id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2016-1627 | The Developer Tools (aka DevTools) subsystem in Google Chrome before 48.0.2564.109 does not validate URL schemes and ensure that the remoteBase parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL, related to browser/devtools/devtools_ui_bindings.cc and WebKit/Source/devtools/front_end/Runtime.js. | [
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-15372 | The Hisense F17 Android device with a build fingerprint of Hisense/F17_4G/HS6739MT:8.1.0/O11019/Hisense_F17_4G_00_S01:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. | [
"cpe:2.3:o:hisense:infinity_f17_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hisense:infinity_f17:-:*:*:*:*:*:*:*"
] |
|
GHSA-qhjf-hm5j-335w | @urql/next Cross-site Scripting vulnerability | impactThe `@urql/next` package is vulnerable to XSS. To exploit this an attacker would need to ensure that the response returns `html` tags and that the web-application is using streamed responses (non-RSC). This vulnerability is due to improper escaping of html-like characters in the response-stream.To fix this vulnerability upgrade to version 1.1.1 | [] |
CVE-2019-7047 | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-7xmc-vhjp-qv5q | Gradio Vulnerable to Denial of Service (DoS) via Crafted Zip Bomb | A vulnerability in the dataframe component of gradio-app/gradio (version git 98cbcae) allows for a zip bomb attack. The component uses pd.read_csv to process input values, which can accept compressed files. An attacker can exploit this by uploading a maliciously crafted zip bomb, leading to a server crash and causing a denial of service. | [] |
CVE-2009-3291 | The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.4:patch1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.0.7:rc4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*"
] |
|
GHSA-f9fp-5vjr-2mp7 | Tenda F1202 V1.0BR_V1.2.0.20(408), FH1202_V1.2.0.19_EN were discovered to contain a stack overflow in the page parameter in the function fromqossetting. | [] |
|
GHSA-ccv4-2jxq-jjpm | The AGG Software Web Server version 4.0.40.1014 and prior is vulnerable to a path traversal attack, which may allow an attacker to read arbitrary files from the file system. | [] |
|
GHSA-7rfh-xp3x-jh62 | Vestel AC Charger
version3.75.0 contains a vulnerability that
could enable an attacker to access files containing sensitive
information, such as credentials which could be used to further
compromise the device. | [] |
|
CVE-2024-38691 | WordPress Metorik plugin <= 1.7.1 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Metorik Metorik – Reports & Email Automation for WooCommerce allows Cross Site Request Forgery.This issue affects Metorik – Reports & Email Automation for WooCommerce: from n/a through 1.7.1. | [] |
CVE-2022-43018 | OpenCATS v0.9.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the email parameter in the Check Email function. | [
"cpe:2.3:a:opencats:opencats:0.9.6:*:*:*:*:*:*:*"
] |
|
GHSA-3j65-5g3g-m8f2 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in phpMyFAQ before 2.5.5 allow remote attackers to inject arbitrary web script or HTML via (1) the lang parameter in a sitemap action, (2) the search parameter in a search action, (3) the tagging_id parameter in a search action, (4) the highlight parameter in an artikel action, (5) the artlang parameter in an artikel action, (6) the letter parameter in a sitemap action, (7) the lang parameter in a show action, (8) the cat parameter in a show action, (9) the newslang parameter in a news action, (10) the artlang parameter in a send2friend action, (11) the cat parameter in a send2friend action, (12) the id parameter in a send2friend action, (13) the srclang parameter in a translate action, (14) the id parameter in a translate action, (15) the cat parameter in a translate action, (16) the cat parameter in an add action, or (17) the question parameter in an add action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
GHSA-4j52-x36j-w2jw | In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension. | [] |
|
GHSA-7gqr-mqc6-qmrg | Vulnerability in the PeopleSoft Enterprise Interaction Hub component of Oracle PeopleSoft Products (subcomponent: Application Portal). The supported version that is affected is 9.1.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise Interaction Hub. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise Interaction Hub accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise Interaction Hub accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). | [] |
|
CVE-2002-0705 | The Web Reports Server for SurfControl SuperScout WebFilter stores the "scwebusers" username and password file in a web-accessible directory, which allows remote attackers to obtain valid usernames and crack the passwords. | [
"cpe:2.3:a:surfcontrol:superscout_web_filter:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:surfcontrol:superscout_web_filter:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:surfcontrol:web_filter:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:surfcontrol:web_filter:4.1:*:*:*:*:*:*:*"
] |
|
GHSA-4892-82wr-4cv3 | The CentralAuth extension through REL1_34 for MediaWiki allows remote attackers to obtain sensitive hidden account information via an api.php?action=query&meta=globaluserinfo&guiuser= request. In other words, the information can be retrieved via the action API even though access would be denied when simply visiting wiki/Special:CentralAuth in a web browser. | [] |
|
GHSA-mqx8-p7fp-jwvw | Cross-Site Request Forgery (CSRF) vulnerability in Syed Balkhi Beacon Lead Magnets and Lead Capture allows Cross Site Request Forgery. This issue affects Beacon Lead Magnets and Lead Capture: from n/a through 1.5.8. | [] |
|
GHSA-jvxx-8xxf-5495 | phpMyAdmin CSRF Vulnerability | An issue was discovered in phpMyAdmin. When the arg_separator is different from its default & value, the CSRF token was not properly stripped from the return URL of the preference import action. All 4.6.x versions (prior to 4.6.5), 4.4.x versions (prior to 4.4.15.9), and 4.0.x versions (prior to 4.0.10.18) are affected. | [] |
CVE-2020-21485 | Cross Site Scripting vulnerability in Alluxio v.1.8.1 allows a remote attacker to executea arbitrary code via the path parameter in the browse board component. | [
"cpe:2.3:a:alluxio:alluxio:1.8.1:*:*:*:*:*:*:*"
] |
|
GHSA-wfmm-r9pc-pj9c | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ThemeHunk Gutenberg Blocks – Unlimited blocks For Gutenberg allows Stored XSS.This issue affects Gutenberg Blocks – Unlimited blocks For Gutenberg: from n/a through 1.2.7. | [] |
|
CVE-2013-1666 | Foswiki before 1.1.8 contains a code injection vulnerability in the MAKETEXT macro. | [
"cpe:2.3:a:foswiki:foswiki:*:*:*:*:*:*:*:*"
] |
|
GHSA-wx8f-7wmv-f3cq | WinSCP before 5.5.3, when FTP with TLS is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | [] |
|
CVE-2023-1523 | Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console. | [
"cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*"
] |
|
GHSA-5xxv-j4hw-gp2p | XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request. | [] |
|
GHSA-h7wh-5h69-49xf | The OneClick Chat to Order WordPress plugin before 1.0.4.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [] |
|
CVE-2024-8080 | SourceCodester Online Health Care System search.php sql injection | A vulnerability classified as critical has been found in SourceCodester Online Health Care System 1.0. Affected is an unknown function of the file search.php. The manipulation of the argument f_name with the input 1%' or 1=1 ) UNION SELECT 1,2,3,4,5,database(),7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23# as part of string leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sourcecodester:online_health_care_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:online_health_care_system_project:online_health_care_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-ggq3-wm6p-j59q | A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to read restricted memory. | [] |
|
CVE-2019-18335 | A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could be able to gain access to logs and configuration files by sending specifically crafted packets to 80/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | [
"cpe:2.3:a:siemens:sppa-t3000_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sppa-t3000_application_server:r8.2:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sppa-t3000_application_server:r8.2:sp1:*:*:*:*:*:*"
] |
|
CVE-2020-10498 | CSRF in admin/edit-category.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a category, given the id, via a crafted request. | [
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-vxv3-8pcw-fwgr | The "Java Update" feature for Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not verify the signature of the JRE that is downloaded, which allows remote attackers to execute arbitrary code via DNS man-in-the-middle attacks. | [] |
|
GHSA-vw4g-j3vp-w855 | Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). Supported versions that are affected are 8.5.2 and 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS v3.0 Base Score 7.5 (Availability impacts). | [] |
|
CVE-2018-25070 | polterguy Phosphorus Five CSV Import NonQuery.cs csv.Read sql injection | A vulnerability has been found in polterguy Phosphorus Five up to 8.2 and classified as critical. This vulnerability affects the function csv.Read of the file plugins/extras/p5.mysql/NonQuery.cs of the component CSV Import. The manipulation leads to sql injection. Upgrading to version 8.3 is able to address this issue. The patch is identified as c179a3d0703db55cfe0cb939b89593f2e7a87246. It is recommended to upgrade the affected component. VDB-217606 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:aista:phosphorus_five:*:*:*:*:*:*:*:*"
] |
GHSA-wwx4-6g85-wg56 | To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] |
|
CVE-2016-4649 | Audio in Apple OS X before 10.11.6 allows local users to cause a denial of service (NULL pointer dereference) via unspecified vectors. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-hjmc-mw59-wqqp | Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2007-1744 | Directory traversal vulnerability in the Shared Folders feature for VMware Workstation before 5.5.4, when a folder is shared, allows users on the guest system to write to arbitrary files on the host system via the "Backdoor I/O Port" interface. | [
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*"
] |
|
GHSA-3m2q-xc74-xcj8 | The Popup Builder WordPress plugin before 4.1.1 does not sanitise and escape the sgpb-subscription-popup-id parameter before using it in a SQL statement in the All Subscribers admin dashboard, leading to a SQL injection, which could also be used to perform Reflected Cross-Site Scripting attack against a logged in admin opening a malicious link | [] |
|
CVE-2016-3675 | SQL injection vulnerability in Huawei Policy Center with software before V100R003C10SPC020 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors related to system databases. | [
"cpe:2.3:h:huawei:policy_center:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:policy_center_firmware:v100r003c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:policy_center_firmware:v100r003c10:*:*:*:*:*:*:*"
] |
|
GHSA-7hmj-w3gw-pxpr | Cross-site scripting (XSS) vulnerability in PassMasterFlex and PassMasterFlexPlus (PassMasterFlex+) 1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) username, (2) password, or (3) User-Agent HTTP header in the Hack Log. | [] |
|
GHSA-mv7v-jm2g-787q | SQL injection vulnerability in the yvComment (com_yvcomment) component 1.16.0 and earlier for Joomla! allows remote attackers to execute arbitrary SQL commands via the ArticleID parameter in a comment action to index.php. | [] |
|
GHSA-68r5-85v5-w3v8 | FTP Explorer 1.0.1 Build 047, and other versions before 1.0.1.52, allows remote servers to cause a denial of service (CPU consumption) via a long response to a PWD command. | [] |
|
GHSA-hr74-2752-vc9x | TP-Link TL-WR940N is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the ipAddrDispose function. By sending specially crafted ICMP echo request packets, a remote authenticated attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges. | [] |
|
GHSA-pvhp-v9qp-xf5r | Django-piston and Django-tastypie do not properly deserialize YAML data | emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.Django Tastypie has a very similar vulnerability. | [] |
CVE-2017-18216 | In fs/ocfs2/cluster/nodemanager.c in the Linux kernel before 4.15, local users can cause a denial of service (NULL pointer dereference and BUG) because a required mutex is not used. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-rvr5-9pgv-pj7m | A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been classified as critical. This affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250791. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-gvcf-h5v7-8hxx | Multiple cross-site request forgery (CSRF) vulnerabilities in the gSlideShow plugin 0.1 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) rss, (2) display_time or (3) transistion_time parameter in the gslideshow.php page to wp-admin/options-general.php. | [] |
|
GHSA-2g3q-f6jj-72f9 | MashZone NextGen through 10.7 GA allows a remote authenticated user, with access to the admin console, to upload a new JDBC driver that can execute arbitrary commands on the underlying host. This occurs in com.idsscheer.ppmmashup.business.jdbc.DriverUploadController. | [] |
|
CVE-2015-1230 | The getHiddenProperty function in bindings/core/v8/V8EventListenerList.h in Blink, as used in Google Chrome before 41.0.2272.76, has a name conflict with the AudioContext class, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that adds an AudioContext event listener and triggers "type confusion." | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-14541 | PHP Scripts Mall Basic B2B Script 2.0.0 has Reflected and Stored XSS via the First name, Last name, Address 1, City, State, and Company name fields. | [
"cpe:2.3:a:readymadeb2bscript:basic_b2b:2.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-rq8v-pvhp-2p6c | Cross-site scripting (XSS) vulnerability in gbook.php in Filebased guestbook 1.1.3 allows remote attackers to inject arbitrary web script or HTML via the comment section. | [] |
|
GHSA-4mx6-82pf-jrfw | Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple Safari before 3.1, allows remote attackers to inject arbitrary web script or HTML via a frame that calls a method instance in another frame. | [] |
|
GHSA-2m97-7j97-3fhw | Directory traversal vulnerability in IronWebMail before 6.1.1 HotFix-17 allows remote attackers to read arbitrary files via a GET request to the IM_FILE identifier with double-url-encoded "../" sequences ("%252e%252e/"). | [] |
|
GHSA-fpr3-x698-3rrr | In all Qualcomm products with Android releases from CAF using the Linux kernel, a Sample App failed to check a length potentially leading to unauthorized access to secure memory. | [] |
|
CVE-2023-31163 | Improper Neutralization of Input During Web Page Generation |
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.
See SEL Service Bulletin dated 2022-11-15 for more details.
| [
"cpe:2.3:o:selinc:sel-2241_rtac_module_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-2241_rtac_module:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3505_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3505-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3505-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3530-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3530-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3532_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3555_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3555:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3560e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3560e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:selinc:sel-3560s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:selinc:sel-3560s:-:*:*:*:*:*:*:*"
] |
CVE-2022-41518 | TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain a command injection vulnerability via the UploadFirmwareFile function at /cgi-bin/cstecgi.cgi. | [
"cpe:2.3:o:totolink:nr1800x_firmware:9.1.0u.6279_b20210910:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:nr1800x:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-22873 | Buffer overflow vulnerability in function NumberToPrecisionCmd in jsish before 3.0.7, allows remote attackers to execute arbitrary code. | [
"cpe:2.3:a:jsish:jsish:*:*:*:*:*:*:*:*"
] |
|
GHSA-q49c-6v6g-wgq3 | Skops unsafe deserialization | Deserialization of untrusted data can occur in versions 0.6 or newer of the skops python library, enabling a maliciously crafted model to run arbitrary code on an end user's system when loaded. | [] |
GHSA-f6pr-f7h8-8jwv | Microsoft Edge in Microsoft Windows 10 1607 and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8734, CVE-2017-8751, and CVE-2017-11766. | [] |
|
GHSA-7g7c-qhf3-x59p | propel/propel1 SQL injection possible with limit() on MySQL | The limit() query method is susceptible to catastrophic SQL injection with MySQL.For example, given a model User for a table users:This will drop the users table!The cause appears to be a lack of integer casting of the limit input in either Criteria::setLimit() or in DBMySQL::applyLimit(). The code comments there seem to imply that casting was avoided due to overflow issues with 32-bit integers.This is surprising behavior since one of the primary purposes of an ORM is to prevent basic SQL injection.This affects all versions of Propel: 1.x, 2.x, and 3. | [] |
CVE-2017-11704 | A heap-based buffer over-read was found in the function decompileIF in util/decompile.c in Ming 0.4.8, which allows attackers to cause a denial of service via a crafted file. | [
"cpe:2.3:a:libming:ming:0.4.8:*:*:*:*:*:*:*"
] |
|
CVE-2020-7558 | A CWE-787 Out-of-bounds Write vulnerability exists in IGSS Definition (Def.exe) version 14.0.0.20247 that could cause Remote Code Execution when malicious CGF (Configuration Group File) file is imported to IGSS Definition. | [
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
] |
|
GHSA-6xj9-g6q5-f8xc | HGiga MailSherlock query function for connection log has a vulnerability of insufficient filtering for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operation or disrupt service. | [] |
|
CVE-2005-4023 | Unspecified vulnerability in the zipcart module in Gallery 2.0 before 2.0.2 allows remote attackers to read arbitrary files via unknown vectors. | [
"cpe:2.3:a:gallery_project:gallery:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_alpha3:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_alpha4:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_rc2:*:*:*:*:*:*:*"
] |
|
CVE-2013-3558 | The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. | [
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
] |
|
CVE-2018-8530 | A security feature bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins, aka "Microsoft Edge Security Feature Bypass Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8512. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*"
] |
|
GHSA-4442-gqg3-5qvm | In the Linux kernel, the following vulnerability has been resolved:misc: fastrpc: fix memory corruption on openThe probe session-duplication overflow check incremented the session
count also when there were no more available sessions so that memory
beyond the fixed-size slab-allocated session array could be corrupted in
fastrpc_session_alloc() on open(). | [] |
|
GHSA-68x9-rr6m-w8fv | Microsoft Terminal Server using Remote Desktop Protocol (RDP) 5.2 stores an RSA private key in mstlsapi.dll and uses it to sign a certificate, which allows remote attackers to spoof public keys of legitimate servers and conduct man-in-the-middle attacks. | [] |
|
GHSA-932h-84vw-p6cw | In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Avoid field-overflowing memcpy()In preparation for FORTIFY_SOURCE performing compile-time and run-time
field bounds checking for memcpy(), memmove(), and memset(), avoid
intentionally writing across neighboring fields.Use flexible arrays instead of zero-element arrays (which look like they
are always overflowing) and split the cross-field memcpy() into two halves
that can be appropriately bounds-checked by the compiler.We were doing:target is wqe->eth.inline_hdr.start (which the compiler sees as being
2 bytes in size), but copying 18, intending to write across start
(really vlan_tci, 2 bytes). The remaining 16 bytes get written into
wqe->data[0], covering byte_count (4 bytes), lkey (4 bytes), and addr
(8 bytes).struct mlx5e_tx_wqe {
struct mlx5_wqe_ctrl_seg ctrl; /* 0 16 */
struct mlx5_wqe_eth_seg eth; /* 16 16 */
struct mlx5_wqe_data_seg data[]; /* 32 0 */};struct mlx5_wqe_eth_seg {
u8 swp_outer_l4_offset; /* 0 1 */
u8 swp_outer_l3_offset; /* 1 1 */
u8 swp_inner_l4_offset; /* 2 1 */
u8 swp_inner_l3_offset; /* 3 1 */
u8 cs_flags; /* 4 1 */
u8 swp_flags; /* 5 1 */
__be16 mss; /* 6 2 */
__be32 flow_table_metadata; /* 8 4 */
union {
struct {
__be16 sz; /* 12 2 */
u8 start[2]; /* 14 2 */
} inline_hdr; /* 12 4 */
struct {
__be16 type; /* 12 2 */
__be16 vlan_tci; /* 14 2 */
} insert; /* 12 4 */
__be32 trailer; /* 12 4 */
}; /* 12 4 */};struct mlx5_wqe_data_seg {
__be32 byte_count; /* 0 4 */
__be32 lkey; /* 4 4 */
__be64 addr; /* 8 8 */};So, split the memcpy() so the compiler can reason about the buffer
sizes."pahole" shows no size nor member offset changes to struct mlx5e_tx_wqe
nor struct mlx5e_umr_wqe. "objdump -d" shows no meaningful object
code changes (i.e. only source line number induced differences and
optimizations). | [] |
|
CVE-2008-4940 | xmlfile.py in aptoncd 0.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/aptoncd temporary file. | [
"cpe:2.3:a:aptoncd:aptoncd:0.1:*:*:*:*:*:*:*"
] |
|
CVE-2020-13558 | A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free. | [
"cpe:2.3:a:webkitgtk:webkitgtk:2.30.1:*:*:*:*:*:*:*"
] |
|
GHSA-rvv5-9rj9-wjr2 | Google Chrome 17.0.963.66 and earlier allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a sandboxed process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012. NOTE: the primary affected product may be clarified later; it was not identified by the researcher, who reportedly stated "it really doesn't matter if it's third-party code." | [] |
|
GHSA-xvcp-f5rw-f54w | A?CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')?vulnerability exists?that could cause?a path traversal issue?when?using the File Command. | [] |
|
CVE-2019-0030 | Juniper ATP: Password hashing uses DES and a hardcoded salt | Juniper ATP uses DES and a hardcoded salt for password hashing, allowing for trivial de-hashing of the password file contents. This issue affects Juniper ATP 5.0 versions prior to 5.0.3. | [
"cpe:2.3:o:juniper:advanced_threat_prevention_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:atp400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:atp700:-:*:*:*:*:*:*:*"
] |
GHSA-5rjx-jvqx-cv7m | readfolder.php in imageVue 16.1 allows remote attackers to list directories via modified path and ext parameters. | [] |
|
GHSA-6qg9-pr7h-cgw4 | BlackBerry PlayBook before 2.1 has an Information Disclosure Vulnerability via a Web browser component error | [] |
|
CVE-2020-10874 | Motorola FX9500 devices allow remote attackers to read database files. | [
"cpe:2.3:o:motorola:fx9500-41324d41-us_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:fx9500-41324d41-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:motorola:fx9500-41324d41-ww_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:fx9500-41324d41-ww:-:*:*:*:*:*:*:*",
"cpe:2.3:o:motorola:fx9500-81324d41-us_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:fx9500-81324d41-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:motorola:fx9500-81324d41-ww_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:fx9500-81324d41-ww:-:*:*:*:*:*:*:*"
] |
|
GHSA-46r9-g8qr-f53g | In validationtools, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | [] |
|
GHSA-hfx4-g7m9-jj99 | Improper access control in Nextcloud Talk 6.0.3 leaks the existance and the name of private conversations when linked them to another shared item via the projects feature. | [] |
|
CVE-2023-30987 | IBM Db2 denial of service | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query on certain databases. IBM X-Force ID: 253440. | [
"cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp3a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp7:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp8:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:fp9:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1.4:fp6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*"
] |
GHSA-mrff-5fq9-xcxc | MySQL 3.22 allows remote attackers to bypass password authentication and access a database via a short check string. | [] |
|
GHSA-v6hh-xjmv-mxf7 | A vulnerability classified as problematic was found in YXJ2018 SpringBoot-Vue-OnlineExam 1.0. This vulnerability affects unknown code of the file /api/studentPWD. The manipulation of the argument studentId leads to unverified password change. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-2m8q-984r-f6q8 | A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. | [] |
|
GHSA-9jjv-35hv-g56w | parcimonie before 0.8.1, when using a large keyring, sleeps for the same amount of time between fetches, which allows attackers to correlate key fetches via unspecified vectors. | [] |
|
CVE-2021-27216 | Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options. | [
"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*"
] |
|
CVE-2010-3842 | Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header. | [
"cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*"
] |
|
GHSA-g8m9-qrr9-p2v9 | Unspecified vulnerability in inetd in Sun Solaris 10 before 20070529 allows local users to cause a denial of service (daemon termination) via unspecified manipulations of the /var/run/.inetd.uds Unix domain socket file. | [] |
|
GHSA-jpp8-xpp4-6mrr | SQL injection vulnerability in survey_results_text.php in TurnkeyForms Business Survey Pro 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] |
|
GHSA-w48v-q8fw-236r | Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via a large number in the CSS letter-spacing property that leads to a heap-based buffer overflow. | [] |
|
GHSA-rr9g-mq89-3f7g | ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26 has a use-after-free issue when the height or width is zero, related to ReadJNGImage. | [] |
|
GHSA-g5jq-8h4q-2x69 | Cross-site scripting vulnerability in Online Lesson Booking 0.8.6 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2023-51257 | An invalid memory write issue in Jasper-Software Jasper v.4.1.1 and before allows a local attacker to execute arbitrary code. | [
"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-0802 | Multiple buffer overflows in Spamdyke before 4.3.0 might allow remote attackers to execute arbitrary code via vectors related to "serious errors in the usage of snprintf()/vsnprintf()" in which the return values may be larger than the size of the buffer. | [
"cpe:2.3:a:spamdyke:spamdyke:*:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.5:beta3:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.5:beta4:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spamdyke:spamdyke:4.2.0:*:*:*:*:*:*:*"
] |
|
GHSA-m533-gv9w-rfq5 | A SQL injection issue in the web API in TrueConf Server 5.2.0.10225 allows remote unauthenticated attackers to execute arbitrary SQL commands, ultimately leading to remote code execution. | [] |
|
GHSA-9r8x-j9wv-wvqv | faxspool in mgetty 1.1.36 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/faxsp.##### temporary file. | [] |
|
GHSA-937r-w77w-qxwp | EC Cloud E-Commerce System v1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add admin accounts via /admin.html?do=user&act=add. | [] |
|
GHSA-963c-26c4-cw72 | Unspecified vulnerability in the CIP dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger allocation of large amounts of memory. | [] |
|
GHSA-hxrj-xc7h-73qh | IBM Maximo Asset Management 7.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 173308. | [] |
|
GHSA-x49g-8r9p-vp7r | doping.php in ePing plugin 1.02 and earlier for e107 portal allows remote attackers to execute arbitrary code or overwrite files via (1) shell metacharacters in the eping_count parameter or (2) restricted shell metacharacters such as ">" and "&" in the eping_host parameter, which is not handled by the validation function. | [] |
|
CVE-2014-8764 | DokuWiki 2014-05-05a and earlier, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a user name and password starting with a null (\0) character, which triggers an anonymous bind. | [
"cpe:2.3:o:mageia_project:mageia:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mageia_project:mageia:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:*"
] |
|
GHSA-wwj7-gfw4-fp6f | Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.