Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-rfp6-h7x3-4ggx
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An improper validation vulnerability exists that could allow an attacker to inject specially crafted input into memory where it can be executed.
[]
CVE-2017-2866
An exploitable vulnerability exists in the /api/CONFIG/backup functionality of Circle with Disney. Specially crafted network packets can cause an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.
[ "cpe:2.3:o:meetcircle:circle_with_disney_firmware:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:h:meetcircle:circle_with_disney:-:*:*:*:*:*:*:*" ]
GHSA-qxwf-3xfr-gcp8
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. An attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user via DLL hijacking. Exploitation of this issue requires user interaction.
[]
CVE-2025-31722
In Jenkins Templating Engine Plugin 2.5.3 and earlier, libraries defined in folders are not subject to sandbox protection, allowing attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM.
[]
CVE-2024-21633
Arbitrary file write on Decoding
Apktool is a tool for reverse engineering Android APK files. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. Commit d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this issue.
[ "cpe:2.3:a:apktool:apktool:*:*:*:*:*:*:*:*" ]
GHSA-v4fj-7hcj-whx2
Multiple SQL injection vulnerabilities in the getip function in wp-limit-login-attempts.php in the WP Limit Login Attempts plugin before 2.0.1 for WordPress allow remote attackers to execute arbitrary SQL commands via the (1) X-Forwarded-For or (2) Client-IP HTTP header.
[]
CVE-2006-2725
SQL injection vulnerability in rss/posts.php in Eggblog before 3.07 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:epic_designs:eggblog:*:*:*:*:*:*:*:*" ]
GHSA-cf6q-8992-3xv4
Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Software 10.0.0, 10.0.2, 10.1.0, 10.2.0, 10.2.2, 10.3.0, 10.5.0, and 11.0.0 through 11.2.0 allows remote authenticated users to affect integrity, related to BASE, a different vulnerability than CVE-2012-3227.
[]
CVE-2016-3401
Unspecified vulnerability in Zimbra Collaboration before 8.7.0 allows remote authenticated users to affect integrity via unknown vectors, aka bug 99810.
[ "cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*" ]
GHSA-7vrg-6f2q-qgcg
There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and scheme parsing. Upgrade to versions 7.1.9 and 8.0.6 or later versions.
[]
CVE-2022-2803
SourceCodester Zoo Management System animals.php sql injection
A vulnerability was found in SourceCodester Zoo Management System and classified as critical. This issue affects some unknown processing of the file /pages/animals.php. The manipulation of the argument class_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206249 was assigned to this vulnerability.
[ "cpe:2.3:a:phpgurukul:zoo_management_system:-:*:*:*:*:*:*:*" ]
GHSA-jp2p-37cw-qg8c
The Norwegian Air Shuttle (aka norwegian.com) airline kiosk allows physically proximate attackers to bypass the intended "Please select booking identification" UI step, and obtain administrative privileges and network access on the underlying Windows OS, by accessing a touch-screen print icon to manipulate the print dialog.
[]
CVE-2017-15192
In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level.
[ "cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.4.1:*:*:*:*:*:*:*" ]
CVE-2024-56139
A stack overflow Segmentation Fault (SEGV) and Memory Leak in pdftools
pdftools is a high level tools to convert PDF files to ePUB formats. In versions up to and including 0.5.0 maliciously crafted epub files can cause a stack overflow leading to a crash. This issue has not yet been addressed and users are advised to avoid untrusted input to their systems.
[]
GHSA-97x2-vw52-3g2m
Sourcecodester Doctor Appointment System 1.0 is vulnerable to SQL Injection in the variable $userid at doctors\myDetails.php.
[]
GHSA-m4g5-6q8m-rhcg
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saiem Khan Image Switcher allows Stored XSS.This issue affects Image Switcher: from n/a through 0.1.1.
[]
CVE-2023-1410
Stored XSS in Graphite FunctionDescription tooltip
Grafana is an open-source platform for monitoring and observability.  Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized. An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description.  Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.
[ "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*" ]
CVE-2001-0533
Buffer overflow in libi18n library in IBM AIX 5.1 and 4.3.x allows local users to gain root privileges via a long LANG environmental variable.
[ "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*" ]
GHSA-mr92-3m8f-x735
In the Linux kernel, the following vulnerability has been resolved:i2c: Fix a potential use after freeFree the adap structure only after we are done using it. This patch just moves the put_device() down a bit to avoid the use after free.[wsa: added comment to the code, added Fixes tag]
[]
GHSA-wxc3-3jv6-vx77
In multiple locations of p2p_iface.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-257029915
[]
CVE-2022-44593
WordPress Solid Security plugin <= 9.3.1 - IP Spoofing Leading to Denial of Service vulnerability
Use of Less Trusted Source vulnerability in SolidWP Solid Security allows HTTP DoS.This issue affects Solid Security: from n/a through 9.3.1.
[ "cpe:2.3:a:solidwp:solid_security:*:*:*:*:*:wordpress:*:*" ]
CVE-2019-20556
An issue was discovered on Samsung mobile devices with P(9.0) (SM6150, SM8150, SM8150_FUSION, exynos7885, exynos9610, and exynos9820 chipsets) software. RKP memory corruption allows attackers to control the effective address in EL2. The Samsung ID is SVE-2019-15221 (October 2019).
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150_fusion:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_7885:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_9610:-:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos_9820:-:*:*:*:*:*:*:*" ]
GHSA-4vjw-6g94-68x5
services/system_io/actionprocessor/Contact.rails in ConnectWise Manage 2017.5 allows arbitrary client-side JavaScript code execution (involving a ContactCommon field) on victims who click on a crafted link, aka XSS.
[]
CVE-2016-1301
The RBAC implementation in Cisco ASA-CX Content-Aware Security software before 9.3.1.1(112) and Cisco Prime Security Manager (PRSM) software before 9.3.1.1(112) allows remote authenticated users to change arbitrary passwords via a crafted HTTP request, aka Bug ID CSCuo94842.
[ "cpe:2.3:a:cisco:prime_security_manager:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.0.1-40:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.0.2-68:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.1.2-29:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.1.2-42:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.1.3-8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.1.3-10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.1.3-13:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.2.1-1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_security_manager:9.2.1-2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.0.1-40:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.0.2-68:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.0_base:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.1.2-29:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.1.2-42:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.1.3-8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.1.3-10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.1.3-13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.2.1-1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.2.1-2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.2.1-3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_cx_context-aware_security_software:9.2.1-4:*:*:*:*:*:*:*" ]
CVE-2018-19011
CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application.
[ "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*" ]
CVE-2003-0356
Multiple off-by-one vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, and (11) TSP dissectors, which do not properly use the tvb_get_nstringz and tvb_get_nstringz0 functions.
[ "cpe:2.3:a:ethereal:ethereal:*:*:*:*:*:*:*:*" ]
GHSA-f7pg-xgpm-7pv6
SQL injection vulnerability in Welcart e-Commerce prior to 2.11.2 allows an attacker who can login to the product to obtain or alter the information stored in the database.
[]
CVE-2024-9225
SEOPress – On-site SEO <= 8.1.1 - Reflected Cross-Site Scripting
The SEOPress – On-site SEO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 8.1.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[ "cpe:2.3:a:seopress:seopress:-:*:*:*:*:wordpress:*:*", "cpe:2.3:a:seopress:seopress:*:*:*:*:*:wordpress:*:*" ]
GHSA-fm3m-2gf9-6p64
The Professional Social Sharing Buttons, Icons & Related Posts WordPress plugin before 9.7.6 does not have proper authorisation check in one of the AJAX action, available to unauthenticated (in v < 9.7.5) and author+ (in v9.7.5) users, allowing them to call it and retrieve various information such as the list of active plugins, various version like PHP, cURL, WP etc.
[]
GHSA-9h9m-p7qh-7cv6
XSS in Yandex Browser BookReader in Yandex browser for desktop for versions before 16.6. could be used by remote attacker for evaluation arbitrary javascript code.
[]
CVE-2010-0623
The futex_lock_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly manage a certain reference count, which allows local users to cause a denial of service (OOPS) via vectors involving an unmount of an ext3 filesystem.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" ]
GHSA-34q2-7xrv-pfcm
Remote attackers can cause a denial of service in Sendmail 8.8.x and 8.9.2 by sending messages with a large number of headers.
[]
GHSA-mw9v-68m8-wr95
SolarWinds N-central through 2020.1 allows session hijacking and requires user interaction or physical access. The N-Central JSESSIONID cookie attribute is not checked against multiple sources such as sourceip, MFA claim, etc. as long as the victim stays logged in within N-Central. To take advantage of this, cookie could be stolen and the JSESSIONID can be captured. On its own this is not a surprising result; low security tools allow the cookie to roam from machine to machine. The JSESSION cookie can then be used on the attackers’ workstation by browsing to the victim’s NCentral server URL and replacing the JSESSIONID attribute value by the captured value. Expected behavior would be to check this against a second source and enforce at least a reauthentication or multi factor request as N-Central is a highly privileged service.
[]
CVE-2023-0154
GamiPress – Vimeo integration < 1.0.9 - Contributor+ Stored XSS
The GamiPress WordPress plugin before 1.0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[ "cpe:2.3:a:gamipress:gamipress:*:*:*:*:*:wordpress:*:*" ]
GHSA-39rp-fmqv-8wr2
A vulnerability, which was classified as critical, has been found in Wanhu ezOFFICE 11.1.0. This issue affects some unknown processing of the file defaultroot/platform/bpm/work_flow/operate/wf_printnum.jsp. The manipulation of the argument recordId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252281 was assigned to this vulnerability.
[]
CVE-2020-21991
AVE DOMINAplus <=1.10.x suffers from an authentication bypass vulnerability due to missing control check when directly calling the autologin GET parameter in changeparams.php script. Setting the autologin value to 1 allows an unauthenticated attacker to permanently disable the authentication security control and access the management interface with admin privileges without providing credentials.
[ "cpe:2.3:a:ave:dominaplus:*:*:*:*:*:*:*:*", "cpe:2.3:o:ave:53ab-wbs_firmware:1.10.62:*:*:*:*:*:*:*", "cpe:2.3:h:ave:53ab-wbs:-:*:*:*:*:*:*:*", "cpe:2.3:o:ave:ts01_firmware:1.0.65:*:*:*:*:*:*:*", "cpe:2.3:h:ave:ts01:-:*:*:*:*:*:*:*", "cpe:2.3:o:ave:ts03x-v_firmware:1.10.45a:*:*:*:*:*:*:*", "cpe:2.3:h:ave:ts03x-v:-:*:*:*:*:*:*:*", "cpe:2.3:o:ave:ts04x-v_firmware:1.10.45a:*:*:*:*:*:*:*", "cpe:2.3:h:ave:ts04x-v:-:*:*:*:*:*:*:*", "cpe:2.3:o:ave:ts05_firmware:1.10.36:*:*:*:*:*:*:*", "cpe:2.3:h:ave:ts05:-:*:*:*:*:*:*:*", "cpe:2.3:o:ave:ts05n-v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:ave:ts05n-v:-:*:*:*:*:*:*:*" ]
GHSA-832g-fj8w-w49x
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, buffer sizes in the message passing interface are not properly validated.
[]
GHSA-994h-393c-95jf
Vanilla before 2.6.1 allows XSS via the email field of a profile.
[]
CVE-2024-55555
Invoice Ninja before 5.10.43 allows remote code execution from a pre-authenticated route when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values. The route/{hash} route defined in the invoiceninja/routes/client.php file can be accessed without authentication. The parameter {hash} is passed to the function decrypt that expects a Laravel ciphered value containing a serialized object. (Furthermore, Laravel contains several gadget chains usable to trigger remote command execution from arbitrary deserialization.) Therefore, an attacker in possession of the APP_KEY is able to fully control a string passed to an unserialize function.
[]
CVE-2013-1888
pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.
[ "cpe:2.3:a:pypa:pip:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*" ]
GHSA-w43j-xjf7-hmp3
Insufficient Verification of Data Authenticity vulnerability in Hewlett Packard Enterprise HPE Nimble Storage Hybrid Flash Arrays and Nimble Storage Secondary Flash Arrays.
[]
CVE-2022-23011
On certain hardware BIG-IP platforms, in version 15.1.x before 15.1.4 and 14.1.x before 14.1.3, virtual servers may stop responding while processing TCP traffic due to an issue in the SYN Cookie Protection feature. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_i850:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_i2600:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_i2800:-:*:*:*:*:*:*:*" ]
CVE-2005-0110
Internet Explorer 6 on Windows XP SP2 allows remote attackers to bypass the file download warning dialog and possibly trick an unknowledgeable user into executing arbitrary code via a web page with a body element containing an onclick tag, as demonstrated using the createElement function.
[ "cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*" ]
CVE-2025-3146
PHPGurukul Bus Pass Management System view-pass-detail.php sql injection
A vulnerability, which was classified as critical, was found in PHPGurukul Bus Pass Management System 1.0. This affects an unknown part of the file /view-pass-detail.php. The manipulation of the argument viewid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2014-5028
The Original File and Patched File resources in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allow remote authenticated users to bypass intended access restrictions and obtain sensitive information from repository files by leveraging knowledge of database ids.
[ "cpe:2.3:a:reviewboard:review_board:*:*:*:*:*:*:*:*" ]
GHSA-2wrh-6pvc-2jm9
Improper rendering of text nodes in golang.org/x/net/html
Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.
[]
GHSA-4pvm-5x6h-f3qp
A use of hard-coded cryptographic key in Fortinet FortiClientWindows version 7.4.0, 7.2.x all versions, 7.0.x all versions, and 6.4.x all versions may allow a low-privileged user to decrypt interprocess communication via monitoring named piped.
[]
CVE-2020-14263
"HCL Traveler Companion is vulnerable to an iOS weak cryptographic process vulnerability via the included MobileIron AppConnect SDK"
[ "cpe:2.3:a:hcltech:traveler_companion:*:*:*:*:*:iphone_os:*:*" ]
GHSA-f99f-842c-6wrr
The W4 Post List WordPress plugin before 2.4.6 does not ensure that password protected posts can be accessed before displaying their content, which could allow any authenticated users to access them
[]
GHSA-8cqv-9fpj-rxrj
A heap-based overflow vulnerability in prepareRecogLibrary function in libSDKRecognitionText.spensdk.samsung.so library prior to SMR Sep-2022 Release 1 allows attacker to cause memory access fault.
[]
CVE-2018-12879
Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-5f5m-56ch-x6w9
Multiple PHP remote file inclusion vulnerabilities in ol'bookmarks 0.7.4 allow remote attackers to execute arbitrary PHP code via a URL in the root parameter to (1) test1.php, (2) blackorange.php, (3) default.php, (4) frames1.php, (5) frames1_top.php, (7) test2.php, (8) test3.php, (9) test4.php, (10) test5.php, (11) test6.php, (12) frames1_left.php, and (13) frames1_center.php in themes/.
[]
GHSA-qc3j-p935-x73x
Adobe FrameMaker version 2019.0.6 (and earlier versions) has an out-of-bounds read vulnerability that could be exploited to read past the end of an allocated buffer, possibly resulting in a crash or disclosure of sensitive information from other memory locations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious FrameMaker file.
[]
CVE-2023-41282
QTS, QuTS hero, QuTScloud
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later QuTScloud c5.1.5.2651 and later
[ "cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.3.2578:build_20231110:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.4.2596:build_20231128:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.5.2645:-:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:build_20231110:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.4.2596:build_20231128:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.5.2647:-:*:*:*:*:*:*", "cpe:2.3:o:qnap:qutscloud:c5.1.0.2498:build_20230822:*:*:*:*:*:*" ]
CVE-2021-31680
Deserialization of Untrusted Data vulnerability in yolo 5 allows attackers to execute arbitrary code via crafted yaml file.
[ "cpe:2.3:a:ultralytics:yolov5:-:*:*:*:*:*:*:*" ]
CVE-2020-8580
SANtricity OS Controller Software versions 11.30 and higher are susceptible to a vulnerability which allows an unauthenticated attacker with access to the system to cause a Denial of Service (DoS).
[ "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*" ]
GHSA-fh98-wxrh-g7rp
A path traversal vulnerability exists in Esri ArcGIS Earth versions 1.11.0 and below which allows arbitrary file creation on an affected system through crafted input. An attacker could exploit this vulnerability to gain arbitrary code execution under security context of the user running ArcGIS Earth by inducing the user to upload a crafted file to an affected system.
[]
CVE-2019-10458
Jenkins Puppet Enterprise Pipeline 1.3.1 and earlier specifies unsafe values in its custom Script Security whitelist, allowing attackers able to execute Script Security protected scripts to execute arbitrary code.
[ "cpe:2.3:a:jenkins:puppet_enterprise_pipeline:*:*:*:*:*:jenkins:*:*" ]
CVE-2022-42838
An issue with app access to camera data was addressed with improved logic. This issue is fixed in macOS Ventura 13. A camera extension may be able to continue receiving video after the app which activated was closed.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
CVE-2023-0709
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf_last_name' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database.
[ "cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:*" ]
CVE-2023-23781
A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below SAML server configuration may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted XML files.
[ "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*" ]
CVE-2016-2069
Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.
[ "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2025-23619
WordPress Catch Duplicate Switcher plugin <= 2.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Catch Duplicate Switcher allows Reflected XSS. This issue affects Catch Duplicate Switcher: from n/a through 2.0.
[]
CVE-2016-0439
Unspecified vulnerability in the Web Cache component in Oracle Fusion Middleware 11.1.1.7.0 and 11.1.1.9.0 allows remote attackers to affect confidentiality via vectors related to SSL support, a different vulnerability than CVE-2016-0430.
[ "cpe:2.3:a:oracle:fusion_middleware:11.1.1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.9:*:*:*:*:*:*:*" ]
CVE-2023-6538
System Management Unit (SMU) versions prior to 14.8.7825.01, used to manage Hitachi Vantara NAS products is susceptible to unintended information disclosure via unprivileged access to SMU configuration backup data.
SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in Storage, Server or combined Server+Storage administrative roles are able to access SMU configuration backup, that would normally be barred to those specific administrative roles.
[ "cpe:2.3:o:hitachi:system_management_unit_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:system_management_unit:-:*:*:*:*:*:*:*" ]
GHSA-c2cx-322m-jmv2
In onCreate of WiFiInstaller.java, there is a possible way to install a malicious Hotspot 2.0 configuration due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-176756141
[]
GHSA-q2hr-6wh4-24c8
Multiple SQL injection vulnerabilities in PEEL, possibly 3.x and earlier, allow remote attackers to execute arbitrary SQL commands via the (1) email parameter to (a) membre.php, and the (2) timestamp parameter to (b) the details action in achat/historique_commandes.php and (c) the facture action in factures/facture_html.php.
[]
CVE-2021-2396
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: E-Business Suite - XDO). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in takeover of Oracle BI Publisher. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:bi_publisher:5.5.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:bi_publisher:11.1.1.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*" ]
CVE-2016-0789
CRLF injection vulnerability in the CLI command documentation in Jenkins before 1.650 and LTS before 1.642.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
[ "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*", "cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*" ]
CVE-2014-9512
rsync 3.1.1 allows remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path.
[ "cpe:2.3:a:samba:rsync:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*" ]
GHSA-3gj8-mpqg-gqrv
Multiple vulnerabilities in the web-based management interface of Cisco Small Business SPA300 Series IP Phones and Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly.These vulnerabilities exist because HTTP packets are not properly checked for errors. An attacker could exploit this vulnerability by sending a crafted HTTP packet to the remote interface of an affected device. A successful exploit could allow the attacker to cause a DoS condition on the device.
[]
CVE-2021-1601
Cisco Intersight Virtual Appliance IPv4 and IPv6 Forwarding Vulnerabilities
Multiple vulnerabilities in Cisco Intersight Virtual Appliance could allow an unauthenticated, adjacent attacker to access sensitive internal services from an external interface. These vulnerabilities are due to insufficient restrictions for IPv4 or IPv6 packets that are received on the external management interface. An attacker could exploit these vulnerabilities by sending specific traffic to this interface on an affected device. A successful exploit could allow the attacker to access sensitive internal services and make configuration changes on the affected device.
[ "cpe:2.3:a:cisco:intersight_virtual_appliance:1.0\\(1\\):*:*:*:*:*:*:*" ]
CVE-2012-2005
Cross-site scripting (XSS) vulnerability in HP Insight Management Agents before 9.0.0.0 on Windows Server 2003 and 2008 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:hp:insight_management_agents:*:b:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:6.30.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:6.31.0.0:b:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:6.40.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.20.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.30.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.40.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.40.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.41.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.50.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.51.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.60.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.70.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.80.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.90.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.91.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:7.95.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.20.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.22.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.26.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.30.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.40.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.50.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.60.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:insight_management_agents:8.70.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:*:x64:*:*:*:*:*" ]
GHSA-m7rm-76f9-7g7j
Cross-site request forgery (CSRF) vulnerability in SquirrelMail 1.4.8-4.fc6 and earlier allows remote attackers to perform unspecified actions as arbitrary users via unspecified vectors. NOTE: this issue might overlap CVE-2007-2589 or CVE-2002-1648.
[]
GHSA-4qxv-phx5-f6fx
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
[]
GHSA-qwqq-jvm7-rm7c
The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
[]
CVE-2005-4283
Cross-site scripting (XSS) vulnerability in The CITY Shop 1.3 and earlier allows remote attackers to inject arbitrary web script or HTML via parameters to the search module, possibly SKey to store.cgi.
[ "cpe:2.3:a:nightmedia:the_city_shop:*:*:*:*:*:*:*:*" ]
CVE-2010-1837
CoreText in Apple Mac OS X 10.5.8 and 10.6.x before 10.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a PDF document.
[ "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*" ]
GHSA-wrg6-ch3r-c868
Microsoft Office 2007 SP3, Office for Mac 2011, Office for Mac 2016, and Word Viewer allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
[]
CVE-2022-22528
SAP Adaptive Server Enterprise (ASE) - version 16.0, installation makes an entry in the system PATH environment variable in Windows platform which, under certain conditions, allows a Standard User to execute malicious Windows binaries which may lead to privilege escalation on the local system. The issue is with the ASE installer and does not impact other ASE binaries.
[ "cpe:2.3:a:sap:adaptive_server_enterprise:16.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2022-33657
Azure Site Recovery Elevation of Privilege Vulnerability
Azure Site Recovery Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:azure_site_recovery_vmware_to_azure:*:*:*:*:*:*:*:*" ]
GHSA-vvqg-9xpw-c884
The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the a parameter via an AJAX action (available to both unauthenticated and authenticated users when the curl library is installed) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue
[]
CVE-2019-11221
GPAC 0.7.1 has a buffer overflow issue in gf_import_message() in media_import.c.
[ "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
CVE-2018-20596
Jspxcms v9.0.0 allows SSRF.
[ "cpe:2.3:a:jspxcms:jspxcms:9.0.0:*:*:*:*:*:*:*" ]
CVE-2022-30000
Insurance Management System 1.0 is vulnerable to SQL Injection via /insurance/editPayment.php?recipt_no=.
[ "cpe:2.3:a:insurance_management_system_project:insurance_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-7h23-57pg-3hwc
A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
[]
CVE-2023-22347
Out-of-bound read vulnerability exists in Screen Creator Advance 2 Ver.0.1.1.4 Build01 and earlier because the end of data cannot be verified when processing file structure information. Having a user of Screen Creator Advance 2 to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution.
[ "cpe:2.3:a:jtekt:screen_creator_advance_2:*:*:*:*:*:*:*:*", "cpe:2.3:a:jtekt:screen_creator_advance_2:0.1.1.4:build01:*:*:*:*:*:*" ]
GHSA-29ph-vc5w-7vvg
unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory traversal vulnerability for RAR v2 archives: pathnames of the form ../[filename] are unpacked into the upper directory.
[]
CVE-2020-25249
An issue was discovered in Hyland OnBase 16.0.2.83 and below, 17.0.2.109 and below, 18.0.0.37 and below, 19.8.16.1000 and below and 20.3.10.1000 and below. The server typically logs activity only when a client application specifies that logging is desired. This can be problematic for use cases in a regulated industry, where server-side logging is required in additional situations.
[ "cpe:2.3:a:hyland:onbase:*:*:*:*:*:*:*:*" ]
CVE-2024-21231
Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).
[ "cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*" ]
GHSA-v2w7-6h4p-24mg
The Cisco IP Phone 7940 allows remote attackers to cause a denial of service (reboot) via a large amount of TCP SYN packets (syn flood) to arbitrary ports, as demonstrated to port 80.
[]
CVE-2022-24738
Account compromise in Evmos
Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. In versions of evmos prior to 2.0.1 attackers are able to drain unclaimed funds from user addresses. To do this an attacker must create a new chain which does not enforce signature verification and connects it to the target evmos instance. The attacker can use this joined chain to transfer unclaimed funds. Users are advised to upgrade. There are no known workarounds for this issue.
[ "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*" ]
CVE-2019-18997
PB610 HMISimulator provides interface with access to arbitrary files
The HMISimulator component of ABB PB610 Panel Builder 600 uses the readFile/writeFile interface to manipulate the work file. Path configuration in PB610 HMISimulator versions 2.8.0.424 and earlier potentially allows access to files outside of the working directory, thus potentially supporting unauthorized file access.
[ "cpe:2.3:a:abb:pb610_panel_builder_600:*:*:*:*:*:*:*:*" ]
GHSA-6465-hj2g-hj5x
crawl before 4.0.0 does not securely call programs when saving and loading games, which allows local users to gain privileges.
[]
GHSA-5xr2-3h2h-5cjv
Flat Calendar 1.1 does not properly restrict access to administrative functions, which allows remote attackers to (1) add new events via calAdd.php, as reachable from admin/add.php, or (2) delete events via admin/deleteEvent.php. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's security documentation.
[]
CVE-2021-20234
An uncontrolled resource consumption (memory leak) flaw was found in the ZeroMQ client in versions before 4.3.3 in src/pipe.cpp. This issue causes a client that connects to multiple malicious or compromised servers to crash. The highest threat from this vulnerability is to system availability.
[ "cpe:2.3:a:zeromq:libzmq:*:*:*:*:*:*:*:*" ]
CVE-2021-32970
Moxa NPort IAW5000A-I/O Series Serial Device Server Improper Input Validation
Data can be copied without validation in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier, which may allow a remote attacker to cause denial-of-service conditions.
[ "cpe:2.3:o:moxa:nport_iaw5150a-6i\\/o_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_iaw5150a-6i\\/o:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_iaw5150a-12i\\/o_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_iaw5150a-12i\\/o:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_iaw5250a-6i\\/o_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_iaw5250a-6i\\/o:-:*:*:*:*:*:*:*", "cpe:2.3:o:moxa:nport_iaw5250a-12i\\/o_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:nport_iaw5250a-12i\\/o:-:*:*:*:*:*:*:*" ]
CVE-2002-1492
Buffer overflows in the Cisco VPN 5000 Client before 5.2.7 for Linux, and VPN 5000 Client before 5.2.8 for Solaris, allow local users to gain root privileges via (1) close_tunnel and (2) open_tunnel.
[ "cpe:2.3:a:cisco:vpn_5000_client:5.2.6:*:linux:*:*:*:*:*", "cpe:2.3:a:cisco:vpn_5000_client:5.2.7:*:solaris:*:*:*:*:*" ]
CVE-2014-6045
SQL injection vulnerability in phpMyFAQ before 2.8.13 allows remote authenticated users with certain permissions to execute arbitrary SQL commands via vectors involving the restore function.
[ "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" ]
CVE-2019-6739
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Malwarebytes Antimalware 3.6.1.2711. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page. There is an issue with the way the product handles URIs within certain schemes. The product does not warn the user that a dangerous navigation is about to take place. Because special characters in the URI are not sanitized, this could lead to the execution of arbitrary commands. An attacker can leverage this vulnerability to execute code in the context of the current user at medium integrity. Was ZDI-CAN-7162.
[ "cpe:2.3:a:malwarebytes:antimalware:3.6.1.2711:*:*:*:*:*:*:*" ]