id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-vjff-mhv7-25px
|
Unspecified vulnerability in Cisco Intrusion Prevention System (IPS) 5.x before 5.1(8)E2 and 6.x before 6.0(5)E2, when inline mode and jumbo Ethernet support are enabled, allows remote attackers to cause a denial of service (panic), and possibly bypass intended restrictions on network traffic, via a "specific series of jumbo Ethernet frames."
|
[] |
|
CVE-2003-1424
|
message.php in Petitforum does not properly authenticate users, which allows remote attackers to impersonate forum users via a modified connect cookie.
|
[
"cpe:2.3:a:petitforum:petitforum:*:*:*:*:*:*:*:*"
] |
|
GHSA-2879-8cxh-4cm7
|
In all Android releases from CAF using the Linux kernel, a race condition potentially exists in the ioctl handler of a sound driver.
|
[] |
|
GHSA-6prr-mp53-33xp
|
Stack-based buffer overflow in Triologic Media Player 7 and 8.0.0.0 allows user-assisted remote attackers to execute arbitrary code via a long string in a .m3u playlist file. NOTE: some of these details are obtained from third party information.
|
[] |
|
GHSA-8g7q-j2w9-qr8r
|
In the Linux kernel, the following vulnerability has been resolved:HID: amd_sfh: Switch to device-managed dmam_alloc_coherent()Using the device-managed version allows to simplify clean-up in probe()
error path.Additionally, this device-managed ensures proper cleanup, which helps to
resolve memory errors, page faults, btrfs going read-only, and btrfs
disk corruption.
|
[] |
|
CVE-2024-10272
|
Broken Access Control in lunary-ai/lunary
|
lunary-ai/lunary is vulnerable to broken access control in the latest version. An attacker can view the content of any dataset without any kind of authorization by sending a GET request to the /v1/datasets endpoint without a valid authorization token.
|
[] |
CVE-2010-3438
|
libpoe-component-irc-perl before v6.32 does not remove carriage returns and line feeds. This can be used to execute arbitrary IRC commands by passing an argument such as "some text\rQUIT" to the 'privmsg' handler, which would cause the client to disconnect from the server.
|
[
"cpe:2.3:a:libpoe-component-irc-perl_project:libpoe-component-irc-perl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*"
] |
|
CVE-2016-4690
|
An issue was discovered in certain Apple products. iOS before 10.2 is affected. The issue involves the "Image Capture" component, which allows attackers to execute arbitrary code via a crafted USB HID device.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-38182
|
Due to insufficient input validation of Kyma, authenticated users can pass a Header of their choice and escalate privileges which can completely compromise the cluster.
|
[
"cpe:2.3:a:kyma-project:kyma:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-38368
|
IBM Security Access Manager Docker information disclosure
|
IBM Security Access Manager Docker 10.0.0.0 through 10.0.7.1 could disclose sensitive information to a local user to do improper permission controls. IBM X-Force ID: 261195.
|
[
"cpe:2.3:a:ibm:security_verify_access_docker:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access_docker:10.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager:*:*:*:*:*:*:*:*"
] |
GHSA-h7cw-m84h-c746
|
Voltronic Power ViewPower MonitorConsole Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Voltronic Power ViewPower. Authentication is not required to exploit this vulnerability.The specific flaw exists within the MonitorConsole class. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-22011.
|
[] |
|
GHSA-xmcq-hv2q-36wr
|
MKCMS V6.2 has SQL injection via the /ucenter/repass.php name parameter.
|
[] |
|
CVE-2008-0432
|
Cross-site scripting (XSS) vulnerability in index.php in phpAutoVideo 2.21 and earlier allows remote attackers to inject arbitrary web script or HTML via the cat parameter.
|
[
"cpe:2.3:a:agares_media:phpautovideo:*:*:*:*:*:*:*:*"
] |
|
GHSA-ph88-p5w9-85wg
|
WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1.
|
[] |
|
GHSA-8f6g-3vwc-x2w6
|
A vulnerability within the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victims browser in the context of the affected interface.
|
[] |
|
GHSA-4vc4-pm9p-xmjm
|
In radare2 through 3.5.1, cmd_mount in libr/core/cmd_mount.c has a double free for the ms command.
|
[] |
|
CVE-2023-41120
|
An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It permits an authenticated user to use DBMS_PROFILER to remove all accumulated profiling data on a system-wide basis, regardless of that user's permissions.
|
[
"cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-r54v-c2hx-5x23
|
Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)
|
[] |
|
GHSA-32p4-jcjv-28cx
|
add_bookmark.php in Active PHP Bookmarks (APB) 1.1.01 allows remote attackers to add arbitrary bookmarks as other users using a modified auth_user_id parameter.
|
[] |
|
GHSA-v87x-w98p-pcgx
|
Cross-Site Request Forgery (CSRF) vulnerability in ThemeKraft TK Google Fonts GDPR Compliant plugin <=Â 2.2.11 versions.
|
[] |
|
CVE-2017-16512
|
The vagrant update process in Hashicorp vagrant-vmware-fusion 5.0.2 through 5.0.4 allows local users to steal root privileges via a crafted update request when no updates are available.
|
[
"cpe:2.3:a:hashicorp:vagrant_vmware_fusion:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-7806
|
Tenda FH451 SafeClientFilter fromSafeClientFilter stack-based overflow
|
A vulnerability classified as critical was found in Tenda FH451 1.0.0.9. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter. The manipulation of the argument Go/page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] |
CVE-2020-0431
|
In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] |
|
CVE-2012-6550
|
Cross-site scripting (XSS) vulnerability in ZeroClipboard before 1.1.4 allows remote attackers to inject arbitrary web script or HTML via "the clipText returned from the flash object," a different vulnerability than CVE-2013-1808.
|
[
"cpe:2.3:a:zeroclipboard_project:zeroclipboard:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zeroclipboard_project:zeroclipboard:1.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-35c7-w35f-xwgh
|
Kube-proxy may unintentionally forward traffic
|
Kube-proxy on Windows can unintentionally forward traffic to local processes listening on the same port (`spec.ports[*].port`) as a LoadBalancer Service when the LoadBalancer controller does not set the `status.loadBalancer.ingress[].ip` field. Clusters
where the LoadBalancer controller sets the `status.loadBalancer.ingress[].ip` field are unaffected.
|
[] |
GHSA-926x-7qx8-c8j2
|
admin/login.php in BilboBlog 0.2.1, when register_globals is enabled, allows remote attackers to bypass authentication and obtain administrative access via a direct request that sets the login, admin_login, password, and admin_passwd parameters.
|
[] |
|
GHSA-mwq7-4r6c-mwqg
|
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions.
|
[] |
|
CVE-2021-22221
|
An issue has been discovered in GitLab affecting all versions starting from 12.9.0 before 13.10.5, all versions starting from 13.11.0 before 13.11.5, all versions starting from 13.12.0 before 13.12.2. Insufficient expired password validation in various operations allow user to maintain limited access after their password expired
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2012-2926
|
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
|
[
"cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-12443
|
CRM Perks – WordPress HelpDesk Integration – Zendesk, Freshdesk, HelpScout <= 1.1.6 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The CRM Perks – WordPress HelpDesk Integration – Zendesk, Freshdesk, HelpScout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'crm-perks-tickets' shortcode in all versions up to, and including, 1.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
GHSA-575x-g3c6-7cx3
|
The Small Package Quotes – Purolator Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] |
|
CVE-2001-0854
|
PHP-Nuke 5.2 allows remote attackers to copy and delete arbitrary files by calling case.filemanager.php with admin.php as an argument, which sets the $PHP_SELF variable and makes it appear that case.filemanager.php is being called by admin.php instead of the user.
|
[
"cpe:2.3:a:francisco_burzi:php-nuke:5.2:*:*:*:*:*:*:*"
] |
|
CVE-2021-34349
|
Command Injection Vulnerability in QVR
|
A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210803 and later
|
[
"cpe:2.3:a:qnap:qvr:*:*:*:*:*:*:*:*"
] |
GHSA-vcxr-84m6-prj4
|
SQL injection vulnerability in admin.php in WebCards 1.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the user parameter. NOTE: some of these details are obtained from third party information.
|
[] |
|
CVE-2025-37960
|
memblock: Accept allocated memory before use in memblock_double_array()
|
In the Linux kernel, the following vulnerability has been resolved:
memblock: Accept allocated memory before use in memblock_double_array()
When increasing the array size in memblock_double_array() and the slab
is not yet available, a call to memblock_find_in_range() is used to
reserve/allocate memory. However, the range returned may not have been
accepted, which can result in a crash when booting an SNP guest:
RIP: 0010:memcpy_orig+0x68/0x130
Code: ...
RSP: 0000:ffffffff9cc03ce8 EFLAGS: 00010006
RAX: ff11001ff83e5000 RBX: 0000000000000000 RCX: fffffffffffff000
RDX: 0000000000000bc0 RSI: ffffffff9dba8860 RDI: ff11001ff83e5c00
RBP: 0000000000002000 R08: 0000000000000000 R09: 0000000000002000
R10: 000000207fffe000 R11: 0000040000000000 R12: ffffffff9d06ef78
R13: ff11001ff83e5000 R14: ffffffff9dba7c60 R15: 0000000000000c00
memblock_double_array+0xff/0x310
memblock_add_range+0x1fb/0x2f0
memblock_reserve+0x4f/0xa0
memblock_alloc_range_nid+0xac/0x130
memblock_alloc_internal+0x53/0xc0
memblock_alloc_try_nid+0x3d/0xa0
swiotlb_init_remap+0x149/0x2f0
mem_init+0xb/0xb0
mm_core_init+0x8f/0x350
start_kernel+0x17e/0x5d0
x86_64_start_reservations+0x14/0x30
x86_64_start_kernel+0x92/0xa0
secondary_startup_64_no_verify+0x194/0x19b
Mitigate this by calling accept_memory() on the memory range returned
before the slab is available.
Prior to v6.12, the accept_memory() interface used a 'start' and 'end'
parameter instead of 'start' and 'size', therefore the accept_memory()
call must be adjusted to specify 'start + size' for 'end' when applying
to kernels prior to v6.12.
|
[] |
GHSA-h53p-rqw3-mjw4
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The Moneytizer allows Stored XSS.This issue affects The Moneytizer: from n/a through 9.5.20.
|
[] |
|
CVE-2022-49767
|
9p/trans_fd: always use O_NONBLOCK read/write
|
In the Linux kernel, the following vulnerability has been resolved:
9p/trans_fd: always use O_NONBLOCK read/write
syzbot is reporting hung task at p9_fd_close() [1], for p9_mux_poll_stop()
from p9_conn_destroy() from p9_fd_close() is failing to interrupt already
started kernel_read() from p9_fd_read() from p9_read_work() and/or
kernel_write() from p9_fd_write() from p9_write_work() requests.
Since p9_socket_open() sets O_NONBLOCK flag, p9_mux_poll_stop() does not
need to interrupt kernel_read()/kernel_write(). However, since p9_fd_open()
does not set O_NONBLOCK flag, but pipe blocks unless signal is pending,
p9_mux_poll_stop() needs to interrupt kernel_read()/kernel_write() when
the file descriptor refers to a pipe. In other words, pipe file descriptor
needs to be handled as if socket file descriptor.
We somehow need to interrupt kernel_read()/kernel_write() on pipes.
A minimal change, which this patch is doing, is to set O_NONBLOCK flag
from p9_fd_open(), for O_NONBLOCK flag does not affect reading/writing
of regular files. But this approach changes O_NONBLOCK flag on userspace-
supplied file descriptors (which might break userspace programs), and
O_NONBLOCK flag could be changed by userspace. It would be possible to set
O_NONBLOCK flag every time p9_fd_read()/p9_fd_write() is invoked, but still
remains small race window for clearing O_NONBLOCK flag.
If we don't want to manipulate O_NONBLOCK flag, we might be able to
surround kernel_read()/kernel_write() with set_thread_flag(TIF_SIGPENDING)
and recalc_sigpending(). Since p9_read_work()/p9_write_work() works are
processed by kernel threads which process global system_wq workqueue,
signals could not be delivered from remote threads when p9_mux_poll_stop()
from p9_conn_destroy() from p9_fd_close() is called. Therefore, calling
set_thread_flag(TIF_SIGPENDING)/recalc_sigpending() every time would be
needed if we count on signals for making kernel_read()/kernel_write()
non-blocking.
[Dominique: add comment at Christian's suggestion]
|
[] |
CVE-2022-49413
|
bfq: Update cgroup information before merging bio
|
In the Linux kernel, the following vulnerability has been resolved:
bfq: Update cgroup information before merging bio
When the process is migrated to a different cgroup (or in case of
writeback just starts submitting bios associated with a different
cgroup) bfq_merge_bio() can operate with stale cgroup information in
bic. Thus the bio can be merged to a request from a different cgroup or
it can result in merging of bfqqs for different cgroups or bfqqs of
already dead cgroups and causing possible use-after-free issues. Fix the
problem by updating cgroup information in bfq_merge_bio().
|
[] |
GHSA-8499-m9hr-266h
|
Microsoft Outlook Memory Corruption Vulnerability
|
[] |
|
GHSA-cwqv-628v-v6fj
|
The SKT Blocks – Gutenberg based Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's skt-blocks/post-carousel block in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
GHSA-v859-v234-c2mg
|
The Fancy Product Designer WordPress plugin before 6.1.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against unauthenticated and admin-level users
|
[] |
|
GHSA-xrw2-79w2-6fm9
|
Vulnerability in the Essbase Administration Services product of Oracle Essbase (component: EAS Console). The supported version that is affected is Prior to 11.1.2.4.046. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Essbase Administration Services. While the vulnerability is in Essbase Administration Services, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Essbase Administration Services accessible data. CVSS 3.1 Base Score 7.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
|
[] |
|
GHSA-qhm6-372r-77h8
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] |
|
CVE-2019-13341
|
In MiniCMS V1.10, stored XSS was found in mc-admin/conf.php (comment box), which can be used to get a user's cookie.
|
[
"cpe:2.3:a:1234n:minicms:1.10:*:*:*:*:*:*:*"
] |
|
CVE-2021-44273
|
e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to, and thus was itself vulnerable to MITM attacks.
|
[
"cpe:2.3:a:e2bn:e2guardian:*:*:*:*:*:*:*:*"
] |
|
GHSA-3v5g-chfr-w797
|
An issue was discovered in Luvion Grand Elite 3 Connect through 2020-02-25. Clients can authenticate themselves to the device using a username and password. These credentials can be obtained through an unauthenticated web request, e.g., for a JavaScript file. Also, the disclosed information includes the SSID and WPA2 key for the Wi-Fi network the device is connected to.
|
[] |
|
GHSA-8rmw-8cch-2w5c
|
An XSS vulnerability exists in GitLab CE/EE affecting all versions from 13.3 prior to 17.6.5, 17.7 prior to 17.7.4 and 17.8 prior to 17.8.2 that allows an attacker to execute unauthorized actions via a change page.
|
[] |
|
CVE-2011-1049
|
Buffer overflow in the Mach-O input file loader in Hex-Rays IDA Pro 5.7 and 6.0 allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Macho-O file.
|
[
"cpe:2.3:a:hex-rays:ida:5.7:*:pro:*:*:*:*:*",
"cpe:2.3:a:hex-rays:ida:6.0:*:pro:*:*:*:*:*"
] |
|
CVE-2022-23023
|
On BIG-IP version 16.1.x before 16.1.2.1, 15.1.x before 15.1.5, 14.1.x before 14.1.4.5, and all versions of 13.1.x and 12.1.x, and BIG-IQ all versions of 8.x and 7.x, undisclosed requests by an authenticated iControl REST user can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*"
] |
|
GHSA-fjw9-mvg3-xvvg
|
On the D-Link DIR-615 before v20.12PTb04, if a victim logged in to the Router's Web Interface visits a malicious site from another Browser tab, the malicious site then can send requests to the victim's Router without knowing the credentials (CSRF). An attacker can host a page that sends a POST request to Form2File.htm that tries to upload Firmware to victim's Router. This causes the router to reboot/crash resulting in Denial of Service. An attacker may succeed in uploading malicious Firmware.
|
[] |
|
CVE-2005-0808
|
Apache Tomcat before 5.x allows remote attackers to cause a denial of service (application crash) via a crafted AJP12 packet to TCP port 8007.
|
[
"cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*"
] |
|
CVE-2023-52827
|
wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats()
|
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats()
len is extracted from HTT message and could be an unexpected value in
case errors happen, so add validation before using to avoid possible
out-of-bound read in the following message iteration and parsing.
The same issue also applies to ppdu_info->ppdu_stats.common.num_users,
so validate it before using too.
These are found during code review.
Compile test only.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-rmjj-8r22-rwhv
|
The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the stopOptimizeAll function in all versions up to, and including, 3.1.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify image optimization settings.
|
[] |
|
CVE-2019-2959
|
Vulnerability in the Hyperion Financial Reporting product of Oracle Hyperion (component: Security Models). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Financial Reporting. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Hyperion Financial Reporting accessible data. CVSS 3.0 Base Score 4.2 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:N).
|
[
"cpe:2.3:a:oracle:hyperion_financial_reporting:11.1.2.4:*:*:*:*:*:*:*"
] |
|
GHSA-c3v2-5388-v8pw
|
CSRF vulnerability in Jenkins Coverity Plugin allow capturing credentials
|
Missing permission checks in Synopsys Jenkins Coverity Plugin 3.0.2 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[] |
GHSA-79cx-xh5h-4vrc
|
Multiple buffer overflows in multiple unspecified implementations of Internet Key Exchange version 1 (IKEv1) have multiple unspecified attack vectors and impacts related to denial of service, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of information in the original sources, it is likely that this candidate will be REJECTed once it is known which implementations are actually vulnerable.
|
[] |
|
GHSA-cxq6-hjjh-rjpm
|
Tridium Niagara AX Framework does not properly store credential data, which allows context-dependent attackers to bypass intended access restrictions by using the stored information for authentication.
|
[] |
|
GHSA-9969-ch68-9vj9
|
Buffer overflow in search.cgi in mnoGoSearch 3.1.19 and earlier allows remote attackers to execute arbitrary code via a long query (q) parameter.
|
[] |
|
CVE-2025-28235
|
An information disclosure vulnerability in the component /socket.io/1/websocket/ of Soundcraft Ui Series Model(s) Ui12 and Ui16 Firmware v1.0.7x and v1.0.5x allows attackers to access Administrator credentials in plaintext.
|
[] |
|
CVE-2010-3148
|
Untrusted search path vulnerability in Microsoft Visio 2003 SP3 allows local users to gain privileges via a Trojan horse mfc71enu.dll file in the current working directory, as demonstrated by a directory that contains a .vsd, .vdx, .vst, or .vtx file, aka "Microsoft Visio Insecure Library Loading Vulnerability."
|
[
"cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*"
] |
|
CVE-2020-0665
|
An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest, aka 'Active Directory Elevation of Privilege Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-3248
|
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.0 and 12.2.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS v3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).
|
[
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-0624
|
Untrusted search path vulnerability in Multiple Yayoi 17 Series products (Yayoi Kaikei 17 Series Ver.23.1.1 and earlier, Yayoi Aoiro Shinkoku 17 Ver.23.1.1 and earlier, Yayoi Kyuuyo 17 Ver.20.1.4 and earlier, Yayoi Kyuuyo Keisan 17 Ver.20.1.4 and earlier, Yayoi Hanbai 17 Series Ver.20.0.2 and earlier, and Yayoi Kokyaku Kanri 17 Ver.11.0.2 and earlier) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. This flaw exists within the handling of ykkapi.dll loaded by the vulnerable products.
|
[
"cpe:2.3:a:yayoi-kk:aoiro_shinkoku:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yayoi-kk:hanbai:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yayoi-kk:kaikei:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yayoi-kk:kokyaku_kanri:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yayoi-kk:kyuuyo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yayoi-kk:kyuuyo_keisan:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-6859
|
A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-8734
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13, iCloud for Windows 7.14, iCloud for Windows 10.7, Safari 13, tvOS 13, watchOS 6, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-c529-rjcg-qqqv
|
In phNxpNciHal_send_ext_cmd of phNxpNciHal_ext.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the NFC server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153731369
|
[] |
|
CVE-2016-4873
|
Cybozu Office 9.0.0 to 10.4.0 allows remote authenticated attackers to execute unintended operations via the Project function.
|
[
"cpe:2.3:a:cybozu:office:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:9.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:office:10.4.0:*:*:*:*:*:*:*"
] |
|
CVE-2016-10819
|
In cPanel before 57.9999.54, user log files become world-readable when rotated by cpanellogd (SEC-125).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
GHSA-8wx2-9q48-vm9r
|
RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application
|
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.
|
[] |
CVE-2013-3124
|
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3117 and CVE-2013-3122.
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] |
|
CVE-2021-39835
|
Adobe FrameMaker PDF File Parsing Use-After-Free Information Disclosure Vulnerability
|
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed PDF file that could result in disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.
|
[
"cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2013-4689
|
J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1R before 12.1R6, 12.1X44 before 12.1X44-D15, 12.1x45 before 12.1X45-D10, 12.2 before 12.2R3, 12.3 before 12.3R2, and 13.1 before 13.1R3 allow remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism and hijack the authentication of administrators for requests that (1) create new administrator accounts or (2) have other unspecified impacts.
|
[
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x45:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.1:*:*:*:*:*:*:*"
] |
|
CVE-2025-21635
|
rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy
|
In the Linux kernel, the following vulnerability has been resolved:
rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy
As mentioned in a previous commit of this series, using the 'net'
structure via 'current' is not recommended for different reasons:
- Inconsistency: getting info from the reader's/writer's netns vs only
from the opener's netns.
- current->nsproxy can be NULL in some cases, resulting in an 'Oops'
(null-ptr-deref), e.g. when the current task is exiting, as spotted by
syzbot [1] using acct(2).
The per-netns structure can be obtained from the table->data using
container_of(), then the 'net' one can be retrieved from the listen
socket (if available).
|
[] |
CVE-2014-5068
|
Directory traversal vulnerability in the web application in Symmetricom s350i 2.70.15 allows remote attackers to read arbitrary files via a (1) ../ (dot dot slash) or (2) ..\ (dot dot forward slash) before a file name.
|
[
"cpe:2.3:o:microsemi:s350i_firmware:2.70.15:*:*:*:*:*:*:*",
"cpe:2.3:h:microsemi:s350i:-:*:*:*:*:*:*:*"
] |
|
GHSA-p8fp-2p2f-mfw4
|
Multiple cross-site scripting (XSS) vulnerabilities in zencart-ja (aka Zen Cart Japanese edition) 1.3 jp through 1.3.0.2 jp8 and 1.5 ja through 1.5.1 ja allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to admin/includes/init_includes/init_sanitize.php and includes/init_includes/init_sanitize.php.
|
[] |
|
GHSA-9cfp-2g6x-m8f6
|
Base-VxFS-50 B.05.00.01 through B.05.00.02, Base-VxFS-501 B.05.01.0 through B.05.01.03, and Base-VxFS-51 B.05.10.00 through B.05.10.02 on HPE HP-UX 11iv3 with VxFS 5.0, VxFS 5.0.1, and VxFS 5.1SP1 mishandles ACL inheritance for default:class: entries, default:other: entries, and default:user: entries, which allows local users to bypass intended access restrictions by leveraging the configuration of a parent directory.
|
[] |
|
CVE-2021-25362
|
An improper permission management in CertInstaller prior to SMR APR-2021 Release 1 allows untrusted applications to delete certain local files.
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-9qhf-5qfv-p985
|
Maccms v10 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in /admin.php/admin/ulog/index.html via the wd parameter.
|
[] |
|
GHSA-hxjq-34qw-cvqm
|
Potential open redirection vulnerability when URL is crafted in specific format in NetIQ Access Manager prior to 5.0.2
|
[] |
|
GHSA-fmm4-6229-62j8
|
Cisco IOS 12.2, 12.4, 15.0, 15.1, 15.2, 15.3, and 15.4 and IOS XE 2.5.x, 2.6.x, 3.1.xS through 3.12.xS before 3.12.3S, 3.2.xE through 3.7.xE before 3.7.1E, 3.3.xSG, 3.4.xSG, and 3.13.xS before 3.13.2S allow remote attackers to cause a denial of service (memory consumption and device reload) by sending malformed IKEv2 packets over (1) IPv4 or (2) IPv6, aka Bug ID CSCuo75572.
|
[] |
|
GHSA-9mp8-vffv-mgvx
|
Sematell ReplyOne 7.4.3.0 has Insecure Permissions for the /rest/sessions endpoint.
|
[] |
|
CVE-2022-43859
|
IBM Navigator for i SQL injection
|
IBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information for an object they are authorized to but not while using this interface. By performing a UNION based SQL injection an attacker could see file permissions through this interface. IBM X-Force ID: 239304.
|
[
"cpe:2.3:o:ibm:i:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:7.5:*:*:*:*:*:*:*"
] |
GHSA-8hwf-xp46-jg5w
|
An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6, Community Edition 6.0.x through 6.0.17, and OTRSAppointmentCalendar 5.0.x through 5.0.12. An attacker who is logged into OTRS as an agent with appropriate permissions may create a carefully crafted calendar appointment in order to cause execution of JavaScript in the context of OTRS.
|
[] |
|
CVE-2024-10957
|
UpdraftPlus: WP Backup & Migration Plugin 1.23.8 - 1.24.11 - Unauthenticated PHP Object Injection
|
The UpdraftPlus: WP Backup & Migration Plugin plugin for WordPress is vulnerable to PHP Object Injection in all versions from 1.23.8 to 1.24.11 via deserialization of untrusted input in the 'recursive_unserialized_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. An administrator must perform a search and replace action to trigger the exploit.
|
[] |
GHSA-hq88-wg7q-gp4g
|
mlflow vulnerable to Path Traversal
|
mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowing attackers to bypass checks and read arbitrary files on the system. The issue arises from the 'is_local_uri' function's failure to properly handle URIs with empty or 'file' schemes, leading to the misclassification of URIs as non-local. Attackers can exploit this by crafting malicious model versions with specially crafted 'source' parameters, enabling the reading of sensitive files within at least two directory levels from the server's root.
|
[] |
CVE-2015-0445
|
Unspecified vulnerability in the Oracle Data Integrator component in Oracle Fusion Middleware 11.1.1.3.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Data Quality based on Trillium, a different vulnerability than CVE-2015-0443, CVE-2015-0444, CVE-2015-0446, CVE-2015-2634, CVE-2015-2635, CVE-2015-2636, CVE-2015-4758, and CVE-2015-4759.
|
[
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.3.0:*:*:*:*:*:*:*"
] |
|
GHSA-2r55-9wvv-jwfw
|
Product Show Room Site v1.0 is vulnerable to SQL Injection via /psrs/admin/categories/view_category.php?id=.
|
[] |
|
GHSA-44pw-f9wr-w46w
|
Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via crafted Shockwave content on a web site, related to an "invalid pointer vulnerability," a different issue than CVE-2009-3464. NOTE: some of these details are obtained from third party information.
|
[] |
|
GHSA-8pcm-hgjf-6vp8
|
upload.php in tianchoy/blog through 2017-09-12 allows unrestricted file upload and PHP code execution by using the image/jpeg, image/pjpeg, image/png, or image/gif content type for a .php file.
|
[] |
|
GHSA-5j94-f3mf-8685
|
@backstage/plugin-techdocs-backend vulnerable to circumvention of cross site scripting protection
|
ImpactAn attacker with control of the contents of the TechDocs storage buckets is able to inject executable scripts in the TechDocs content that will be executed in the victim's browser when browsing documentation or navigating to an attacker provided link.PatchesThis has been fixed in the 1.10.13 release of the `@backstage/plugin-techdocs-backend` package.ReferencesIf you have any questions or comments about this advisory:Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
Visit our Discord, linked to in [Backstage README](https://github.com/backstage/backstage)
|
[] |
GHSA-2556-7mq8-5gp5
|
Unspecified vulnerability in a TList 6 ActiveX control in Oracle Hyperion Financial Management 11.1.1.4 and 11.1.2.1.104 allows remote attackers to execute arbitrary code via unknown vectors.
|
[] |
|
GHSA-jwrw-2fh5-fg85
|
Cross-site Scripting (XSS) vulnerability in BlueSpiceSocialProfile extension of BlueSpice allows user with comment permissions to inject arbitrary HTML into the comment section of a wikipage.
|
[] |
|
GHSA-75m5-rxwg-h223
|
In the Linux kernel, the following vulnerability has been resolved:media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entityThe entity->name (i.e. name) is allocated in v4l2_m2m_register_entity
but isn't freed in its following error-handling paths. This patch
adds such deallocation to prevent memleak of entity->name.
|
[] |
|
GHSA-jrwq-36rx-842c
|
A vulnerability in client join services of Cisco Webex Meetings could allow an unauthenticated, remote attacker to manipulate cached HTTP responses within the meeting join service.This vulnerability is due to improper handling of malicious HTTP requests to the affected service. An attacker could exploit this vulnerability by manipulating stored HTTP responses within the service, also known as HTTP cache poisoning. A successful exploit could allow the attacker to cause the Webex Meetings service to return incorrect HTTP responses to clients.
|
[] |
|
GHSA-wx58-x3rj-qg57
|
A vulnerability was found in Zhong Bang CRMEB up to 4.6.0. It has been declared as problematic. Affected by this vulnerability is the function put_image of the file api/controller/v1/PublicController.php. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231505 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-m93f-p8vw-36gf
|
index.php in Wheatblog (wB) allows remote attackers to obtain sensitive information via certain values of the postPtr[] and next parameters, which reveals the path in an error message.
|
[] |
|
CVE-2024-2642
|
Ruijie RG-NBS2009G-P EXCU_SHELL command injection
|
A vulnerability was found in Ruijie RG-NBS2009G-P up to 20240305. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /EXCU_SHELL. The manipulation of the argument Command1 leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257281 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:ruijie:rg-nbs2009g-p_firmware:*:*:*:*:*:*:*:*"
] |
GHSA-r9fp-qw2c-8cxh
|
The web framework in Cisco Prime Central for Hosted Collaboration Solution (HCS) Assurance before 9.1.1 does not properly determine the existence of an authenticated session, which allows remote attackers to discover usernames and passwords via an HTTP request, aka Bug ID CSCud32600.
|
[] |
|
GHSA-rm9r-mxqr-25v7
|
The XML-RPC implementation on Cisco TelePresence Recording Server devices with software 1.6.x and 1.7.x before 1.7.1 allows remote attackers to overwrite files and consequently execute arbitrary code via a malformed request, aka Bug ID CSCti50739.
|
[] |
|
CVE-2020-11907
|
The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP.
|
[
"cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.