-8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-8:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1900-8hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-8hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-10hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1900-16_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-16:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1900-24e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-24e:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1900-24_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-24:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1900-24hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-24hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1900-48_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-48:-:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:gs1900-48hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:gs1900-48hp:-:*:*:*:*:*:*:*" ]
CVE-2010-4576
browser/worker_host/message_port_dispatcher.cc in Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 does not properly handle certain postMessage calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted JavaScript code that creates a web worker.
[ "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-566w-735r-v996
IBM Rational ClearQuest 7.1.x before 7.1.2.7 and 8.x before 8.0.0.3, when ClearQuest Authentication is enabled, allows remote authenticated users to read password hashes via a user query.
[]
CVE-2017-13854
An issue was discovered in certain Apple products. iOS before 11 is affected. macOS before 10.13 is affected. tvOS before 11 is affected. watchOS before 4 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
GHSA-9c22-pwxw-p6hx
OpenZeppelin Contracts initializer reentrancy may lead to double initialization
ImpactInitializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call.Once an initializer has finished running it can never be re-executed. However, an exception put in place to support multiple inheritance made reentrancy possible in the scenario described above, breaking the expectation that there is a single execution.Note that upgradeable proxies are commonly initialized together with contract creation, where reentrancy is not feasible, so the impact of this issue is believed to be minor.PatchesA fix is included in the version v4.4.1 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.WorkaroundsAvoid untrusted external calls during initialization.Referenceshttps://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006CreditsThis issue was identified and reported by @chaitinblockchain through [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/).For more informationIf you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at [email protected].
[]
GHSA-x78g-cfg5-7fhx
An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to an 8 byte out of bounds write in the asm_parse_directive function in tccasm.c.
[]
CVE-2018-10944
The request_dividend function of a smart contract implementation for ROC (aka Rasputin Online Coin), an Ethereum ERC20 token, allows attackers to steal all of the contract's Ether.
[ "cpe:2.3:a:rasputinonline:rasputin_online_coin:-:*:*:*:*:*:*:*" ]
GHSA-p8w2-9cmv-c9gc
InDesign Desktop versions ID18.5.3, ID19.5 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
GHSA-pjqh-q2j4-8c7q
An improper input validation vulnerability was discovered in the NTP server configuration field of the Network-M2 card. This could result in an authenticated high privileged user having the ability to execute arbitrary commands. The vulnerability has been resolved in the version 3.0.4. Note - Network-M2 has been declared end-of-life in early 2024 and Network-M3 has been released as a fit-and-functional replacement.
[]
GHSA-v77x-qc2p-7878
The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id.
[]
GHSA-r4xh-hp7q-826q
An issue in minCal v.1.0.0 allows a remote attacker to execute arbitrary code via a crafted script to the customer_data parameter.
[]
CVE-2024-37620
PHPVOD v4.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /view/admin/view.php.
[]
CVE-2010-5198
Multiple untrusted search path vulnerabilities in Intuit QuickBooks 2010 allow local users to gain privileges via a Trojan horse (1) dbicudtx11.dll, (2) mfc90enu.dll, or (3) mfc90loc.dll file in the current working directory, as demonstrated by a directory that contains a .des, .qbo, or .qpg file. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:intuit:quickbooks:2010:*:*:*:*:*:*:*" ]
GHSA-rxw2-fh82-mfcc
A vulnerability in the vDaemon process in Cisco IOS XE SD-WAN Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected device. This vulnerability is due to insufficient bounds checking when an affected device processes traffic. An attacker could exploit this vulnerability by sending crafted traffic to the device. A successful exploit could allow the attacker to cause a buffer overflow and possibly execute arbitrary commands with root-level privileges, or cause the device to reload, which could result in a denial of service condition.
[]
CVE-2023-37143
ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function BackwardPass::IsEmptyLoopAfterMemOp().
[ "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*" ]
CVE-2018-13399
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
[ "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*" ]
GHSA-m8hg-ff53-qj52
An issue was discovered on Epson WorkForce WF-2861 10.48 LQ22I3, 10.51.LQ20I6 and 10.52.LQ17IA devices. They use SNMP to find certain devices on the network, but the default version is v2c, allowing an amplification attack.
[]
CVE-2007-4181
PHP remote file inclusion vulnerability in data/inc/theme.php in Pluck 4.3, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the dir parameter. NOTE: A reliable third party disputes this vulnerability because the applicable include is within a function that does not receive the dir parameter from an HTTP request
[ "cpe:2.3:a:pluck:pluck:4.3:*:*:*:*:*:*:*" ]
GHSA-rcj3-r74w-96hp
The Community by PeepSo – Social Network, Membership, Registration, User Profiles plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 6.4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
GHSA-2qwc-x3pr-2jgf
Heap-based buffer overflow in GTKSee 0.5 and 0.5.1 allows remote attackers to execute arbitrary code via a PNG image of certain color depths.
[]
GHSA-6xv5-5crc-p22v
SQL injection vulnerability in index.php in BXCP 0.299 allows remote attackers to execute arbitrary SQL commands via the tid parameter.
[]
CVE-2021-20175
Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext
[ "cpe:2.3:o:netgear:r6700_firmware:1.0.4.120:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*" ]
CVE-2007-2979
Techno Dreams Web Directory / Search Engine 2.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for Database.mdb.
[ "cpe:2.3:a:techno_dreams:web_directory:2.0:*:*:*:*:*:*:*" ]
CVE-2014-1400
The entity_access API in the Entity API module 7.x-1.x before 7.x-1.3 for Drupal might allow remote authenticated users to bypass intended access restrictions and read unpublished comments via unspecified vectors.
[ "cpe:2.3:a:entity_api_project:entity_api:7.x-1.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:entity_api_project:entity_api:7.x-1.1:*:*:*:*:drupal:*:*", "cpe:2.3:a:entity_api_project:entity_api:7.x-1.2:*:*:*:*:drupal:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*" ]
GHSA-5f5r-65pm-r3wr
ChakraCore RCE Vulnerability
ChakraCore allows an attacker to execute arbitrary code in the context of the current user, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11918, and CVE-2017-11930.
[]
GHSA-g635-4v3q-xmrq
Seacms <=13.3 is vulnerable to SQL Injection in admin_reslib.php.
[]
GHSA-fx7p-34hm-2cm5
In bPanel 2.0, the administrative ajax endpoints (aka ajax/aj_*.php) are accessible without authentication and allow SQL injections, which could lead to platform compromise.
[]
CVE-2023-4168
Templatecookie Adlisting Redirect ad-list information disclosure
A vulnerability was found in Templatecookie Adlisting 2.14.0. It has been classified as problematic. Affected is an unknown function of the file /ad-list of the component Redirect Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-236184. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:templatecookie:adlisting:2.14.0:*:*:*:*:*:*:*" ]
GHSA-x3cr-cmr6-6r74
A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software image on an affected device. The vulnerability exists because software digital signatures are not properly verified during CLI command execution. An attacker could exploit this vulnerability to install an unsigned software image on an affected device.
[]
CVE-2023-28733
Stored XSS affecting the AcyMailing plugin for Joomla
AnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.
[ "cpe:2.3:a:acymailing:acymailing:*:*:*:*:*:joomla\\!:*:*" ]
GHSA-c5v2-x8pv-3r93
In the Linux kernel, the following vulnerability has been resolved:RDMA/irdma: Fix drain SQ hang with no completionSW generated completions for outstanding WRs posted on SQ after QP is in error target the wrong CQ. This causes the ib_drain_sq to hang with no completion.Fix this to generate completions on the right CQ.[ 863.969340] INFO: task kworker/u52:2:671 blocked for more than 122 seconds. [ 863.979224] Not tainted 5.14.0-130.el9.x86_64 #1 [ 863.986588] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 863.996997] task:kworker/u52:2 state:D stack: 0 pid: 671 ppid: 2 flags:0x00004000 [ 864.007272] Workqueue: xprtiod xprt_autoclose [sunrpc] [ 864.014056] Call Trace: [ 864.017575] __schedule+0x206/0x580 [ 864.022296] schedule+0x43/0xa0 [ 864.026736] schedule_timeout+0x115/0x150 [ 864.032185] __wait_for_common+0x93/0x1d0 [ 864.037717] ? usleep_range_state+0x90/0x90 [ 864.043368] __ib_drain_sq+0xf6/0x170 [ib_core] [ 864.049371] ? __rdma_block_iter_next+0x80/0x80 [ib_core] [ 864.056240] ib_drain_sq+0x66/0x70 [ib_core] [ 864.062003] rpcrdma_xprt_disconnect+0x82/0x3b0 [rpcrdma] [ 864.069365] ? xprt_prepare_transmit+0x5d/0xc0 [sunrpc] [ 864.076386] xprt_rdma_close+0xe/0x30 [rpcrdma] [ 864.082593] xprt_autoclose+0x52/0x100 [sunrpc] [ 864.088718] process_one_work+0x1e8/0x3c0 [ 864.094170] worker_thread+0x50/0x3b0 [ 864.099109] ? rescuer_thread+0x370/0x370 [ 864.104473] kthread+0x149/0x170 [ 864.109022] ? set_kthread_struct+0x40/0x40 [ 864.114713] ret_from_fork+0x22/0x30
[]
CVE-2003-0447
The Custom HTTP Errors capability in Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to execute script in the Local Zone via an argument to shdocvw.dll that causes a "javascript:" link to be generated.
[ "cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*" ]
CVE-2015-2595
Unspecified vulnerability in the Oracle OLAP component in Oracle Database Server 12.1.0.1 and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
[ "cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*" ]
CVE-2020-21480
An arbitrary file write vulnerability in RGCMS v1.06 allows attackers to execute arbitrary code via a crafted PHP file.
[ "cpe:2.3:a:rgcms_project:rgcms:1.06:*:*:*:*:*:*:*" ]
GHSA-vcpx-p674-q774
Cross-site scripting (XSS) vulnerability in the Enterprise Admin Session Monitoring component in Liferay Portal 4.3.6 allows remote authenticated users to inject arbitrary web script or HTML via the User-Agent HTTP header.
[]
GHSA-f94q-cpgx-pcjr
The mintToken function of a smart contract implementation for ETHEREUMBLACK (ETCBK), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
CVE-2003-1302
The IMAP functionality in PHP before 4.3.1 allows remote attackers to cause a denial of service via an e-mail message with a (1) To or (2) From header with an address that contains a large number of "\" (backslash) characters.
[ "cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*" ]
GHSA-6cmv-m333-v5r3
Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)
[]
CVE-2023-51448
SQL Injection vulnerability when managing SNMP Notification Receivers
Cacti provides an operational monitoring and fault management framework. Version 1.2.25 has a Blind SQL Injection (SQLi) vulnerability within the SNMP Notification Receivers feature in the file `‘managers.php’`. An authenticated attacker with the “Settings/Utilities” permission can send a crafted HTTP GET request to the endpoint `‘/cacti/managers.php’` with an SQLi payload in the `‘selected_graphs_array’` HTTP GET parameter. As of time of publication, no patched versions exist.
[ "cpe:2.3:a:cacti:cacti:1.2.25:*:*:*:*:*:*:*" ]
GHSA-542f-549f-58vm
A stored cross-site scripting (XSS) vulnerability in the Create A New Employee function of Granding UTime Master v9.0.7-Build:Apr 4,2023 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the First Name parameter.
[]
GHSA-6fq9-54h2-m54q
SQL injection vulnerability in Prestashop opartplannedpopup 1.4.11 and earlier allows remote attackers to run arbitrary SQL commands via OpartPlannedPopupModuleFrontController::prepareHook() method.
[]
CVE-2017-13270
A elevation of privilege vulnerability in the upstream kernel mnh_sm driver. Product: Android. Versions: Android kernel. Android ID: A-69474744.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
GHSA-cqfm-vfh2-jprp
A vulnerability was found in Linux kernel's, versions up to 3.10, implementation of overlayfs. An attacker with local access can create a denial of service situation via NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c. This can allow attackers with ability to create directories on overlayfs to crash the kernel creating a denial of service (DOS).
[]
CVE-2012-2064
Cross-site scripting (XSS) vulnerability in theme/views_lang_switch.theme.inc in the Views Language Switcher module before 7.x-1.2 for Drupal allows remote attackers to inject arbitrary web script or HTML via the q parameter.
[ "cpe:2.3:a:mark_theunissen:views_lang_switch:*:*:*:*:*:*:*:*", "cpe:2.3:a:mark_theunissen:views_lang_switch:7.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mark_theunissen:views_lang_switch:7.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
GHSA-j79j-qx45-g3gp
Eval injection vulnerability in adodb-perf-module.inc.php in ADOdb Lite 1.42 and earlier, as used in products including CMS Made Simple, SAPID CMF, Journalness, PacerCMS, and Open-Realty, allows remote attackers to execute arbitrary code via PHP sequences in the last_module parameter.
[]
GHSA-3hx8-4hp2-whqv
A Command Injection vulnerability has been identified in the MiVoice Office 400 SMB Controller through 1.2.5.23 which could allow a malicious actor to execute arbitrary commands within the context of the system.
[]
CVE-2024-56719
net: stmmac: fix TSO DMA API usage causing oops
In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix TSO DMA API usage causing oops Commit 66600fac7a98 ("net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data") moved the assignment of tx_skbuff_dma[]'s members to be later in stmmac_tso_xmit(). The buf (dma cookie) and len stored in this structure are passed to dma_unmap_single() by stmmac_tx_clean(). The DMA API requires that the dma cookie passed to dma_unmap_single() is the same as the value returned from dma_map_single(). However, by moving the assignment later, this is not the case when priv->dma_cap.addr64 > 32 as "des" is offset by proto_hdr_len. This causes problems such as: dwc-eth-dwmac 2490000.ethernet eth0: Tx DMA map failed and with DMA_API_DEBUG enabled: DMA-API: dwc-eth-dwmac 2490000.ethernet: device driver tries to +free DMA memory it has not allocated [device address=0x000000ffffcf65c0] [size=66 bytes] Fix this by maintaining "des" as the original DMA cookie, and use tso_des to pass the offset DMA cookie to stmmac_tso_allocator(). Full details of the crashes can be found at: https://lore.kernel.org/all/[email protected]/ https://lore.kernel.org/all/klkzp5yn5kq5efgtrow6wbvnc46bcqfxs65nz3qy77ujr5turc@bwwhelz2l4dw/
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*" ]
GHSA-xf4h-xf8g-mqjv
IBM Sametime Enterprise Meeting Server 8.5.2 and 9.0 could allow an authenticated user to upload a malicious file to a Sametime meeting room, that could be downloaded by unsuspecting users which could be executed with user privileges. IBM X-Force ID: 111893.
[]
GHSA-99p3-vq6p-j6c8
Multiple SQL injection vulnerabilities in Dominios Europa PICRATE (aka TAL RateMyPic) 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) id, (2) voteid, and (3) vfiel parameters to (a) index.php, and via the (4) nick, (5) email, (6) city, (7) messen, and (8) message form field parameters to (b) add.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[]
CVE-2020-28024
Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.
[ "cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*" ]
GHSA-cf6c-hr52-mgxg
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 has a flaw where Special:UserLogin?returnto=interwiki:foo will redirect to external sites.
[]
CVE-2020-10093
A cross-site scripting (XSS) vulnerability in Lexmark Pro910 series inkjet and other discontinued products.
[ "cpe:2.3:o:lexmark:cs31x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs31x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs41x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs41x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs51x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs51x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx310:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx410:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc2130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2130:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cx510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx510:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xc2132_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2132:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms310:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms312_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms312:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms317_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms317:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms410:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m1140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1140:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms315_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms315:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms415:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms417_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms417:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms51x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms51x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms610dn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms610dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms617_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms617:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m1145_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1145:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m3150dn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m3150dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms610de_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms610de:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m3150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m3150:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms71x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms71x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m5163dn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5163dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms810_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms810:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms811_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms811:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms812_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms812:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms817_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms817:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms818_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms818:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms810de_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms810de:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m5155_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5155:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m5163_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5163:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms812de_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms812de:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:m5170_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5170:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:ms91x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms91x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx31x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx31x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm1135_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1135:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx410:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx510:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx511:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm1140_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1140:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm1145_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1145:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx610_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx610:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx611_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx611:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm3150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3150:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx71x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx71x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx81x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx81x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm51xx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm51xx:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm71xx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm71xx:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx91x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx91x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xm91x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm91x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mx6500e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx6500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c746_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c746:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c748_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c748:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs748_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs748:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c792_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c792:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cs796_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs796:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c925_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c925:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c950_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x548_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x548:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xs548_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs548:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x74x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x74x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xs748_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs748:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x792_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x792:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xs79x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs79x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x925_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x925:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xs925_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs925:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x95x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x95x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:xs95x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs95x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:6500e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c734_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c734:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c736_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c736:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e46x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e46x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:t65x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t65x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x46x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x46x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x65x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x65x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x73x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x73x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:w850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:w850:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x86x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x86x:-:*:*:*:*:*:*:*" ]
GHSA-xqfc-cx8v-9v3h
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2019-0672, CVE-2019-0673, CVE-2019-0675.
[]
CVE-2016-9635
Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'skip count' that goes beyond initialized buffer.
[ "cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
GHSA-g2h8-6m62-5x7q
ping.php in Global Console Manager 16 (GCM16) and Global Console Manager 32 (GCM32) before 1.20.0.22575 on the IBM Avocent 1754 KVM switch allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) count or (2) size parameter.
[]
CVE-2012-1062
Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine Applications Manager 9.x and 10.x allow remote attackers to inject arbitrary web script or HTML via the (1) period parameter to showHistoryData.do; (2) selectedNetwork, (3) network, or (4) group parameters to showresource.do; (5) header parameter to AlarmView.do; or (6) attName parameter to jsp/PopUp_Graph.jsp. NOTE: the Search.do/query vector is already covered by CVE-2008-1566, and the jsp/ThresholdActionConfiguration.jsp redirectto vector is already covered by CVE-2008-0474.
[ "cpe:2.3:a:manageengine:applications_manager:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:manageengine:applications_manager:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:manageengine:applications_manager:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:manageengine:applications_manager:10.3:*:*:*:*:*:*:*", "cpe:2.3:a:manageengine:applications_manager:9:*:*:*:*:*:*:*", "cpe:2.3:a:manageengine:applications_manager:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:manageengine:applications_manager:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:manageengine:applications_manager:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:manageengine:applications_manager:9.4:*:*:*:*:*:*:*", "cpe:2.3:a:manageengine:applications_manager:9.5:*:*:*:*:*:*:*" ]
GHSA-hqxq-qqh3-mqjg
Zoho ManageEngine Desktop Central before 10.0.662 allows authenticated users to obtain sensitive information from the database by visiting the Reports page.
[]
CVE-2016-6271
The Bzrtp library (aka libbzrtp) 1.0.x before 1.0.4 allows man-in-the-middle attackers to conduct spoofing attacks by leveraging a missing HVI check on DHPart2 packet reception.
[ "cpe:2.3:a:bzrtp_project:bzrtp:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bzrtp_project:bzrtp:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bzrtp_project:bzrtp:1.0.3:*:*:*:*:*:*:*" ]
GHSA-253g-4jm3-6p9v
Huawei Honor Magic2 mobile phones with versions earlier than 10.0.0.175(C00E59R2P11) have an information leak vulnerability. Due to a module using weak encryption tool, an attacker with the root permission may exploit the vulnerability to obtain some information.
[]
CVE-2019-14686
A DLL hijacking vulnerability exists in the Trend Micro Security's 2019 consumer family of products (v15) Folder Shield component and the standalone Trend Micro Ransom Buster (1.0) tool in which, if exploited, would allow an attacker to load a malicious DLL, leading to elevated privileges.
[ "cpe:2.3:a:trendmicro:antivirus_\\+_security_2019:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:internet_security_2019:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:maximum_security_2019:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:premium_security_2019:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:ransom_buster:1.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-537j-vgqc-wh26
SQL injection vulnerability found in PrestaShop xipblog v.2.0.1 and before allow a remote attacker to gain privileges via the xipcategoryclass and xippostsclass components.
[]
CVE-2023-5965
Unrestricted Upload of File with Dangerous Type in EspoCRM
An authenticated privileged attacker could upload a specially crafted zip to the EspoCRM server in version 7.2.5, via the update form, which could lead to arbitrary PHP code execution.
[ "cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*" ]
GHSA-gc6m-q9f7-723r
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
CVE-2016-8305
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Core). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0 and 12.2.0. Easily exploitable vulnerability allows physical access to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS v3.0 Base Score 2.1 (Confidentiality impacts).
[ "cpe:2.3:a:oracle:flexcube_universal_banking:11.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:11.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.2.0:*:*:*:*:*:*:*" ]
GHSA-fj3g-r3pf-r284
Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an access of uninitialized pointer, which may allow an attacker read from or write to unexpected memory locations, leading to a denial-of-service.
[]
CVE-2024-11946
iXsystems TrueNAS CORE fetch_plugin_packagesites tar Cleartext Transmission of Sensitive Information Vulnerability
iXsystems TrueNAS CORE fetch_plugin_packagesites tar Cleartext Transmission of Sensitive Information Vulnerability. This vulnerability allows network-adjacent attackers to tamper with firmware update files on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from the use of an insecure protocol to deliver updates. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-25668.
[]
CVE-2022-22256
The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality.
[ "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
CVE-2019-19069
A memory leak in the fastrpc_dma_buf_attach() function in drivers/misc/fastrpc.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering dma_get_sgtable() failures, aka CID-fc739a058d99.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:aff_a700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:fas8300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:fas8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:fas8700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:fas8700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:aff_a400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:aff_a400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*" ]
GHSA-q485-f3ch-xvgp
Directory traversal vulnerability in the "Shell Folders" capability in Microsoft Windows Server 2003 allows remote attackers to read arbitrary files via .. (dot dot) sequences in a "shell:" link.
[]
GHSA-cpg4-gv23-mpmj
An issue has been discovered in GitLab affecting all versions starting from 16.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. Users were capable of linking CI/CD jobs of private projects which they are not a member of.
[]
CVE-2024-53552
CrushFTP 10 before 10.8.3 and 11 before 11.2.3 mishandles password reset, leading to account takeover.
[]
GHSA-x5jp-3jp8-p54v
There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly.
[]
GHSA-qp52-95j5-r3g3
The access controls on the Mobility read-only API improperly validate user access permissions. Attackers with both network access to the API and valid credentials can read data from it; regardless of access control group membership settings. This vulnerability is fixed in Mobility v11.76 and Mobility v12.14.
[]
CVE-2019-2722
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
CVE-2019-15376
The Panasonic Eluga Ray 530 Android device with a build fingerprint of Panasonic/ELUGA_Ray_530/ELUGA_Ray_530:8.1.0/O11019/1531828974:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization.
[ "cpe:2.3:o:panasonic:eluga_ray_530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:panasonic:eluga_ray_530:-:*:*:*:*:*:*:*" ]
CVE-2008-4449
Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message.
[ "cpe:2.3:a:mirc:mirc:6.34:*:*:*:*:*:*:*" ]
GHSA-vmgj-7wpp-x799
A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack or in certain conditions read contents from memory.
[]
CVE-2020-14794
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
CVE-2016-7547
A command execution flaw on the Trend Micro Threat Discovery Appliance 2.6.1062r1 exists with the timezone parameter in the admin_sys_time.cgi interface.
[ "cpe:2.3:a:trendmicro:threat_discovery_appliance:2.6.1062:r1:*:*:*:*:*:*" ]
GHSA-c7vw-5hm7-6vqc
Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2014-8450, CVE-2015-4449, CVE-2015-4450, CVE-2015-5088, and CVE-2015-5092.
[]
CVE-2023-27789
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the cidr2cidr function at the cidr.c:178 endpoint.
[ "cpe:2.3:a:broadcom:tcpreplay:4.4.3:*:*:*:*:*:*:*" ]
CVE-2008-0750
SQL injection vulnerability in philboard_forum.asp in Husrev BlackBoard 2.0.2 allows remote attackers to execute arbitrary SQL commands via the forumid parameter.
[ "cpe:2.3:a:husrev:blackboard:2.0.2:*:*:*:*:*:*:*" ]
CVE-2022-28048
STB v2.27 was discovered to contain an integer shift of invalid size in the component stbi__jpeg_decode_block_prog_ac.
[ "cpe:2.3:a:stb_project:stb:2.27:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
GHSA-v8w8-xx6j-rvqj
Directory traversal vulnerability in download.html in ARWScripts Gallery Script Lite (aka gallery-script-lite or Free Photo Gallery Site Script), as of 20080411, allows remote attackers to read arbitrary local files via directory traversal sequences in the path parameter.
[]
GHSA-fjrm-v8hg-f6jj
The embedded HTTP server in Fuji Xerox Printing Systems (FXPS) print engine, as used in products including (1) Dell 3000cn through 5110cn and (2) Fuji Xerox DocuPrint firmware before 20060628 and Network Option Card firmware before 5.13, does not properly perform authentication for HTTP requests, which allows remote attackers to modify system configuration via crafted requests, including changing the administrator password or causing a denial of service to the print server.
[]
CVE-2018-12805
Adobe Connect versions 9.7.5 and earlier have an Insecure Library Loading vulnerability. Successful exploitation could lead to privilege escalation.
[ "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*" ]
CVE-1999-1557
Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
[ "cpe:2.3:a:ipswitch:imail:*:*:*:*:*:*:*:*" ]
CVE-2017-18680
An issue was discovered on Samsung mobile devices with L(5.0/5.1) and M(6.0) (tablets) software. The lockscreen interface allows Add User actions, leading to an unintended ability to access user data in external storage. The Samsung ID is SVE-2016-7797 (March 2017).
[ "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*" ]
GHSA-rchm-qq78-745r
Improper isolation of shared resources in network on chip for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.
[]
CVE-2022-28028
Simple Real Estate Portal System v1.0 was discovered to contain a SQL injection vulnerability via /reps/classes/Master.php?f=delete_amenity.
[ "cpe:2.3:a:simple_real_estate_portal_system_project:simple_real_estate_portal_system:1.0:*:*:*:*:*:*:*" ]