id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-fx6h-76pp-7h3v
|
An issue was discovered in YzmCMS 3.8. There is a CSRF vulnerability that can add an admin account via /index.php/admin/admin_manage/add.html.
|
[] |
|
GHSA-r5vw-pf7p-6hgj
|
Cross-site scripting (XSS) vulnerability in the Stickynote module 7.x before 7.x-1.3 for Drupal allows remote authenticated users with permission to create or edit a stickynote to inject arbitrary web script or HTML via note text on the admin listing page.
|
[] |
|
CVE-2023-29478
|
BiblioCraft before 2.4.6 does not sanitize path-traversal characters in filenames, allowing restricted write access to almost anywhere on the filesystem. This includes the Minecraft mods folder, which results in code execution.
|
[
"cpe:2.3:a:bibliocraftmod:bibliocraft:*:*:*:*:*:minecraft:*:*"
] |
|
GHSA-w54w-cwh9-m6xv
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in kaptinlin Striking allows Path Traversal.This issue affects Striking: from n/a through 2.3.4.
|
[] |
|
GHSA-9hqh-9j5r-25hr
|
Stack-based buffer overflow in the giomgr process in ESRI ArcSDE service 9.2, as used with ArcGIS, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number that requires more than 8 bytes to represent in ASCII, which triggers the overflow in an sprintf function call.
|
[] |
|
GHSA-wj3m-9v78-x5g4
|
In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification does not reject excess data after the hash value. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation through fake X.509 certificates. This is a variant of CVE-2006-4340.
|
[] |
|
GHSA-vqg7-8v6x-54rq
|
Magento security mitigation bypass vulnerability
|
Magento versions 2.3.5-p1 and earlier, and 2.3.5-p1 and earlier have a security mitigation bypass vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] |
CVE-2001-0467
|
Directory traversal vulnerability in RobTex Viking Web server before 1.07-381 allows remote attackers to read arbitrary files via a \... (modified dot dot) in an HTTP URL request.
|
[
"cpe:2.3:a:robtex:viking_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-5975
|
The ImageMapper plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.6. This is due to missing or incorrect nonce validation on multiple functions. This makes it possible for unauthenticated attackers to update the plugin settings via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:imagemapper_project:imagemapper:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2020-15685
|
During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.
|
[
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-5386
|
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initialization vector.
|
[
"cpe:2.3:a:facebook:hiphop_virtual_machine:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-0401
|
Path Traversal in yuda-lyu/w-zip
|
Path Traversal in NPM w-zip prior to 1.0.12.
|
[
"cpe:2.3:a:w-zip_project:w-zip:*:*:*:*:*:*:*:*"
] |
CVE-2023-27387
|
Cross-site request forgery (CSRF) in T&D Corporation and ESPEC MIC CORP. data logger products allows a remote unauthenticated attacker to conduct an arbitrary operation by having a logged-in user view a malicious page. Affected products and versions are as follows: T&D Corporation data logger products (TR-71W/72W all firmware versions, RTR-5W all firmware versions, WDR-7 all firmware versions, WDR-3 all firmware versions, and WS-2 all firmware versions), and ESPEC MIC CORP. data logger products (RT-12N/RS-12N all firmware versions, RT-22BN all firmware versions, and TEU-12N all firmware versions).
|
[
"cpe:2.3:o:tandd:tr-71w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tandd:tr-71w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tandd:tr-72w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tandd:tr-72w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tandd:rtr-5w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tandd:rtr-5w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tandd:wdr-7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tandd:wdr-7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tandd:wdr-3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tandd:wdr-3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tandd:ws-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tandd:ws-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:especmic:rt-12n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:especmic:rt-12n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:especmic:rs-12n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:especmic:rs-12n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:especmic:rt-22bn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:especmic:rt-22bn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:especmic:teu-12n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:especmic:teu-12n:-:*:*:*:*:*:*:*"
] |
|
GHSA-8482-wc7m-w3q5
|
An arbitrary file upload vulnerability in the uploadFileAction() function of WonderCMS v3.4.3 allows attackers to execute arbitrary code via a crafted SVG file.
|
[] |
|
CVE-2021-4371
|
The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Setting Changs in versions up to, and including, 5.5. This is due to lacking both a security nonce and a capabilities check. This makes it possible for low-authenticated attackers to change plugin settings even when they do not have the capabilities to do so.
|
[
"cpe:2.3:a:pluginmirror:wp_quick_frontend_editor:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2014-5014
|
The WordPress Flash Uploader plugin before 3.1.3 for WordPress allows remote attackers to execute arbitrary commands via vectors related to invalid characters in image_magic_path.
|
[
"cpe:2.3:a:tinywebgallery:wordpress_flash_uploader:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2000-0947
|
Format string vulnerability in cfd daemon in GNU CFEngine before 1.6.0a11 allows attackers to execute arbitrary commands via format characters in the CAUTH command.
|
[
"cpe:2.3:a:gnu:cfengine:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:1.5.3-4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:cfengine:1.6:a10:*:*:*:*:*:*"
] |
|
CVE-2019-16123
|
In Kartatopia PilusCart 1.4.1, the parameter filename in the file catalog.php is mishandled, leading to ../ Local File Disclosure.
|
[
"cpe:2.3:a:kartatopia:piluscart:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-2621
|
Unspecified vulnerability in the PeopleSoft PeopleTools component in Oracle PeopleSoft Enterprise and JD Edwards EnterpriseOne 8.48.17 and 8.49.11 has unknown impact and remote authenticated attack vectors, a different vulnerability than CVE-2008-2615, CVE-2008-2616, CVE-2008-2617, CVE-2008-2618, CVE-2008-2620, and CVE-2008-2622.
|
[
"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.48.17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone:8.49.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.48.17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise:8.49.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_peopletools_component:-:*:*:*:*:*:*:*"
] |
|
GHSA-vh22-7653-gg93
|
IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to perform unauthorized actions due to improper access controls. IBM X-Force ID: 260577.
|
[] |
|
CVE-2012-0866
|
CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 does not properly check the execute permission for trigger functions marked SECURITY DEFINER, which allows remote authenticated users to execute otherwise restricted triggers on arbitrary data by installing the trigger on an attacker-owned table.
|
[
"cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*"
] |
|
GHSA-9qhq-2jfg-322h
|
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an unauthenticated zy_get_instances_for_update API.
|
[] |
|
GHSA-87q6-mg5f-mp98
|
** DISPUTED ** The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification.
|
[] |
|
CVE-2021-22733
|
Improper Privilege Management vulnerability exists in homeLYnk (Wiser For KNX) and spaceLYnk V2.60 and prior which could cause shell access when unauthorized code is loaded into the system folder.
|
[
"cpe:2.3:o:schneider-electric:spacelynk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:spacelynk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:homelynk_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:homelynk:-:*:*:*:*:*:*:*"
] |
|
GHSA-fmxg-gfhc-xwr3
|
Escalation of privileges vulnerability in Micro Focus in Micro Focus Operations Agent, affecting versions 12.x up to and including 12.21. The vulnerability could be exploited by a non-privileged local user to access system monitoring data collected by Operations Agent.
|
[] |
|
GHSA-cj92-c4fj-w9c5
|
Mail Gem Path Traversal vulnerability
|
Directory traversal vulnerability in `lib/mail/network/delivery_methods/file_delivery.rb` in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a `..` (dot dot) in the to parameter.
|
[] |
CVE-2022-34364
|
Dell BSAFE SSL-J, versions before 6.5 and version 7.0 contain a debug message revealing unnecessary information vulnerability. This may lead to disclosing sensitive information to a locally privileged user.
.
|
[
"cpe:2.3:a:dell:bsafe_ssl-j:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_ssl-j:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-f6q6-xhg5-qpp7
|
Microsoft Office 2016 Click-to-Run (C2R) and Microsoft Office 2016 for Mac allow an attacker to use a specially crafted file to perform actions in the security context of the current user, due to how Microsoft Office handles files in memory, aka "Microsoft Office Remote Code Execution Vulnerability".
|
[] |
|
CVE-2021-44692
|
BuddyBoss Platform through 1.8.0 allows remote attackers to obtain the email address of each user. When creating a new user, it generates a Unique ID for their profile. This UID is their private email address with symbols removed and periods replaced with hyphens. For example. [email protected] would become /members/johndoeexample-com and [email protected] would become /members/jo-testexample-com. The members list is available to everyone and (in a default configuration) often without authentication. It is therefore trivial to collect a list of email addresses.
|
[
"cpe:2.3:a:buddyboss:buddyboss:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-0229
|
Cross-site scripting (XSS) vulnerability in IBM Marketing Platform 8.6.x and 9.x before 9.1.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
|
[
"cpe:2.3:a:ibm:marketing_platform:8.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:8.6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:marketing_platform:9.1.2.0:*:*:*:*:*:*:*"
] |
|
GHSA-57p4-7ph9-v9qx
|
Huawei P9 smartphones with the versions before EVA-AL10C00B399SP02 have an information disclosure vulnerability. The software does not properly protect certain resource which can be accessed by multithreading. An attacker tricks the user who has root privilege to install a crafted application, successful exploit could result in kernel information disclosure.
|
[] |
|
GHSA-2282-f329-v64x
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
|
[] |
|
GHSA-cwm9-wqpm-mx67
|
Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function.
|
[] |
|
GHSA-9mf5-vj6r-5wwq
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] |
|
CVE-2018-8169
|
An elevation of privilege vulnerability exists when the (Human Interface Device) HID Parser Library driver improperly handles objects in memory, aka "HIDParser Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:itanium:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:itanium:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
] |
|
CVE-2017-7566
|
MyBB before 1.8.11 allows remote attackers to bypass an SSRF protection mechanism.
|
[
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*"
] |
|
GHSA-4vc4-6jgc-cg63
|
Finder 10.4.6 on Apple Mac OS X 10.4.8 allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a long volume name in a DMG disk image, which results in memory corruption.
|
[] |
|
CVE-2021-31351
|
Junos OS: MX Series: Receipt of specific packet on MS-MPC/MS-MIC causes line card reset
|
An Improper Check for Unusual or Exceptional Conditions in packet processing on the MS-MPC/MS-MIC utilized by Juniper Networks Junos OS allows a malicious attacker to send a specific packet, triggering the MS-MPC/MS-MIC to reset, causing a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects specific versions of Juniper Networks Junos OS on MX Series: 17.3R3-S11; 17.4R2-S13; 17.4R3 prior to 17.4R3-S5; 18.1R3-S12; 18.2R2-S8, 18.2R3-S7, 18.2R3-S8; 18.3R3-S4; 18.4R3-S7; 19.1R3-S4, 19.1R3-S5; 19.2R1-S6; 19.3R3-S2; 19.4R2-S4, 19.4R2-S5; 19.4R3-S2; 20.1R2-S1; 20.2R2-S2, 20.2R2-S3, 20.2R3; 20.3R2, 20.3R2-S1; 20.4R1, 20.4R1-S1, 20.4R2; 21.1R1; This issue does not affect any version of Juniper Networks Junos OS prior to 15.1X49-D240;
|
[
"cpe:2.3:o:juniper:junos:17.3:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s13:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*"
] |
CVE-2015-2388
|
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1738.
|
[
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] |
|
GHSA-539v-w87w-w62c
|
Magento Improper Access Control vulnerability
|
Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.
|
[] |
GHSA-f9mx-3gv3-xr48
|
An issue in CP Plus CP-VNR-3104 B3223P22C02424 allows attackers to obtain the second RSA private key and access sensitive data or execute a man-in-the-middle attack.
|
[] |
|
CVE-2024-4925
|
SourceCodester School Intramurals Student Attendance Management System manage_course.php sql injection
|
A vulnerability was found in SourceCodester School Intramurals Student Attendance Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /intrams_sams/manage_course.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264461 was assigned to this vulnerability.
|
[
"cpe:2.3:a:sourcecodester:school_instramurals:1.0:*:*:*:*:*:*:*"
] |
CVE-2022-34442
|
Dell EMC SCG Policy Manager, versions from 5.10 to 5.12, contain(s) a contain a Hard-coded Cryptographic Key vulnerability. An attacker with the knowledge of the hard-coded sensitive information, could potentially exploit this vulnerability to login to the system to gain LDAP user privileges.
|
[
"cpe:2.3:a:dell:emc_secure_connect_gateway_policy_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-ccmh-88cv-x9rv
|
A reflected cross-site scripting (XSS) vulnerability in the component Query.php of arPHP v3.6.0 allows attackers to execute arbitrary web scripts.
|
[] |
|
CVE-2021-21547
|
Dell EMC Unity, UnityVSA, and Unity XT versions prior to 5.0.7.0.5.008 contain a plain-text password storage vulnerability when the Dell Upgrade Readiness Utility is run on the system. The credentials of the Unisphere Administrator are stored in plain text. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user.
|
[
"cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:unity_xt_operating_environment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:unityvsa_operating_environment:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-20862
|
Cisco Unified Communications Manager Arbitrary File Read Vulnerability
|
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the operating system.
|
[
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*"
] |
GHSA-ggc7-6cvg-qp72
|
Cross-site scripting (XSS) vulnerability in TerraMaster TOS <= 4.2.06 allows remote authenticated users to inject arbitrary web script or HTML via the mod parameter to /module/index.php.
|
[] |
|
GHSA-hfp6-g3c9-hhpc
|
An elevation of privilege vulnerability in MediaTek components, including the M4U driver, sound driver, touchscreen driver, GPU driver, and Command Queue driver, could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-28430164. References: M-ALPS02710027.
|
[] |
|
GHSA-785j-r72w-j5c2
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.54 and 8.55 allows local users to affect confidentiality, integrity, and availability via vectors related to Install and Packaging.
|
[] |
|
GHSA-vr4r-wwx9-gh33
|
cPanel before 84.0.20 allows a webmail or demo account to delete arbitrary files (SEC-547).
|
[] |
|
GHSA-958j-rf6g-qg28
|
A vulnerability was found in Asus RT-N12E 2.0.0.19. It has been classified as problematic. Affected is an unknown function of the file sysinfo.asp. The manipulation of the argument SSID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-rvm6-v34w-x4qh
|
Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Server). Supported versions that are affected are 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebCenter Sites. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L).
|
[] |
|
CVE-2023-46300
|
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration.
|
[
"cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*"
] |
|
GHSA-2p7j-h63x-5xr7
|
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
|
[] |
|
GHSA-64rr-x6m7-wf6j
|
The web server on Siemens SCALANCE X-300 switches with firmware before 4.0 and SCALANCE X 408 switches with firmware before 4.0 allows remote attackers to cause a denial of service (reboot) via malformed HTTP requests.
|
[] |
|
CVE-2006-2177
|
Cross-site scripting (XSS) vulnerability in viewcat.php in geoBlog 1.0 allows remote attackers to inject arbitrary web script or HTML via the cat parameter.
|
[
"cpe:2.3:a:bitdamaged:geoblog:mod_1.0:*:*:*:*:*:*:*"
] |
|
GHSA-pp8p-f52f-v8mp
|
Multiple SQL injection vulnerabilities in BrowserCRM 5.100.01 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) login[username] parameter to index.php, (2) parent_id parameter to modules/Documents/version_list.php, or (3) contact_id parameter to modules/Documents/index.php.
|
[] |
|
GHSA-j32g-9hmr-9v63
|
A vulnerability classified as critical has been found in SourceCodester Sales Tracker Management System 1.0. Affected is an unknown function of the file admin/products/view_product.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. VDB-221634 is the identifier assigned to this vulnerability.
|
[] |
|
GHSA-5vf7-m49c-hv97
|
Unknown vulnerability in the mail command handler in Mailman before 2.0.14 allows remote attackers to cause a denial of service (crash) via malformed e-mail commands.
|
[] |
|
GHSA-56j6-c5p2-5rq5
|
A vulnerability in the FTP application layer gateway (ALG) functionality used by Network Address Translation (NAT), NAT IPv6 to IPv4 (NAT64), and the Zone-Based Policy Firewall (ZBFW) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a buffer overflow that occurs when an affected device inspects certain FTP traffic. An attacker could exploit this vulnerability by performing a specific FTP transfer through the device. A successful exploit could allow the attacker to cause the device to reload.
|
[] |
|
CVE-2020-10610
|
In OSIsoft PI System multiple products and versions, a local attacker can modify a search path and plant a binary to exploit the affected PI System software to take control of the local computer at Windows system privilege level, resulting in unauthorized information disclosure, deletion, or modification.
|
[
"cpe:2.3:a:osisoft:pi_api:*:*:*:*:*:*:*:*",
"cpe:2.3:a:osisoft:pi_api:*:*:*:*:*:windows_integrated_security:*:*",
"cpe:2.3:a:osisoft:pi_buffer_subsystem:*:*:*:*:*:*:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:ping:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:ethernet\\/ip:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:bacnet:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:dc_systems_rtscada:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:siemens_simatic_pcs_7:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:iec_60870-5-104:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:hart-ip:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:opc-ua:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:ufl:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:cygnet:*:*",
"cpe:2.3:a:osisoft:pi_connector:*:*:*:*:*:wonderware_historian:*:*",
"cpe:2.3:a:osisoft:pi_connector_relay:*:*:*:*:*:*:*:*",
"cpe:2.3:a:osisoft:pi_data_archive:*:*:*:*:*:*:*:*",
"cpe:2.3:a:osisoft:pi_data_collection_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:osisoft:pi_integrator:*:*:*:*:*:business_analytics:*:*",
"cpe:2.3:a:osisoft:pi_interface_configuration_utility:*:*:*:*:*:*:*:*",
"cpe:2.3:a:osisoft:pi_to_ocs:*:*:*:*:*:*:*:*"
] |
|
GHSA-54rp-pw4x-cqxr
|
In sensor driver, there is a possible buffer overflow due to a missing bounds check. This could lead to local denial of service in kernel.
|
[] |
|
CVE-2020-35594
|
Zoho ManageEngine ADManager Plus before 7066 allows XSS.
|
[
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7010:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7011:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7020:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7030:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7040:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7041:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7050:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7051:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7052:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7053:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7054:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7055:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7056:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7060:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7061:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7062:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7063:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7064:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7065:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_admanager_plus:7.0:7066:*:*:*:*:*:*"
] |
|
GHSA-f9qf-m76m-xcgx
|
A iccselectcommand expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
|
[] |
|
CVE-2025-49279
|
WordPress Blogvy <= 1.0.7 - Local File Inclusion Vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Unfoldwp Blogvy allows PHP Local File Inclusion. This issue affects Blogvy: from n/a through 1.0.7.
|
[] |
GHSA-48qm-7xjg-6hq4
|
Memory leak on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to cause a denial of service (memory consumption) via Subject Alternative Name fields in an X.509 certificate, aka Bug ID CSCsq17879.
|
[] |
|
CVE-2017-9122
|
The quicktime_read_moov function in moov.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted mp4 file.
|
[
"cpe:2.3:a:libquicktime:libquicktime:1.2.4:*:*:*:*:*:*:*"
] |
|
GHSA-7fm8-2jgx-v3jh
|
An unauthenticated attacker with physical access to a computer with NetSetMan Pro before 5.0 installed, that has the pre-logon profile switch button within the Windows logon screen enabled, is able to drop to an administrative shell and execute arbitrary commands as SYSTEM via the "save log to file" feature. To accomplish this, the attacker can navigate to cmd.exe.
|
[] |
|
GHSA-382c-gf8c-2jc8
|
Buffer overflow in the Internet Key Exchange version 1 (IKEv1) implementation in Symantec Dynamic VPN Services, as used in Enterprise Firewall, Gateway Security, and Firewall /VPN Appliance products, allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
|
[] |
|
GHSA-8jhf-8qjr-8c39
|
The Frontend in Zabbix before 1.8.20rc2, 2.0.x before 2.0.11rc2, and 2.2.x before 2.2.2rc1 allows remote "Zabbix Admin" users to modify the media of arbitrary users via unspecified vectors.
|
[] |
|
GHSA-xg47-r67p-vhv5
|
Improper Input Validation in Deap
|
The utilities function in all versions < 1.0.1 of the deap node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.
|
[] |
GHSA-888v-c6vc-wh7r
|
rustls-mio/examples/tlsserver.rs in the rustls crate before 0.16.0 for Rust allows attackers to cause a denial of service (loop of conn_event and ready) by arranging for a client to never be writable.
|
[] |
|
GHSA-rvw3-9pc3-7rr4
|
NETGEAR XR1000 devices before 1.0.0.58 are affected by denial of service.
|
[] |
|
CVE-2006-6179
|
Buffer overflow in PCCSRV\Web_console\RemoteInstallCGI\CgiRemoteInstall.exe for Trend Micro OfficeScan 7.3 before build 7.3.0.1089 allows remote attackers to execute arbitrary code via unknown attack vectors.
|
[
"cpe:2.3:a:trend_micro:officescan:7.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-3116
|
before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or).
|
[
"cpe:2.3:a:proxy.py_project:proxy.py:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-6191
|
SAP Landscape Management, version 3.0, allows an attacker with admin privileges to execute malicious executables with root privileges in SAP Host Agent via SAP Landscape Management due to Missing Input Validation.
|
[
"cpe:2.3:a:sap:landscape_management:3.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-1183
|
SSRF Vulnerability in gradio-app/gradio
|
An SSRF (Server-Side Request Forgery) vulnerability exists in the gradio-app/gradio repository, allowing attackers to scan and identify open ports within an internal network. By manipulating the 'file' parameter in a GET request, an attacker can discern the status of internal ports based on the presence of a 'Location' header or a 'File not allowed' error in the response.
|
[
"cpe:2.3:a:gradio_project:gradio:-:*:*:*:*:python:*:*"
] |
GHSA-4v5x-46v5-4rgc
|
The Rastreador de Celulares (aka com.mobincube.android.sc_9KTH8) application 5.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] |
|
CVE-2015-2428
|
Object Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly constrain impersonation levels during interaction with object symbolic links that originated in a sandboxed process, which allows local users to gain privileges via a crafted application, aka "Windows Object Manager Elevation of Privilege Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] |
|
CVE-2021-30724
|
This issue was addressed with improved checks. This issue is fixed in tvOS 14.6, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6, Security Update 2021-003 Catalina, macOS Big Sur 11.4, watchOS 7.5. A local attacker may be able to elevate their privileges.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-19705
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-1110
|
The Podcasts component in Apple iOS before 8.3 and Apple TV before 7.2 allows remote attackers to discover unique identifiers by reading asset-download request data.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] |
|
GHSA-g4wc-rmhv-rw6w
|
Out of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.
|
[] |
|
GHSA-r92x-f52r-x54g
|
regular expression denial of service (ReDoS)
|
date-and-time is an npm package for manipulating date and time. In date-and-time before version 0.14.2, there a regular expression involved in parsing which can be exploited to to cause a denial of service. This is fixed in version 0.14.2.
|
[] |
GHSA-wp42-q397-qj9f
|
Animate versions 23.0.8, 24.0.5 and earlier are affected by a Buffer Underwrite ('Buffer Underflow') vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could leverage this vulnerability to manipulate memory in such a way that they could execute code under the privileges of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] |
|
GHSA-77rc-x84q-pv4f
|
Improper Certificate Validation in Apache Airflow
|
The LDAP auth backend (airflow.contrib.auth.backends.ldap_auth) prior to Apache Airflow 1.10.1 was misconfigured and contained improper checking of exceptions which disabled server certificate checking.
|
[] |
GHSA-q9hm-3crw-jrr3
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Move addons Move Addons for Elementor allows Stored XSS.This issue affects Move Addons for Elementor: from n/a through 1.3.4.
|
[] |
|
GHSA-h28w-5927-4cvx
|
Clustered Data ONTAP versions prior to 9.3P21, 9.5P16, 9.6P12, 9.7P8 and 9.8 are susceptible to a vulnerability which could allow unauthorized tenant users to discover information related to converting a 7-Mode directory to Cluster-mode such as Storage Virtual Machine (SVM) names, volume names, directory paths and Job IDs.
|
[] |
|
GHSA-68pg-xqhr-rqwp
|
The Report Builder of Jazz Reporting Service 5.0 through 5.0.2 and 6.0 through 6.0.6 could allow an authenticated user to obtain sensitive information beyond its assigned privileges. IBM X-Force ID: 144579.
|
[] |
|
CVE-2019-15979
|
Cisco Data Center Network Manager Command Injection Vulnerabilities
|
Multiple vulnerabilities in the REST and SOAP API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with administrative privileges on the DCNM application to inject arbitrary commands on the underlying operating system (OS). For more information about these vulnerabilities, see the Details section of this advisory. Note: The severity of these vulnerabilities is aggravated by the vulnerabilities described in the Cisco Data Center Network Manager Authentication Bypass Vulnerabilities advisory, published simultaneously with this one.
|
[
"cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*"
] |
CVE-2011-1688
|
Directory traversal vulnerability in Best Practical Solutions RT 3.2.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allows remote attackers to read arbitrary files via a crafted HTTP request.
|
[
"cpe:2.3:a:bestpractical:rt:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*"
] |
|
GHSA-3hc7-2xcc-7p8f
|
Squalor SQL Injection vulnerability
|
A vulnerability, which was classified as critical, was found in square squalor. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version v0.0.0 is able to address this issue. The name of the patch is f6f0a47cc344711042eb0970cb423e6950ba3f93. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217623.
|
[] |
GHSA-rm2x-c3c3-pwmx
|
IBM Maximo Asset Management 7.1, 7.5, and 7.6 could allow a local attacker to obtain sensitive information using HTTP Header Injection. IBM Reference #: 1998053.
|
[] |
|
GHSA-jm54-fghv-4x5c
|
The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.3.0 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 before 4.1.3.0 allows remote attackers to execute arbitrary OS commands via unspecified vectors.
|
[] |
|
CVE-2021-41659
|
SQL injection vulnerability in Sourcecodester Banking System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username or password field.
|
[
"cpe:2.3:a:banking_system_project:banking_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-46600
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15394.
|
[
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation_connect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] |
|
GHSA-733x-8jgh-6gwm
|
Tor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit nodes," which allows remote attackers to conduct unspecified statistical attacks.
|
[] |
|
CVE-2014-5300
|
Adaptive Computing Moab before 7.2.9 and 8 before 8.0.0 allows remote attackers to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.
|
[
"cpe:2.3:a:adaptivecomputing:moab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adaptivecomputing:moab:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-h3h3-jq7c-xgpc
|
In the Linux kernel, the following vulnerability has been resolved:drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map()Patch series "mm: follow_pte() improvements and acrn follow_pte() fixes".Patch #1 fixes a bunch of issues I spotted in the acrn driver. It
compiles, that's all I know. I'll appreciate some review and testing from
acrn folks.Patch #2+#3 improve follow_pte(), passing a VMA instead of the MM, adding
more sanity checks, and improving the documentation. Gave it a quick test
on x86-64 using VM_PAT that ends up using follow_pte().This patch (of 3):We currently miss handling various cases, resulting in a dangerous
follow_pte() (previously follow_pfn()) usage.(1) We're not checking PTE write permissions.Maybe we should simply always require pte_write() like we do for
pin_user_pages_fast(FOLL_WRITE)? Hard to tell, so let's check for
ACRN_MEM_ACCESS_WRITE for now.(2) We're not rejecting refcounted pages.As we are not using MMU notifiers, messing with refcounted pages is
dangerous and can result in use-after-free. Let's make sure to reject them.(3) We are only looking at the first PTE of a bigger range.We only lookup a single PTE, but memmap->len may span a larger area.
Let's loop over all involved PTEs and make sure the PFN range is
actually contiguous. Reject everything else: it couldn't have worked
either way, and rather made use access PFNs we shouldn't be accessing.
|
[] |
|
CVE-2013-7066
|
The Entity reference module 7.x-1.x before 7.x-1.1-rc1 for Drupal allows remote attackers to read private nodes titles by leveraging edit permissions to a node that references a private node.
|
[
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:entity_reference_project:entityreference:7.x-1.x:dev:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.