id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-gxw3-qv94-46j5 | In JetBrains YouTrack before 2020.4.4701, CSRF via attachment upload was possible. | [] |
|
CVE-2017-7234 | A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability. | [
"cpe:2.3:a:djangoproject:django:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.0:c1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.16:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.8.17:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9:a1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9:b1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.10.6:*:*:*:*:*:*:*"
] |
|
CVE-2017-2226 | Untrusted search path vulnerability in Setup file of advance preparation for e-Tax software (WEB version) (1.17.1) and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | [
"cpe:2.3:a:nta:e-tax:*:*:*:*:*:*:*:*"
] |
|
CVE-2002-0082 | The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session. | [
"cpe:2.3:a:apache-ssl:apache-ssl:1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:apache-ssl:apache-ssl:1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache-ssl:apache-ssl:1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apache-ssl:apache-ssl:1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:apache-ssl:apache-ssl:1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:apache-ssl:apache-ssl:1.46:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_ssl:mod_ssl:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_ssl:mod_ssl:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_ssl:mod_ssl:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_ssl:mod_ssl:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_ssl:mod_ssl:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_ssl:mod_ssl:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_ssl:mod_ssl:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mod_ssl:mod_ssl:2.8.6:*:*:*:*:*:*:*"
] |
|
GHSA-cccp-pf4f-pc2f | mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not initialize certain data structures, which allows attackers to obtain sensitive information via a crafted application, related to IGraphicBufferConsumer.cpp and IGraphicBufferProducer.cpp, aka internal bug 27556038. | [] |
|
CVE-2016-3986 | Avast allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted PE file, related to authenticode parsing. | [
"cpe:2.3:a:avast:avast:-:*:*:*:*:*:*:*"
] |
|
GHSA-g6f3-67v4-98vv | An issue in Plug n Play Camera com.wisdomcity.zwave 1.1.0 allows a remote attacker to obtain sensitive information via the firmware update process. | [] |
|
CVE-2023-45271 | WordPress ProductX – Gutenberg WooCommerce Blocks plugin <= 2.7.8 - Broken Access Control vulnerability | Missing Authorization vulnerability in WowStore Team ProductX – Gutenberg WooCommerce Blocks allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects ProductX – Gutenberg WooCommerce Blocks: from n/a through 2.7.8. | [] |
GHSA-6hrq-9c58-j26c | The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print(). | [] |
|
GHSA-9c62-wq8x-6267 | GraphicsMagick 1.3.26 has a segmentation violation in the WriteMAPImage() function in coders/map.c when processing a non-colormapped image, a different vulnerability than CVE-2017-11642. | [] |
|
CVE-2022-28852 | Adobe InDesign 2022 Out-of-Bound Write Arbitrary code execution | Adobe InDesign versions 16.4.2 (and earlier) and 17.3 (and earlier) are affected by by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-c9m6-xrqf-8m66 | Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Doc objects in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22592. | [] |
|
GHSA-446g-9pj4-3cgr | In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files. | [] |
|
GHSA-xhqx-hw3w-p9q3 | A vulnerability was found in SourceCodester Best Church Management Software 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/app/soulwinning_crud.php. The manipulation of the argument photo/photo1 leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2024-13238 | Typogrify - Moderately critical - Cross Site Scripting - SA-CONTRIB-2024-002 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Typogrify allows Cross-Site Scripting (XSS).This issue affects Typogrify: from 0.0.0 before 1.3.0. | [] |
CVE-2021-38005 | Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-32344 | Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_patient. | [
"cpe:2.3:a:hospital\\'s_patient_records_management_system_project:hospital\\'s_patient_records_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-12586 | Chalet Montagne Com Tools <= 2.7.8 - Reflected XSS | The Chalet-Montagne.com Tools WordPress plugin through 2.7.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | [] |
CVE-2021-23824 | Content Injection | This affects the package Crow before 0.3+4. When using attributes without quotes in the template, an attacker can manipulate the input to introduce additional attributes, potentially executing code. This may lead to a Cross-site Scripting (XSS) vulnerability, assuming an attacker can influence the value entered into the template. If the template is used to render user-generated content, this vulnerability may escalate to a persistent XSS vulnerability. | [
"cpe:2.3:a:crowcpp:crow:*:*:*:*:*:*:*:*"
] |
GHSA-256m-j5qw-38f4 | Netmaker IDOR Allows User to Update Other User's Password | ImpactAn IDOR vulnerability was found in the user update function. By specifying another user's username it is possible to update the other user's password.PatchesIssue is patched in 0.17.1, and fixed in 0.18.6+.If Users are using 0.17.1, they should run "docker pull gravitl/netmaker:v0.17.1" and "docker-compose up -d". This will switch them to the patched usersIf users are using v0.18.0-0.18.5, they should upgrade to v0.18.6 or later.WorkaroundsIf using 0.17.1, can just pull the latest docker image of backend and restart server.ReferencesCredit to Project Discovery, and in particular https://github.com/rootxharsh , https://github.com/iamnoooob, and https://github.com/projectdiscovery | [] |
GHSA-98w6-v294-3vvq | PHP remote file inclusion vulnerability in archive.php in cwmVote 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the abs parameter. | [] |
|
CVE-2012-5272 | Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than other Flash Player memory corruption CVEs listed in APSB12-22. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-4000 | The Waiting: One-click countdowns plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.6.2. This is due to missing or incorrect nonce validation on its AJAX actions. This makes it possible for unauthenticated attackers to create and delete countdowns, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:plugin:waiting:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2022-40929 | XXL-JOB 2.2.0 has a Command execution vulnerability in background tasks. NOTE: this is disputed because the issues/4929 report is about an intended and supported use case (running arbitrary Bash scripts on behalf of users). | [
"cpe:2.3:a:xuxueli:xxl-job:2.2.0:*:*:*:*:*:*:*"
] |
|
GHSA-4xc5-46jx-vg59 | A vulnerability, which was classified as problematic, has been found in SeaCMS 12.9/13.0. Affected by this issue is some unknown functionality of the file js/player/dmplayer/admin/post.php?act=setting. The manipulation of the argument yzm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272576. | [] |
|
GHSA-gp8q-5m2c-vprm | In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an extended Denial of Service condition. RPD will require a restart to recover. An indicator of compromise is to see if the file rpd.re exists by issuing the command: show system core-dumps This issue affects: Juniper Networks Junos OS Evolved 19.4 versions prior to 19.4R2-S2-EVO; 20.1 versions prior to 20.1R1-S2-EVO, 20.1R2-S1-EVO. This issue does not affect Junos OS. | [] |
|
CVE-2025-26576 | WordPress WP Simple Slideshow Plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in takumin WP Simple Slideshow allows Reflected XSS. This issue affects WP Simple Slideshow: from n/a through 1.0. | [] |
CVE-2014-4403 | The kernel in Apple OS X before 10.9.5 allows local users to obtain sensitive address information and bypass the ASLR protection mechanism by leveraging predictability of the location of the CPU Global Descriptor Table. | [
"cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9.4:*:*:*:*:*:*:*"
] |
|
GHSA-fp64-pw44-4p99 | Directory traversal vulnerability in www/index.php in Sahana 0.6.2.2 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the mod parameter. | [] |
|
CVE-2016-8963 | IBM BigFix Inventory v9 stores potentially sensitive information in log files that could be read by a local user. | [
"cpe:2.3:a:ibm:license_metric_tool:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:bigfix_inventory:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-26742 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.4. An application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2005-4238 | Cross-site scripting (XSS) vulnerability in view_filters_page.php in Mantis 1.0.0rc3 and earlier allows remote attackers to inject arbitrary web script or HTML via the target_field parameter. | [
"cpe:2.3:a:mantis:mantis:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.14.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.15.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.4a:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.0a3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.0a4:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.18a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:0.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a1:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:mantis:mantis:1.0.0a3:*:*:*:*:*:*:*"
] |
|
GHSA-x9xx-q9fh-6gfv | SQL injection vulnerability in account.asp in Active Force Matrix 2.0 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters, possibly related to start.asp. NOTE: some of these details are obtained from third party information. | [] |
|
GHSA-2gvf-9432-xmqv | Monkey HTTP Daemon (monkeyd) before 1.2.2 allows remote attackers to cause a denial of service (infinite loop) via an offset equal to the file size in the Range HTTP header. | [] |
|
CVE-2018-3968 | An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot. | [
"cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:denx:u-boot:2013.07:rc1:*:*:*:*:*:*",
"cpe:2.3:a:denx:u-boot:2013.07:rc2:*:*:*:*:*:*",
"cpe:2.3:a:denx:u-boot:2013.07:rc3:*:*:*:*:*:*",
"cpe:2.3:a:denx:u-boot:2014.07:rc1:*:*:*:*:*:*",
"cpe:2.3:a:denx:u-boot:2014.07:rc2:*:*:*:*:*:*"
] |
|
GHSA-r38m-g3v3-7w4j | Unspecified vulnerability in EPiServer CMS 5 and 6 through 6R2, in certain configurations using Forms Authentication, allows remote authenticated users to obtain WebAdmins access by leveraging Edit Mode privileges, a different vulnerability than CVE-2011-3416 and CVE-2011-3417. | [] |
|
GHSA-863c-q4v8-pcxg | DedeCMS through 5.7 has SQL Injection via the logo parameter to plus/flink_add.php. | [] |
|
GHSA-6x8x-xqhg-j3hx | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AttesaWP Attesa Extra allows Stored XSS.This issue affects Attesa Extra: from n/a through 1.3.9. | [] |
|
GHSA-7ghp-chhf-mv7g | IBM Financial Transaction Manager for SWIFT Services for Multiplatforms 3.2.4 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. | [] |
|
CVE-2023-37863 | PHOENIX CONTACT: OS Command Injection in WP 6xxx Web panels | In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device. | [
"cpe:2.3:o:phoenixcontact:wp_6070-wvps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6101-wxps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6121-wxps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6156-whps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6185-whps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:wp_6215-whps_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6070-wvps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6101-wxps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6121-wxps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6156-whps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6185-whps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:wp_6215-whps:-:*:*:*:*:*:*:*"
] |
CVE-2017-2583 | The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a "MOV SS, NULL selector" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-j4pv-4m2g-pphq | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Medart Health Services Medart Notification Panel allows SQL Injection.This issue affects Medart Notification Panel: through 20231123.NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-p7qf-74jx-f6jj | Deserialization of Untrusted Data vulnerability in BoldThemes Amwerk allows Object Injection. This issue affects Amwerk: from n/a through 1.2.0. | [] |
|
CVE-2017-15108 | spice-vdagent up to and including 0.17.0 does not properly escape save directory before passing to shell, allowing local attacker with access to the session the agent runs in to inject arbitrary commands to be executed. | [
"cpe:2.3:a:spice-space:spice-vdagent:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-8594 | Autodesk AutoCAD MODEL File Parsing Heap-based Buffer Overflow Code Execution Vulnerability | A maliciously crafted MODEL file when parsed in libodxdll.dll through Autodesk AutoCAD can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process. | [
"cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-qh6c-qfmr-q57f | The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 8.8.1 via file uploads due to insufficient directory listing prevention and lack of randomization of file names. This makes it possible for unauthenticated attackers to extract sensitive data including files uploaded via a form. | [] |
|
GHSA-29ch-3cxc-63fh | The WP Extra File Types WordPress plugin before 0.5.1 does not have CSRF check when saving its settings, nor sanitise and escape some of them, which could allow attackers to make a logged in admin change them and perform Cross-Site Scripting attacks | [] |
|
CVE-2022-32168 | notepad-plus-plus - DLL Hijacking | Notepad++ versions 8.4.1 and before are vulnerable to DLL hijacking where an attacker can replace the vulnerable dll (UxTheme.dll) with his own dll and run arbitrary code in the context of Notepad++. | [
"cpe:2.3:a:notepad-plus-plus:notepad\\+\\+:*:*:*:*:*:*:*:*"
] |
CVE-2019-18661 | Fastweb FASTGate 1.0.1b devices allow partial authentication bypass by changing a certain check_pwd return value from 0 to 1. An attack does not achieve administrative control of a device; however, the attacker can view all of the web pages of the administration console. | [
"cpe:2.3:o:fastweb:fastgate_firmware:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:h:fastweb:fastgate:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-3200 | Multiple unspecified vulnerabilities in Google Chrome before 38.0.2125.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2016-10644 | slimerjs-edge is a npm wrapper for installing the bleeding edge version of slimerjs. slimerjs-edge downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:slimerjs-edge_project:slimerjs-edge:-:*:*:*:*:node.js:*:*"
] |
|
CVE-2023-6907 | codelyfe Stupid Simple CMS Deletion Interface delete.php improper authentication | A vulnerability has been found in codelyfe Stupid Simple CMS up to 1.2.4 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /file-manager/delete.php of the component Deletion Interface. The manipulation of the argument file leads to improper authentication. The exploit has been disclosed to the public and may be used. The identifier VDB-248269 was assigned to this vulnerability. | [
"cpe:2.3:a:codelyfe:stupid_simple_cms:*:*:*:*:*:*:*:*"
] |
CVE-2017-11438 | GitLab Community Edition (CE) and Enterprise Edition (EE) before 9.0.11, 9.1.8, 9.2.8 allow an authenticated user with the ability to create a group to add themselves to any project that is inside a subgroup. | [
"cpe:2.3:a:gitlab:gitlab:9.0.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.1:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.2:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.3:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.4:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.5:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.6:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.7:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.8:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.9:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.10:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.1:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.2:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.3:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.4:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.5:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.6:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.7:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.1:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.2:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.3:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.4:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.5:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.6:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.7:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.7:*:*:*:enterprise:*:*:*"
] |
|
GHSA-wp7j-cfx2-2rxm | The eCryptfs support utilities (ecryptfs-utils) 73-0ubuntu6.1 on Ubuntu 9.04 stores the mount passphrase in installation logs, which might allow local users to obtain access to the filesystem by reading the log files from disk. NOTE: the log files are only readable by root. | [] |
|
CVE-2024-57681 | An access control issue in the component form2alg.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the agl service of the device via a crafted POST request. | [] |
|
CVE-2013-10017 | fanzila WebFinance save_roles.php sql injection | A vulnerability was found in fanzila WebFinance 0.5. It has been classified as critical. Affected is an unknown function of the file htdocs/admin/save_roles.php. The manipulation of the argument id leads to sql injection. The name of the patch is 6cfeb2f6b35c1b3a7320add07cd0493e4f752af3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-220056. | [
"cpe:2.3:a:webfinance_project:webfinance:0.5:*:*:*:*:*:*:*"
] |
GHSA-7r72-8gvf-prgp | phpBB 2.0.18 allows remote attackers to obtain sensitive information via a large SQL query, which generates an error message that reveals SQL syntax or the full installation path. | [] |
|
GHSA-22cw-c67j-89mh | Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via /rdms/classes/Master.php?f=delete_report. | [] |
|
GHSA-59rp-73wm-v82r | Rejected reason: This CVE ID was issued in error by its CVE Numbering Authority and does not represent a valid vulnerability. | [] |
|
GHSA-wj27-gm87-7mvg | A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been classified as critical. Affected is an unknown function of the file attendance.php. The manipulation of the argument class_id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-247254 is the identifier assigned to this vulnerability. | [] |
|
CVE-2024-2106 | The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to Information Exposure in versions up to, and including, 3.2.10. This can allow unauthenticated attackers to extract sensitive data including all registered user's username and email addresses which can be used to help perform future attacks. | [
"cpe:2.3:a:stylemixthemes:masterstudy_lms:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2022-39394 | wasmtime_trap_code C API function has out of bounds write vulnerability | Wasmtime is a standalone runtime for WebAssembly. Prior to version 2.0.2, there is a bug in Wasmtime's C API implementation where the definition of the `wasmtime_trap_code` does not match its declared signature in the `wasmtime/trap.h` header file. This discrepancy causes the function implementation to perform a 4-byte write into a 1-byte buffer provided by the caller. This can lead to three zero bytes being written beyond the 1-byte location provided by the caller. This bug has been patched and users should upgrade to Wasmtime 2.0.2. This bug can be worked around by providing a 4-byte buffer casted to a 1-byte buffer when calling `wasmtime_trap_code`. Users of the `wasmtime` crate are not affected by this issue, only users of the C API function `wasmtime_trap_code` are affected. | [
"cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:rust:*:*"
] |
CVE-2008-4901 | SQL injection vulnerability in admin/admin.php in Article Publisher Pro 1.5 allows remote attackers to execute arbitrary SQL commands via the username parameter. | [
"cpe:2.3:a:scripts_frenzy:article_publisher_pro:1.5:*:*:*:*:*:*:*"
] |
|
GHSA-vmfr-fwm4-qw7w | Cross-site scripting (XSS) vulnerability in the Contact module in Exponent CMS 0.97-GA20090213 allows remote attackers to inject arbitrary web script or HTML via the email parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
CVE-2024-20391 | A vulnerability in the Network Access Manager (NAM) module of Cisco Secure Client could allow an unauthenticated attacker with physical access to an affected device to elevate privileges to SYSTEM.
This vulnerability is due to a lack of authentication on a specific function. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges on an affected device. | [
"cpe:2.3:a:cisco:secure_client:4.9.01095:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.9.02028:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.9.03047:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.9.03049:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.9.04043:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.9.04053:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.9.05042:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.9.06037:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.00093:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.01075:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.02086:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.03104:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.04065:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.04071:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.05085:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.05095:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.05111:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.06079:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.06090:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.07061:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.07062:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.07073:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.08025:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.10.08029:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.0.00238:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.0.00529:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.0.00556:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.0.01242:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.0.02075:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.0.03072:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.0.03076:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.0.04032:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.0.05040:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:4.9.00086:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.1.0.136:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.1.1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_client:5.1.2.42:*:*:*:*:*:*:*"
] |
|
GHSA-pxjw-qpm2-c9fw | A Host Header Poisoning Open Redirect issue in slabiak Appointment Scheduler v.1.0.5 allows a remote attacker to redirect users to a malicious website, leading to potential credential theft, malware distribution, or other malicious activities. | [] |
|
GHSA-fr6x-5vfp-hc79 | The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow. | [] |
|
GHSA-xw9g-79q2-3vjw | Jool 3.5.0-3.5.1 is vulnerable to a kernel crashing packet resulting in a DOS. | [] |
|
CVE-2020-25863 | In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the MIME Multipart dissector could crash. This was addressed in epan/dissectors/packet-multipart.c by correcting the deallocation of invalid MIME parts. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:zfs_storage_appliance_firmware:8.8:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:zfs_storage_appliance:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-20160 | flitto express-param fetchParams.js parameter pollution | A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file lib/fetchParams.js. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The identifier of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability. | [
"cpe:2.3:a:flitto:express-param:*:*:*:*:*:*:*:*"
] |
GHSA-2qr9-8w8c-wvq4 | The Telematics Control Unit (aka Telematic Communication Box or TCB), when present on BMW vehicles produced in 2012 through 2018, allows a remote attack via a cellular network. | [] |
|
GHSA-wp52-h62r-qwj4 | In the Linux kernel, the following vulnerability has been resolved:tipc: Fix use-after-free of kernel socket in cleanup_bearer().syzkaller reported a use-after-free of UDP kernel socket
in cleanup_bearer() without repro. [0][1]When bearer_disable() calls tipc_udp_disable(), cleanup
of the UDP kernel socket is deferred by work calling
cleanup_bearer().tipc_net_stop() waits for such works to finish by checking
tipc_net(net)->wq_count. However, the work decrements the
count too early before releasing the kernel socket,
unblocking cleanup_net() and resulting in use-after-free.Let's move the decrement after releasing the socket in
cleanup_bearer().[0]:
ref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at
sk_alloc+0x438/0x608
inet_create+0x4c8/0xcb0
__sock_create+0x350/0x6b8
sock_create_kern+0x58/0x78
udp_sock_create4+0x68/0x398
udp_sock_create+0x88/0xc8
tipc_udp_enable+0x5e8/0x848
__tipc_nl_bearer_enable+0x84c/0xed8
tipc_nl_bearer_enable+0x38/0x60
genl_family_rcv_msg_doit+0x170/0x248
genl_rcv_msg+0x400/0x5b0
netlink_rcv_skb+0x1dc/0x398
genl_rcv+0x44/0x68
netlink_unicast+0x678/0x8b0
netlink_sendmsg+0x5e4/0x898
____sys_sendmsg+0x500/0x830[1]:
BUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]
BUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979
udp_hashslot include/net/udp.h:85 [inline]
udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979
sk_common_release+0xaf/0x3f0 net/core/sock.c:3820
inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437
inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489
__sock_release net/socket.c:658 [inline]
sock_release+0xa0/0x210 net/socket.c:686
cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310
worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391
kthread+0x531/0x6b0 kernel/kthread.c:389
ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244Uninit was created at:
slab_free_hook mm/slub.c:2269 [inline]
slab_free mm/slub.c:4580 [inline]
kmem_cache_free+0x207/0xc40 mm/slub.c:4682
net_free net/core/net_namespace.c:454 [inline]
cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310
worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391
kthread+0x531/0x6b0 kernel/kthread.c:389
ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
Workqueue: events cleanup_bearer | [] |
|
CVE-2024-7498 | itsourcecode Airline Reservation System Admin Login Page login.php login2 sql injection | A vulnerability was found in itsourcecode Airline Reservation System 1.0. It has been classified as critical. Affected is the function login/login2 of the file /admin/login.php of the component Admin Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273624. | [
"cpe:2.3:a:itsourcecode:airline_reservation_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:angeljudesuarez:airline_reservation_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-r55g-hwj5-8wmc | Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors. | [] |
|
CVE-2009-1892 | dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests. | [
"cpe:2.3:a:isc:dhcp:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:3.0.4_b1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:3.0.4_b2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:3.0.4_b3:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:3.1.1:*:*:*:*:*:*:*"
] |
|
GHSA-q3qg-8wgr-x6cr | A vulnerability was found in code-projects Inventory Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /php_action/editPayment.php. The manipulation of the argument orderId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2023-48427 | A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). Affected products do not properly validate the certificate of the configured UMC server. This could allow an attacker to intercept credentials that are sent to the UMC server as well as to manipulate responses, potentially allowing an attacker to escalate privileges. | [
"cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_ins:1.0:sp2_update_1:*:*:*:*:*:*"
] |
|
CVE-2022-48682 | In deletefiles in FDUPES before 2.2.0, a TOCTOU race condition allows arbitrary file deletion via a symlink. | [] |
|
CVE-2025-32260 | WordPress DethemeKit For Elementor plugin <= 2.1.10 - Broken Access Control vulnerability | Missing Authorization vulnerability in Detheme DethemeKit For Elementor. This issue affects DethemeKit For Elementor: from n/a through 2.1.10. | [] |
CVE-2022-24489 | Cluster Client Failover (CCF) Elevation of Privilege Vulnerability | Cluster Client Failover (CCF) Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
GHSA-mjg9-3572-g437 | Tenda AX12 V22.03.01.21_CN is vulnerable to Buffer Overflow. This overflow is triggered in the sub_42FDE4 function, which satisfies the request of the upper-level interface function sub_430124, that is, handles the post request under /goform/SetIpMacBind. | [] |
|
CVE-2022-45401 | Jenkins Associated Files Plugin 0.2.1 and earlier does not escape names of associated files, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [
"cpe:2.3:a:jenkins:associated_files:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2020-6767 | Path Traversal in Bosch Video Management System (BVMS) | A path traversal vulnerability in the Bosch Video Management System (BVMS) FileTransferService allows an authenticated remote attacker to read arbitrary files from the Central Server. This affects Bosch BVMS versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch BVMS Viewer versions 10.0 <= 10.0.0.1225, 9.0 <= 9.0.0.827, 8.0 <= 8.0.329 and 7.5 and older. This affects Bosch DIVAR IP 3000, DIVAR IP 7000 and DIVAR IP all-in-one 5000 if a vulnerable BVMS version is installed. | [
"cpe:2.3:a:bosch:video_management_system_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:video_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:divar_ip_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:divar_ip_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:divar_ip_all-in-one_5000:-:*:*:*:*:*:*:*"
] |
GHSA-823j-2wj6-7jwh | A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0. | [] |
|
GHSA-57gh-wgq6-m27j | query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver. | [] |
|
GHSA-36pq-cjh9-fv46 | Croogo vulnerable to XSS in title field | A stored-self XSS exists in Croogo allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/taxonomy/vocabularies. | [] |
GHSA-fcqf-pgpm-cxg2 | A vulnerability was found in Student Attendance Management System and classified as critical. This issue affects some unknown processing of the file /Admin/createClass.php. The manipulation of the argument Id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-213845 was assigned to this vulnerability. | [] |
|
CVE-2013-4499 | Cross-site scripting (XSS) vulnerability in the Bean module 7.x-1.x before 7.x-1.5 for Drupal allows remote attackers to inject arbitrary web script or HTML via the bean title. | [
"cpe:2.3:a:bean_project:bean:7.x-1.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:bean_project:bean:7.x-1.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:bean_project:bean:7.x-1.2:*:*:*:*:drupal:*:*",
"cpe:2.3:a:bean_project:bean:7.x-1.4:*:*:*:*:drupal:*:*"
] |
|
CVE-2006-4908 | OSU 3.11alpha and 3.10a allows remote attackers to obtain sensitive information via a URL containing an * (asterisk) wildcard, which displays all matching file and directory information. | [
"cpe:2.3:a:ohio_state_university:osu_httpd:3.10a:*:*:*:*:*:*:*",
"cpe:2.3:a:ohio_state_university:osu_httpd:3.11alpha:*:*:*:*:*:*:*"
] |
|
GHSA-hp4c-28j7-2vfq | Cross-site scripting (XSS) vulnerability in the Administrative console in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.47, 7.0 before 7.0.0.27, 8.0 before 8.0.0.6, and 8.5 before 8.5.0.2, when login security is disabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2014-8869 | Multiple cross-site scripting (XSS) vulnerabilities in mobiquo/smartbanner/welcome.php in the Tapatalk (com.tapatalk.wbb4) plugin 1.x before 1.1.2 for Woltlab Burning Board 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) app_android_id or (2) app_kindle_url parameter. | [
"cpe:2.3:a:tapatalk:tapatalk:1.0.0:*:*:*:*:wotlab_burning_board:*:*",
"cpe:2.3:a:tapatalk:tapatalk:1.0.1:*:*:*:*:wotlab_burning_board:*:*",
"cpe:2.3:a:tapatalk:tapatalk:1.0.2:*:*:*:*:wotlab_burning_board:*:*",
"cpe:2.3:a:tapatalk:tapatalk:1.1.0:*:*:*:*:wotlab_burning_board:*:*",
"cpe:2.3:a:tapatalk:tapatalk:1.1.1:*:*:*:*:wotlab_burning_board:*:*"
] |
|
CVE-2024-21752 | WordPress Ajax Search Lite Plugin <= 4.11.4 is vulnerable to Cross Site Scripting (XSS) | Cross-Site Request Forgery (CSRF) vulnerability in Ernest Marcinko Ajax Search Lite allows Reflected XSS.This issue affects Ajax Search Lite: from n/a through 4.11.4.
| [] |
CVE-2015-0391 | Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] |
|
GHSA-wchj-64g6-mrqx | Format string vulnerability in the logging function for the pam_ldap PAM LDAP module before version 144 allows attackers to execute arbitrary code via format strings in the configuration file name. | [] |
|
CVE-2025-6962 | Campcodes Employee Management System myprofileup.php sql injection | A vulnerability, which was classified as critical, was found in Campcodes Employee Management System 1.0. This affects an unknown part of the file /myprofileup.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-gp57-fv82-mv79 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, lack of input validation could lead to an untrusted pointer dereference in wv_dash_core_generic_verify(). | [] |
|
CVE-2014-125027 | Yuna Scatari TBDev usersearch.php get_user_icons cross site scripting | A vulnerability has been found in Yuna Scatari TBDev up to 2.1.17 and classified as problematic. Affected by this vulnerability is the function get_user_icons of the file usersearch.php. The manipulation of the argument n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.18 is able to address this issue. The patch is named 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217147. | [
"cpe:2.3:a:tbdev_project:tbdev:*:*:*:*:*:*:*:*"
] |
GHSA-9h8x-j6vr-8v9f | This issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may be able to access sensitive user data. | [] |
|
CVE-2017-11840 | ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. | [
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*"
] |
|
GHSA-vcw7-84v8-pfqh | A vulnerability exists in the Rockwell Automation ThinManager® ThinServer that allows a threat actor to disclose sensitive information. A threat actor can exploit this vulnerability by abusing the ThinServer™ service to read arbitrary files by creating a junction that points to the target directory. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.