Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2010-2900
Google Chrome before 5.0.375.125 does not properly handle a large canvas, which has unspecified impact and remote attack vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-rrm2-j9qx-652j
Cross-site scripting (XSS) vulnerability in index.php in telepark.wiki 2.4.23 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
[]
CVE-2024-49553
Media Encoder | Out-of-bounds Write (CWE-787)
Media Encoder versions 25.0, 24.6.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:media_encoder:25.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-7vjj-xv8c-grpq
Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions.
[]
GHSA-2x3g-c9j6-ff9w
The heidi-luong1109/shackerpanel repository through 2021-05-25 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[]
GHSA-f534-3845-rvj6
SOPlanning 1.46.01 allows persistent XSS via the Project Name, Statutes Comment, Places Comment, or Resources Comment field.
[]
CVE-2022-23954
Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service.
[ "cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g6_small_form_factor_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g6_small_form_factor:-:*:*:*:*:*:*:*" ]
GHSA-xcjc-c88c-v52w
CloudLinux CageFS 7.0.8-2 or below insufficiently restricts file paths supplied to the sendmail proxy command. This allows local users to read and write arbitrary files outside the CageFS environment in a limited way.
[]
GHSA-hh37-cm5v-2qrh
Emacs 24.4 allows remote attackers to bypass security restrictions.
[]
CVE-2023-37344
Kofax Power PDF BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Kofax Power PDF BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20441.
[ "cpe:2.3:a:kofax:power_pdf:5.0.0.19:*:*:*:*:*:*:*" ]
CVE-2024-24161
MRCMS 3.0 contains an Arbitrary File Read vulnerability in /admin/file/edit.do as the incoming path parameter is not filtered.
[ "cpe:2.3:a:mrcms:mrcms:3.0:*:*:*:*:*:*:*" ]
CVE-2024-31117
WordPress WooCommerce Bookings Calendar plugin <= 1.0.36 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moises Heberle WooCommerce Bookings Calendar.This issue affects WooCommerce Bookings Calendar: from n/a through 1.0.36.
[]
GHSA-h37x-959w-fc48
JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object.
[]
GHSA-rwf7-652f-76mv
Magento 2 Community Edition vulnerable to Improper Authorization
Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect permissions vulnerability within the Integrations component. This vulnerability could be abused by users with permissions to the Pages resource to delete cms pages via the REST API without authorization.
[]
CVE-2022-26648
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). Affected devices do not properly validate the GET parameter XNo of incoming HTTP requests. This could allow an unauthenticated remote attacker to crash affected devices.
[ "cpe:2.3:o:siemens:scalance_x204-2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x204-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x204-2fm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x204-2fm:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x204-2ld_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x204-2ld:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x204-2ld_ts_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x204-2ld_ts:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x204-2ts_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x204-2ts:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x206-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x206-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x206-1ld_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x206-1ld:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x208_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x208:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x208_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x208_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x212-2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x212-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x212-2ld_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x212-2ld:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x216_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x216:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x224_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x224:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x200-4p_irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x200-4p_irt:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x201-3p_irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x201-3p_irt:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x201-3p_irt_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x201-3p_irt_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x202-2p_irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x202-2p_irt:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x202-2p_irt_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x202-2p_irt_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x204irt_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x204irt_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xf204irt:-:*:*:*:*:*:*:*" ]
GHSA-35gx-vxvr-hvjq
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[]
GHSA-mhm8-j49g-j7wp
The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash).
[]
GHSA-g6hg-4jxh-87cr
Improper log management vulnerability in Galaxy Watch PlugIn prior to version 2.2.05.21033151 allows attacker with log permissions to leak Wi-Fi password connected to the user smartphone within log.
[]
GHSA-4qgp-fhj8-cfm3
IBM Spectrum Scale 5.1.0 through 5.1.3.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 221012.
[]
GHSA-93wh-35r4-6qmw
Moodle allowed some users without permission to view other users' full names
It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
[]
GHSA-f2g5-426f-353q
Cross-site Scripting in Dolibarr
Dolibarr 12.0.5 is vulnerable to Cross Site Scripting (XSS) via Sql Error Page.
[]
CVE-2014-5565
The GadgetTrak Mobile Security (aka com.activetrak.android.app) application 1.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:gadgettrak:gadgettrak_mobile_security:1.6:*:*:*:*:android:*:*" ]
CVE-2017-14322
The function in charge to check whether the user is already logged in init.php in Interspire Email Marketer (IEM) prior to 6.1.6 allows remote attackers to bypass authentication and obtain administrative access by using the IEM_CookieLogin cookie with a specially crafted value.
[ "cpe:2.3:a:interspire:email_marketer:*:*:*:*:*:*:*:*" ]
CVE-2024-32859
Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
[ "cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r16_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r14_ryzen_edition_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r15_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8960_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8960:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8950:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3521:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:aurora_r16_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:aurora_r16:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x14_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x14:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_ryzen_edition_r14_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_ryzen_edition_r14:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r15_amd:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r15:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*" ]
GHSA-7j3c-xq3f-9cr8
AVG Internet Security 2015 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses when protecting user-mode processes, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.
[]
CVE-2021-29323
OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow via the component /modules/network/wifi/esp/modwifi.c.
[ "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*" ]
CVE-2020-12789
The Secure Monitor in Microchip Atmel ATSAMA5 products use a hardcoded key to encrypt and authenticate secure applets.
[ "cpe:2.3:o:microchip:atsama5d21c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d21c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d21c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d21c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d22c-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d22c-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d22c-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d22c-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d22c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d22c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d22c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d22c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d23c-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d23c-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d23c-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d23c-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d23c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d23c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d23c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d23c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d24c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d24c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d24c-cuf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d24c-cuf:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d24c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d24c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d26c-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d26c-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d26c-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d26c-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d26c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d26c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d26c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d26c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cnvao_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cnvao:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-cnrvao_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-cnrvao:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d225c-d1m-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d225c-d1m-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-d5m-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-d5m-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-d5m-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-d5m-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-d1g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-d1g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-d1g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-d1g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-d1g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-d1g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-d1g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-d1g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-ld1g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-ld1g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-ld1g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-ld1g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-ld2g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-ld2g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27c-ld2g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27c-ld2g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-ld1g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-ld1g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-ld1g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-ld1g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-ld2g-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-ld2g-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d28c-ld2g-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d28c-ld2g-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27-wlsom1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27-wlsom1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d27-som1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d27-som1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d31a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d31a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d31a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d31a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d31a-cfu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d31a-cfu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d31a-cfur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d31a-cfur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d33a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d33a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d33a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d33a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d34a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d34a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d34a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d34a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d35a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d35a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d35a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d35a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d35a-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d35a-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d35a-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d35a-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d36a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d36a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d36a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d36a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d36a-cn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d36a-cn:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d36a-cnr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d36a-cnr:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d41a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d41a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d41a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d41a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d41b-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d41b-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d41b-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d41b-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d42a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d42a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d42a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d42a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d42b-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d42b-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d42b-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d42b-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d43a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d43a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d43a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d43a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d43b-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d43b-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d43b-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d43b-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d44a-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d44a-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d44a-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d44a-cur:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d44b-cu_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d44b-cu:-:*:*:*:*:*:*:*", "cpe:2.3:o:microchip:atsama5d44b-cur_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:microchip:atsama5d44b-cur:-:*:*:*:*:*:*:*" ]
CVE-2023-26925
An information disclosure vulnerability exists in the Syslog functionality of D-LINK DIR-882 1.30. A specially crafted network request can lead to the disclosure of sensitive information.
[ "cpe:2.3:o:dlink:dir-882_firmware:1.30:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-882:-:*:*:*:*:*:*:*" ]
CVE-2023-48025
Liblisp through commit 4c65969 was discovered to contain a out-of-bounds-read vulnerability in unsigned get_length(lisp_cell_t * x) at eval.c
[ "cpe:2.3:a:howerj:liblisp:*:*:*:*:*:*:*:*" ]
CVE-2020-1162
An elevation of privilege (user to user) vulnerability exists in Windows Security Health Service when handling certain objects in memory.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1324.
[ "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2025-1592
SourceCodester Best Employee Management System Add Role Page Role.php cross site scripting
A vulnerability was found in SourceCodester Best Employee Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/Operations/Role.php of the component Add Role Page. The manipulation of the argument assign_name/description leads to cross site scripting. The attack may be launched remotely.
[]
CVE-2013-5795
Unspecified vulnerability in the Oracle Demantra Demand Management component in Oracle Supply Chain Products Suite 7.2.0.3 SQL-Server, 7.3.0, 7.3.1, 12.2.1, 12.2.2, and 12.2.3 allows remote attackers to affect confidentiality via unknown vectors related to DM Others.
[ "cpe:2.3:a:oracle:supply_chain_products_suite:7.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.3:*:*:*:*:*:*:*" ]
CVE-2016-6457
A vulnerability in the Cisco Nexus 9000 Series Platform Leaf Switches for Application Centric Infrastructure (ACI) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability affects Cisco Nexus 9000 Series Leaf Switches (TOR) - ACI Mode and Cisco Application Policy Infrastructure Controller (APIC). More Information: CSCuy93241. Known Affected Releases: 11.2(2x) 11.2(3x) 11.3(1x) 11.3(2x) 12.0(1x). Known Fixed Releases: 11.2(2i) 11.2(2j) 11.2(3f) 11.2(3g) 11.2(3h) 11.2(3l) 11.3(0.236) 11.3(1j) 11.3(2i) 11.3(2j) 12.0(1r).
[ "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:11.2\\(2g\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:11.2\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:11.2\\(2i\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:11.2\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:11.2\\(3e\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:11.2\\(3h\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:11.3\\(1i\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:11.3\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:11.3\\(2h\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:11.3\\(2i\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:12.0\\(1m\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:12.0\\(1n\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:12.0\\(1o\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:12.0\\(1p\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:12.0\\(1q\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*" ]
CVE-2021-41225
A use of uninitialized value vulnerability in Tensorflow
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's Grappler optimizer has a use of unitialized variable. If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*" ]
CVE-2024-33592
WordPress Radio Player plugin <= 2.0.73 - Server Side Request Forgery (SSRF) vulnerability
Server-Side Request Forgery (SSRF) vulnerability in SoftLab Radio Player.This issue affects Radio Player: from n/a through 2.0.73.
[]
GHSA-cc4m-3fhg-62r3
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in a PDF. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-10189.
[]
GHSA-p6m7-cwqx-m4h6
The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
[]
GHSA-9vpw-jxpr-w9pg
Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
GHSA-7hcx-w2fp-wfhr
Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.
[]
CVE-2022-26023
A leftover debug code vulnerability exists in the console verify functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to disabling security features. An attacker can send a sequence of requests to trigger this vulnerability.
[ "cpe:2.3:o:inhandnetworks:ir302_firmware:3.5.45:*:*:*:*:*:*:*", "cpe:2.3:h:inhandnetworks:ir302:-:*:*:*:*:*:*:*" ]
CVE-2021-24839
SupportCandy < 2.2.5 - Unauthenticated Arbitrary Ticket Deletion
The SupportCandy WordPress plugin before 2.2.5 does not have authorisation and CSRF checks in its wpsc_tickets AJAX action, which could allow unauthenticated users to call it and delete arbitrary tickets via the set_delete_permanently_bulk_ticket setting_action. Other actions may be affected as well.
[ "cpe:2.3:a:supportcandy:supportcandy:*:*:*:*:*:wordpress:*:*" ]
GHSA-5x27-p5w5-hmmg
An issue was discovered in MISP before 2.4.176. app/Model/AppModel.php mishandles filters.
[]
GHSA-vmwq-gw9g-wqfq
In AT_SKIP_REST of bta_hf_client_at.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure in the Bluetooth stack with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220732646
[]
GHSA-8595-9266-fv84
Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.
[]
GHSA-vx7j-xjrp-5gjh
Cross-site scripting (XSS) vulnerability in modules/slideshowmodule/slideshow.js.php in Exponent CMS 0.97.0 allows remote attackers to inject arbitrary web script or HTML via the u parameter.
[]
CVE-2021-35227
Insecure Web Configuration for RabbitMQ Management Plugin in SolarWinds ARM
The HTTP interface was enabled for RabbitMQ Plugin in ARM 2020.2.6 and the ability to configure HTTPS was not available.
[ "cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*" ]
GHSA-vpq9-c67q-23fq
Fastly Magento2 sensitive information disclosure
The Fastly CDN module before 1.2.26 for Magento2, when used with a third-party authentication plugin, might allow remote authenticated users to obtain sensitive information from authenticated sessions via vectors involving caching of redirect responses.
[]
CVE-2023-29626
Yoga Class Registration System 1.0 was discovered to contain a SQL injection vulnerability via the cid parameter at /admin/login.php.
[ "cpe:2.3:a:yoga_class_registration_system_project:yoga_class_registration_system:1.0:*:*:*:*:*:*:*" ]
GHSA-v8wh-q2rf-jg6p
In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed
[]
CVE-2007-5264
Battlefront Dropteam 1.3.3 and earlier sends the client's online account name and password to the game server, which allows malicious game servers to steal account information.
[ "cpe:2.3:a:battlefront:dropteam:*:*:*:*:*:*:*:*" ]
GHSA-q534-gvjc-fpgw
Cross-site scripting (XSS) vulnerability in login.php in Miro Project Broadcast Machine 0.9.9.9 allows remote attackers to inject arbitrary web script or HTML via the username parameter.
[]
CVE-2023-51847
An issue in obgm and Libcoap v.a3ed466 allows a remote attacker to cause a denial of service via thecoap_context_t function in the src/coap_threadsafe.c:297:3 component.
[ "cpe:2.3:a:libcoap:libcoap:*:*:*:*:*:*:*:*" ]
CVE-2013-5421
Cross-site scripting (XSS) vulnerability in the IMS server before Ifix 6 in IBM Security Access Manager for Enterprise Single Sign-On (ISAM ESSO) 8.2 allows remote attackers to inject arbitrary web script or HTML via crafted input to an unspecified dynamic web form.
[ "cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2:*:*:*:*:*:*:*" ]
CVE-2021-40159
An Information Disclosure vulnerability for JT files in Autodesk Inventor 2022, 2021, 2020, 2019 in conjunction with other vulnerabilities may lead to code execution through maliciously crafted JT files in the context of the current process.
[ "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:inventor:2019:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:inventor:2020:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:inventor:2021:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:inventor:2022:*:*:*:*:*:*:*" ]
GHSA-fc4q-fgrg-whcw
The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs.
[]
GHSA-575w-jrpq-q9xv
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
[]
GHSA-8hfg-jv43-67g2
The user may be tricked into opening a malicious FBX file which may exploit a Null Pointer Dereference vulnerability in FBX's Review causing the application to crash leading to a denial of service.
[]
GHSA-45c7-44wq-fm8v
Affected versions of Atlassian Jira Server allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in Jira issue filter export files. The affected versions are before 8.5.9, from version 8.6.0 before 8.12.3, and from version 8.13.0 before 8.13.1.
[]
CVE-2006-5044
Unspecified vulnerability in Prince Clan (Princeclan) Chess component (com_pcchess) 0.8 and earlier for Mambo and Joomla! has unspecified impact and attack vectors.
[ "cpe:2.3:a:joomla:prince_clan_chess_component:*:*:*:*:*:*:*:*", "cpe:2.3:a:mambo:prince_clan_chess_component:*:*:*:*:*:*:*:*" ]
GHSA-xvvx-jmvr-f8rg
The sell function of a smart contract implementation for Nectar (NCTR), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets.
[]
GHSA-7g9c-p722-9h45
Cross-site scripting (XSS) vulnerability in index.php in AZ Photo Album Script Pro allows remote attackers to inject arbitrary web script or HTML via the gazpart parameter.
[]
CVE-2018-11061
RSA NetWitness Platform versions prior to 11.1.0.2 and RSA Security Analytics versions prior to 10.6.6 are vulnerable to a server-side template injection vulnerability due to insecure configuration of the template engine used in the product. A remote authenticated malicious RSA NetWitness Server user with an Admin or Operator role could exploit this vulnerability to execute arbitrary commands on the server with root privileges.
[ "cpe:2.3:a:emc:rsa_netwitness:*:*:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_security_analytics:*:*:*:*:*:*:*:*" ]
CVE-2018-6240
NVIDIA Tegra contains a vulnerability in BootRom where a user with kernel level privileges can write an arbitrary value to an arbitrary physical address
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
CVE-2014-8613
The sctp module in FreeBSD 10.1 before p5, 10.0 before p17, 9.3 before p9, and 8.4 before p23 allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted RE_CONFIG chunk.
[ "cpe:2.3:o:freebsd:freebsd:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*" ]
CVE-2024-8260
OPA SMB Force-Authentication
A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions.
[ "cpe:2.3:a:openpolicyagent:open_policy_agent:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-5r72-8qwv-mccg
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stephanie Leary Convert Post Types allows Reflected XSS.This issue affects Convert Post Types: from n/a through 1.4.
[]
CVE-2016-0126
Microsoft Office 2013 SP1, 2013 RT SP1, and 2016 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*" ]
GHSA-96x6-ppmq-j9wc
Improper authorization verification vulnerability in Samsung Email prior to version 6.1.90.4 allows attackers to read sandbox data of email.
[]
CVE-2018-18920
Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid."
[ "cpe:2.3:a:ethereum:py-evm:0.2.0:alpha.33:*:*:*:*:*:*" ]
CVE-2014-4070
Cross-site scripting (XSS) vulnerability in the Web Components Server in Microsoft Lync Server 2013 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Lync XSS Information Disclosure Vulnerability."
[ "cpe:2.3:a:microsoft:lync_server:2013:*:*:*:*:*:*:*" ]
CVE-2011-0845
Unspecified vulnerability in the Database Control component in Oracle Enterprise Manager Grid Control 10.1.0.6 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
[ "cpe:2.3:a:oracle:enterprise_manager_grid_control:10.1.0.6:*:*:*:*:*:*:*" ]
CVE-2018-1888
An untrusted search path vulnerability in IBM i Access for Windows versions 7.1 and earlier on Windows can allow arbitrary code execution via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function. IBM X-Force ID: 152079.
[ "cpe:2.3:a:ibm:i_access:*:*:*:*:*:windows:*:*" ]
CVE-2019-7059
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-6f59-wxf3-55jc
Unspecified vulnerability in the Oracle Retail Order Broker component in Oracle Retail Applications 15.0 allows remote attackers to affect confidentiality and integrity via vectors related to System Administration.
[]
CVE-2024-57766
MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/editField.
[]
CVE-2022-3520
Heap-based Buffer Overflow in vim/vim
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765.
[ "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*" ]
CVE-2017-8700
ASP.NET Core 1.0, 1.1, and 2.0 allow an attacker to bypass Cross-origin Resource Sharing (CORS) configurations and retrieve normally restricted content from a web application, aka "ASP.NET Core Information Disclosure Vulnerability".
[ "cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*" ]
CVE-2023-38070
A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20818)
[ "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*" ]
CVE-2022-36056
Vulnerabilities with blob verification in sigstore cosign
Cosign is a project under the sigstore organization which aims to make signatures invisible infrastructure. In versions prior to 1.12.0 a number of vulnerabilities have been found in cosign verify-blob, where Cosign would successfully verify an artifact when verification should have failed. First a cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature. Second, when providing identity flags, the email and issuer of a certificate is not checked when verifying a Rekor bundle, and the GitHub Actions identity is never checked. Third, providing an invalid Rekor bundle without the experimental flag results in a successful verification. And fourth an invalid transparency log entry will result in immediate success for verification. Details and examples of these issues can be seen in the GHSA-8gw7-4j42-w388 advisory linked. Users are advised to upgrade to 1.12.0. There are no known workarounds for these issues.
[ "cpe:2.3:a:sigstore:cosign:*:*:*:*:*:*:*:*" ]
CVE-2025-25101
WordPress Munk Sites plugin <= 1.0.7 - CSRF to Arbitrary Plugin Installation vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in MetricThemes Munk Sites allows Cross Site Request Forgery. This issue affects Munk Sites: from n/a through 1.0.7.
[]
GHSA-3gj4-2f6h-gghr
Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter wan_hostname and forcing a reboot. This will result in command injection.
[]
CVE-2015-5023
SQL injection vulnerability in IBM Curam Social Program Management 6.1 before 6.1.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:ibm:curam_social_program_management:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:curam_social_program_management:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:curam_social_program_management:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:curam_social_program_management:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:curam_social_program_management:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:curam_social_program_management:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:curam_social_program_management:6.1:*:*:*:*:*:*:*" ]
CVE-2014-7771
The World Tamil Bayan (aka com.wWorldTamilBayan) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:worldtamilbayan:world_tamil_bayan:0.1:*:*:*:*:android:*:*" ]
CVE-2024-39877
Apache Airflow: DAG Author Code Execution possibility in airflow-scheduler
Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to version 2.9.3 or later which has removed the vulnerability.
[ "cpe:2.3:a:apache:airflow:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*" ]
CVE-2020-27997
An issue was discovered in SmartStoreNET before 4.1.0. Lack of Cross Site Request Forgery (CSRF) protection may lead to elevation of privileges (e.g., /admin/customer/create to create an admin account).
[ "cpe:2.3:a:smartstore:smartstorenet:*:*:*:*:*:*:*:*" ]
CVE-2019-11393
An issue was discovered in /admin/users/update in M/Monit before 3.7.3. It allows unprivileged users to escalate their privileges to an administrator by requesting a password change and specifying the admin parameter.
[ "cpe:2.3:a:tildeslash:monit:*:*:*:*:*:*:*:*" ]
GHSA-xmwx-6752-9m3f
A vulnerability has been identified in JT2Go (All versions), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V12.4 (All versions), Teamcenter Visualization V13.1 (All versions), Teamcenter Visualization V13.2 (All versions), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15110)
[]
CVE-2017-10769
XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!memcmp+0x0000000000000018" (without RPC initialization).
[ "cpe:2.3:a:xnview:xnview:2.40:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
CVE-2018-20186
An issue was discovered in Bento4 1.5.1-627. AP4_Sample::ReadData in Core/Ap4Sample.cpp allows attackers to trigger an attempted excessive memory allocation, related to AP4_DataBuffer::SetDataSize and AP4_DataBuffer::ReallocateBuffer in Core/Ap4DataBuffer.cpp.
[ "cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*" ]
CVE-2020-26768
Formstone <=1.4.16 is vulnerable to a Reflected Cross-Site Scripting (XSS) vulnerability caused by improper validation of user supplied input in the upload-target.php and upload-chunked.php files. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site once the URL is clicked or visited. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials, force malware execution, user redirection and others.
[ "cpe:2.3:a:formstone:formstone:*:*:*:*:*:*:*:*" ]
CVE-2000-0715
DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file.
[ "cpe:2.3:a:kirk_bauer:diskcheck:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*" ]
GHSA-hfq9-hggm-c56q
XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream
ImpactThe vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver.PatchesXStream 1.4.21 detects the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead.WorkaroundsThe only solution is to catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.ReferencesSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2024-47072](https://x-stream.github.io/CVE-2024-47072.html).CreditsAlexis Challande of Trail Of Bits found and reported the issue to XStream and provided the required information to reproduce it.
[]
GHSA-xpr8-vpc7-7vfc
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
[]
CVE-2002-1695
Norton Internet Security 2001 opens log files with FILE_SHARE_READ and FILE_SHARE_WRITE permissions, which could allow remote attackers to modify the log file contents while Norton Internet Security is running.
[ "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:norton_internet_security:2001:*:*:*:*:*:*:*" ]
GHSA-gq3h-3p4j-vffv
A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to join a Webex session without appearing on the participant list. This vulnerability is due to improper handling of authentication tokens by a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit requires the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. The attacker could then exploit this vulnerability to join meetings, without appearing in the participant list, while having full access to audio, video, chat, and screen sharing capabilities.
[]
GHSA-2pmm-55vx-qrxv
DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated command injection vulnerability via the value parameter in the filter_string function.
[]
GHSA-395m-2555-53cr
The nft_flush_table function in net/netfilter/nf_tables_api.c in the Linux kernel before 3.18.5 mishandles the interaction between cross-chain jumps and ruleset flushes, which allows local users to cause a denial of service (panic) by leveraging the CAP_NET_ADMIN capability.
[]
GHSA-p6c2-p9cm-gh28
Improper buffer restrictions in Intel(R) Media SDK all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
CVE-2009-3480
SQL injection vulnerability in the iCRM Basic (com_icrmbasic) component 1.4.2.31 for Joomla! allows remote attackers to execute arbitrary SQL commands via the p3 parameter to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:isygen:icrm_basic:1.4.2.31:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*" ]
CVE-2022-29780
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_prototype_sort at src/njs_array.c.
[ "cpe:2.3:a:nginx:njs:0.7.2:*:*:*:*:*:*:*" ]