id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2022-25229 | Popcorn Time 0.4.7 has a Stored XSS in the 'Movies API Server(s)' field via the 'settings' page. The 'nodeIntegration' configuration is set to on which allows the 'webpage' to use 'NodeJs' features, an attacker can leverage this to run OS commands. | [
"cpe:2.3:a:popcorn_time_project:popcorn_time:0.4.7:*:*:*:*:*:*:*"
] |
|
CVE-2003-0661 | The NetBT Name Service (NBNS) for NetBIOS in Windows NT 4.0, 2000, XP, and Server 2003 may include random memory in a response to a NBNS query, which could allow remote attackers to obtain sensitive information. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*"
] |
|
GHSA-r4pj-mfcc-hfr5 | An issue was discovered in Mattermost Server before 5.8.0. It mishandles brute-force attacks against MFA. | [] |
|
GHSA-57w4-jf74-fc8m | Due to insufficient input validation, SAP Financial Consolidation - version 1010, allows an authenticated attacker to inject malicious script when running a common query in the Web Administration Console. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality, integrity and availability of the application. | [] |
|
CVE-2023-0767 | An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
GHSA-gfg2-33mf-746p | The theme editor in Bolt before 2.2.5 does not check the file extension when renaming files, which allows remote authenticated users to execute arbitrary code by renaming a crafted file and then directly accessing it. | [] |
|
CVE-2022-38393 | A denial of service vulnerability exists in the cfg_server cm_processConnDiagPktList opcode of Asus RT-AX82U 3.0.0.4.386_49674-ge182230 router's configuration service. A specially-crafted network packet can lead to denial of service. An attacker can send a malicious packet to trigger this vulnerability. | [
"cpe:2.3:o:asus:rt-ax82u_firmware:3.0.0.4.386_49674-ge182230:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-4034 | SQL injection vulnerability in zero_view_article.php in ZeroCMS 1.0 allows remote attackers to execute arbitrary SQL commands via the article_id parameter. | [
"cpe:2.3:a:aas9:zerocms:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-0210 | A bug affects the Linux kernel’s ksmbd NTLMv2 authentication and is known to crash the OS immediately in Linux-based systems. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-h6vq-xr3x-hmh3 | A vulnerability in the CLI of Cisco Firepower 4100 Series, Cisco Firepower 9300 Security Appliances, and Cisco UCS 6200, 6300, 6400, and 6500 Series Fabric Interconnects could allow an authenticated, local attacker to inject unauthorized commands. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute unauthorized commands within the CLI. An attacker with Administrator privileges could also execute arbitrary commands on the underlying operating system of Cisco UCS 6400 and 6500 Series Fabric Interconnects with root-level privileges. | [] |
|
CVE-2018-16447 | Frog CMS 0.9.5 has admin/?/user/edit/1 CSRF. | [
"cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*"
] |
|
CVE-2019-1685 | Cisco Unity Connection Reflected Cross-Site Scripting Vulnerability | A vulnerability in the Security Assertion Markup Language (SAML) single sign-on (SSO) interface of Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Version 12.5 is affected. | [
"cpe:2.3:a:cisco:unity_connection:12.5:*:*:*:*:*:*:*"
] |
GHSA-xvf8-v4x4-rv48 | IOAcceleratorFamily in Apple iOS before 9 allows attackers to obtain sensitive kernel memory-layout information via a crafted app. | [] |
|
CVE-2008-0868 | Cross-site scripting (XSS) vulnerability in Groupspace in BEA WebLogic Portal 10.0 and 9.2 through Maintenance Pack 1 allows remote authenticated users to inject arbitrary web script or HTML via unknown vectors. | [
"cpe:2.3:a:bea_systems:weblogic_portal:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_portal:9.2:*:*:*:*:*:*:*"
] |
|
GHSA-pq5r-3v56-qhmr | Stack-based buffer overflow in PXEService.exe in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier allows remote attackers to execute arbitrary code via a large PXE protocol request in a UDP packet. | [] |
|
CVE-2017-3935 | Network Data Loss Prevention is vulnerable to MIME type sniffing which allows older versions of Internet Explorer to perform MIME-sniffing on the response body, potentially causing the response body to be interpreted and displayed as a content type other than the intended content type. | [
"cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:internet_explorer:*:*"
] |
|
CVE-2024-2578 | WordPress WP Coder plugin <= 3.5 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPCoder WP Coder allows Stored XSS.This issue affects WP Coder: from n/a through 3.5.
| [] |
GHSA-hgqf-mqgf-crqx | tifig v0.2.2 was discovered to contain a memory leak via operator new[](unsigned long) at /asan/asan_new_delete.cpp. | [] |
|
GHSA-v435-pfj6-68r3 | Cross-site Scripting in JFinal | Cross Site Scripting (XSS) vulnerability in JFinalcms 5.0.0 allows attackers to run arbitrary code via the /admin/login username parameter. | [] |
GHSA-w3h2-4jrj-6mcc | A potential use-after-free vulnerability existed in SVG Images if the Refresh Driver was destroyed at an inopportune time. This could have lead to memory corruption or a potentially exploitable crash.
*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox < 106. | [] |
|
CVE-2021-24603 | Site Reviews < 5.13.1 - Authenticated Stored XSS | The Site Reviews WordPress plugin before 5.13.1 does not sanitise some of its Review Details when adding a review as an admin, which could allow them to perform Cross-Site Scripting attacks when the unfiltered_html is disallowed | [
"cpe:2.3:a:geminilabs:site_reviews:*:*:*:*:*:wordpress:*:*"
] |
GHSA-m5w7-59g8-4fhv | Cybozu Garoon 3.x through 3.7.5 and 4.x through 4.0.3 allows remote authenticated users to execute arbitrary PHP code via unspecified vectors, aka CyVDB-863 and CyVDB-867. | [] |
|
GHSA-6gvm-387f-376f | An ActiveX control in gwcls1.dll in the client in Novell GroupWise 8.0 before 8.0.3 HP2 and 2012 before SP1 HP1 allows remote attackers to execute arbitrary code via (1) a pointer argument to the SetEngine method or (2) an XPItem pointer argument to an unspecified method. | [] |
|
GHSA-9jmj-63mp-54pw | Tungsten Automation Power PDF JP2 File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tungsten Automation Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JP2 files.The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25564. | [] |
|
GHSA-xx8c-rpq7-pg6p | A flaw was found in jasper before 2.0.25. An out of bounds read issue was found in jp2_decode function whic may lead to disclosure of information or program crash. | [] |
|
CVE-2022-42467 | h2 webconsole (available only in prototype mode) should nevertheless be disabled by default. | When running in prototype mode, the h2 webconsole module (accessible from the Prototype menu) is automatically made available with the ability to directly query the database. It was felt that it is safer to require the developer to explicitly enable this capability. As of 2.0.0-M8, this can now be done using the 'isis.prototyping.h2-console.web-allow-remote-access' configuration property; the web console will be unavailable without setting this configuration. As an additional safeguard, the new 'isis.prototyping.h2-console.generate-random-web-admin-password' configuration parameter (enabled by default) requires that the administrator use a randomly generated password to use the console. The password is printed to the log, as "webAdminPass: xxx" (where "xxx") is the password. To revert to the original behaviour, the administrator would therefore need to set these configuration parameter: isis.prototyping.h2-console.web-allow-remote-access=true isis.prototyping.h2-console.generate-random-web-admin-password=false Note also that the h2 webconsole is never available in production mode, so these safeguards are only to ensure that the webconsole is secured by default also in prototype mode. | [
"cpe:2.3:a:apache:isis:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:isis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:isis:2.0.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:apache:isis:2.0.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:apache:isis:2.0.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:apache:isis:2.0.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:apache:isis:2.0.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:apache:isis:2.0.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:apache:isis:2.0.0:milestone7:*:*:*:*:*:*"
] |
CVE-2022-39051 | Perl Code execution in Template Toolkit | Attacker might be able to execute malicious Perl code in the Template toolkit, by having the admin installing an unverified 3th party package | [
"cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*",
"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*"
] |
CVE-2016-2416 | libs/gui/BufferQueueConsumer.cpp in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 does not check for the android.permission.DUMP permission, which allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via a dump request, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 27046057. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-49pf-qpc2-r5hr | Cross-site scripting (XSS) vulnerability in textfilesearch.aspx in the Text File Search ASP.NET edition allows remote attackers to inject arbitrary web script or HTML via the search field. | [] |
|
GHSA-48wr-8cjg-9vxg | SugarCRM before 8.0.4 and 9.x before 9.0.2 allows SQL injection in the export function by a Regular user. | [] |
|
GHSA-jmrc-64xw-9vcw | In cPanel before 96.0.8, weak permissions on web stats can lead to information disclosure (SEC-584). | [] |
|
CVE-2021-3972 | A potential vulnerability by a driver used during manufacturing process on some consumer Lenovo Notebook devices' BIOS that was mistakenly not deactivated may allow an attacker with elevated privileges to modify secure boot setting by modifying an NVRAM variable. | [
"cpe:2.3:o:lenovo:ideapad_3-14ada05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14ada05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14ada6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14ada6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14alc6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14alc6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14are05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15ada6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15ada6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15alc6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15alc6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15are05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15igl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15igl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17ada05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17ada05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17ada6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17ada6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17alc6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17alc6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17are05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15ada05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15ada05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l3_15iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l3_15iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l3-15itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l3-15itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-15irh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-15irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-15iwl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-15iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-15iwl_touch_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-15iwl_touch:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-17irh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-17irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l340-17iwl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l340-17iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ach6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ach6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ach6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ach6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ach6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ach6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ach6a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ach6a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ach6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ach6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15imh6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15imh6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ach6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ach6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ach6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ach6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_7-16achg6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_7-16achg6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_7-16ithg6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_7-16ithg6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_s7-15ach6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_s7-15ach6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-15irh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-15irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-15irh-pg0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-15irh-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-17irh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-17irh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y540-17irh-pg0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y540-17irh-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y545_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y545:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y545-pg0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y545-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y7000-2019_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y7000-2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_y7000-2019-pg0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_y7000-2019-pg0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s14_g2_itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s14_g2_itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14api_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14ast_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14igm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15api_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15ast_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15igm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s540-13api_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s540-13api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s540-13iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s540-13iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7_pro-14ihu5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7_pro-14ihu5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_9-14itl05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_9-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g1-iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g1-iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g2-acl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g2-acl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g2-itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g2-itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-ada_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-ada:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-are_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-are:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-igl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-igl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v140-15iwl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v140-15iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g1-iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g1-iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g2-alc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g2-alc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g2-itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g2-itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15-ada_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15-ada:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15-igl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15-igl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15-iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v17_g2-itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v17_g2-itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v17-iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v17-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v340-17iwl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v340-17iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7-14acn6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7-14acn6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_c740-14iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_c740-14iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_c740-15iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_c740-15iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_c940-14iil_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_c940-14iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ach5_d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ach5_d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ach5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ach5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ach5_o_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ach5_o:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ach5_od_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ach5_od:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14arh5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14arh5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ihu5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ihu5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ihu5_o_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ihu5_o:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14itl5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14itl5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_9-14itl05_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_9-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14igl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14igl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5-15are05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5-15are05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5-15iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_creator_5-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_creator_5-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_gaming_3-15arh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_gaming_3-15arh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_gaming_3-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_gaming_3-15imh05:-:*:*:*:*:*:*:*"
] |
|
GHSA-x9gw-7c53-m463 | A Heap-based Buffer Overflow issue was discovered in WECON LeviStudio HMI. The heap-based buffer overflow vulnerability has been identified, which may allow remote code execution. | [] |
|
CVE-2017-18865 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R8300 before 1.0.2.104 and R8500 before 1.0.2.104. | [
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*"
] |
|
GHSA-3j5x-62hv-3543 | MySQL Connector/NET before 6.0.4, when using encryption, does not verify SSL certificates during connection, which allows remote attackers to perform a man-in-the-middle attack with a spoofed SSL certificate. | [] |
|
CVE-2012-1782 | Multiple cross-site scripting (XSS) vulnerabilities in questions/ask in OSQA 3b allow remote attackers to inject arbitrary web script or HTML via the (1) url bar or (2) picture bar. | [
"cpe:2.3:a:osqa:osqa:3b:*:*:*:*:*:*:*"
] |
|
GHSA-cxqp-m6r8-mmpg | In Ericsson Network Location MPS GMPC21, it is possible to creates a new admin user with a SQL Query for file_name in the export functionality. | [] |
|
CVE-2015-3830 | The stock Android browser address bar in all Android operating systems suffers from Address Bar Spoofing, which allows remote attackers to trick a victim by displaying a malicious page for legitimate domain names. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-9130 | The faacEncOpen function in libfaac/frame.c in Freeware Advanced Audio Coder (FAAC) 1.28 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted wav file. | [
"cpe:2.3:a:freeware_advanced_audio_coder_project:freeware_advanced_audio_coder:1.28:*:*:*:*:*:*:*"
] |
|
CVE-2017-0383 | An elevation of privilege vulnerability in the Framework APIs could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 7.0, 7.1. Android ID: A-31677614. | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-2754 | Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.0.1-12.0.3, 12.1.0-12.4.0 and 14.0.0-14.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-6600 | The OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting due to a missing capability check on the update_settings() function hooked via admin_init in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject Cross-Site Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched. | [
"cpe:2.3:a:daan:omgf:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-j7c5-29j6-9p8m | Wedding Management System v1.0 is vulnerable to SQL Injection via /Wedding-Management/admin/client_assign.php?booking=31&user_id=. | [] |
|
CVE-2022-22237 | Junos OS: Peers not configured for TCP-AO can establish a BGP or LDP session even if authentication is configured locally | An Improper Authentication vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause an impact on confidentiality or integrity. A vulnerability in the processing of TCP-AO will allow a BGP or LDP peer not configured with authentication to establish a session even if the peer is locally configured to use authentication. This could lead to untrusted or unauthorized sessions being established. This issue affects Juniper Networks Junos OS: 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS Evolved. | [
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*"
] |
GHSA-6434-hpfm-8425 | The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site. | [] |
|
GHSA-g7mg-6rh4-c572 | Expired Pointer Dereference in NPM radare2.js prior to 5.6.2. | [] |
|
GHSA-5jfg-phx7-7fxg | Magento Open Source affected by Improper Input Validation | Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to leak another user's data. Exploitation of this issue does not require user interaction. | [] |
CVE-2015-7247 | D-Link DVG-N5402SP with firmware W1000CN-00, W1000CN-03, or W2000EN-00 discloses usernames, passwords, keys, values, and web account hashes (super and admin) in plaintext when running a configuration backup, which allows remote attackers to obtain sensitive information. | [
"cpe:2.3:o:d-link:dvg-n5402sp_firmware:w1000cn-00:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dvg-n5402sp_firmware:w1000cn-03:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dvg-n5402sp_firmware:w2000en-00:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dvg-n5402sp:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-17429 | In K7 Antivirus Premium before 15.1.0.53, user-controlled input to the K7Sentry device is not sufficiently authenticated: a local user with a LOW integrity process can access a raw hard disk by sending a specific IOCTL. | [
"cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*",
"cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*",
"cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*",
"cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*",
"cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-27408 | A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). The `i2c` mutex file is created with the permissions bits of `-rw-rw-rw-`. This file is used as a mutex for multiple applications interacting with i2c. This could allow an authenticated attacker with access to the SSH interface on the affected device to interfere with the integrity of the mutex and the data it protects. | [
"cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*"
] |
|
GHSA-63v7-wh6q-2rqr | BoidCMS 2.0.1 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) issues via the title, subtitle, footer, or keywords parameter in a page=create action. | [] |
|
GHSA-4qv9-67wq-cv7g | SoftVibe SARABAN for INFOMA 1.1 is vulnerable to stored cross-site scripting (XSS) that allows users to store scripts in certain fields (e.g. subject, description) of the document form. | [] |
|
GHSA-f3x7-c8j2-3m8w | An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile Service Elevation of Privilege Vulnerability'. | [] |
|
CVE-2024-2712 | Campcodes Complete Online DJ Booking System user-search.php sql injection | A vulnerability, which was classified as critical, has been found in Campcodes Complete Online DJ Booking System 1.0. This issue affects some unknown processing of the file /admin/user-search.php. The manipulation of the argument searchdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257465 was assigned to this vulnerability. | [] |
GHSA-f949-967p-47p8 | Unrestricted File Upload vulnerability in GPWeb 8.4.61 allows remote authenticated users to upload any type of file, including a PHP shell. | [] |
|
GHSA-88vg-p93r-gj25 | A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow command injection by setting a specially crafted network configuration. This vulnerability is the same as CNVD-2020-68652. | [] |
|
CVE-2010-3092 | The upload module in Drupal 5.x before 5.23 and 6.x before 6.18 does not properly support case-insensitive filename handling in a database configuration, which allows remote authenticated users to bypass the intended restrictions on downloading a file by uploading a different file with a similar name. | [
"cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*"
] |
|
GHSA-xmgj-jp3c-9mp3 | PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) may allow an attacker to be able to change the password for an admin user who is currently or previously logged in, provided the device has not been restarted. | [] |
|
GHSA-3cv5-693m-8vg4 | Cisco IOS XR 5.1.1.K9SEC allows remote authenticated users to cause a denial of service (vty error, and SSH and TELNET outage) via a crafted disconnect action within an SSH session, aka Bug ID CSCul63127. | [] |
|
GHSA-9v27-96h9-9xrq | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in HT Plugins WishSuite allows PHP Local File Inclusion. This issue affects WishSuite: from n/a through 1.4.4. | [] |
|
GHSA-xhxq-qm6p-f4gx | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062. | [] |
|
GHSA-7mqj-6929-c48q | SeaWell Networks Spectrum SDC 02.05.00 allows remote viewer users to perform administrative functions. | [] |
|
GHSA-c33p-35vr-2h4x | An issue discovered in Relyum RELY-PCIe 22.2.1 and RELY-REC 23.1.0 allows for unauthorized password changes due to no check for current password. | [] |
|
CVE-2023-31193 |
Snap One OvrC Pro versions prior to 7.3 use HTTP connections when downloading a program from their servers. Because they do not use HTTPS, OvrC Pro devices are susceptible to exploitation.
| [
"cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*"
] |
|
CVE-2023-41879 | Magento LTS's guest order "protect code" can be brute-forced too easily | Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1. | [
"cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*"
] |
CVE-2013-0160 | The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device. | [
"cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*"
] |
|
CVE-2018-4248 | An out-of-bounds read was addressed with improved input validation. This issue affected versions prior to iOS 11.4.1, macOS High Sierra 10.13.6, tvOS 11.4.1, watchOS 4.3.2. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-6437 | Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 do not properly perform authentication for Ethernet firmware updates, which allows remote attackers to execute arbitrary code via a Trojan horse update image. | [
"cpe:2.3:a:rockwellautomation:controllogix_controllers:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:guardlogix_controllers:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:micrologix:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rockwellautomation:softlogix_controllers:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:1756-enbt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:1756-eweb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:1768-enbt:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:1768-eweb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:1794-aentr_flex_i\\/o_ethernet\\/ip_adapter:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_controllers:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_l32e_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:compactlogix_l35e_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:controllogix:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:flexlogix_1788-enbt_adapter:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:guardlogix:*:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:softlogix:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-0949 | Cross-site Scripting (XSS) - Reflected in modoboa/modoboa | Cross-site Scripting (XSS) - Reflected in GitHub repository modoboa/modoboa prior to 2.0.5. | [
"cpe:2.3:a:modoboa:modoboa:*:*:*:*:*:modoboa:*:*"
] |
GHSA-mhcf-wj7p-49vw | Multiple cross-site scripting (XSS) vulnerabilities in PEGA Platform 7.2 ML0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) PATH_INFO to the main page; the (2) beanReference parameter to the JavaBean viewer page; or the (3) pyTableName to the System database schema modification page. | [] |
|
CVE-2022-31861 | Cross site Scripting (XSS) in ThingsBoard IoT Platform through 3.3.4.1 via a crafted value being sent to the audit logs. | [
"cpe:2.3:a:thingsboard:thingsboard:*:*:*:*:*:*:*:*"
] |
|
GHSA-93r8-2fm2-39jj | The modules/mdop.m in the Cypress 1.0k script for BitchX, as downloaded from a distribution site in November 2007, contains an externally introduced backdoor that e-mails sensitive information (hostnames, usernames, and shell history) to a fixed address. | [] |
|
CVE-2024-10690 | Shortcodes for Elementor <= 1.0.4 - Authenticated (Contributor+) Post Disclosure | The Shortcodes for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.4 via the 'SHORTCODE_ELEMENTOR' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private and draft posts created with Elementor that they should not have access to. | [] |
CVE-2010-3434 | Buffer overflow in the find_stream_bounds function in pdf.c in libclamav in ClamAV before 0.96.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-1898 | Improper access control in the notification feature in Devolutions Server 2023.3.14.0 and earlier allows a low privileged user to change notifications settings configured by an administrator.
| [] |
|
GHSA-86g9-3p64-q3xg | The Automatic Downloading option in the id3 Quake 3 Engine and the Icculus Quake 3 Engine (ioquake3) before revision 804 allows remote attackers to overwrite arbitrary files in the quake3 directory (fs_homepath cvar) via a long string of filenames, as contained in the neededpaks buffer. | [] |
|
GHSA-crqm-pwhx-j97f | Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635. | [] |
|
GHSA-vjw6-gq3v-pmxc | An issue was discovered in Square 9 GlobalForms 6.2.x. A Time Based SQL injection vulnerability in the "match" parameter allows remote authenticated attackers to execute arbitrary SQL commands. It is possible to upgrade access to full server compromise via xp_cmdshell. In some cases, the authentication requirement for the attack can be met by sending the default admin credentials. | [] |
|
CVE-2023-49372 | JFinalCMS v5.0.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/slide/save. | [
"cpe:2.3:a:jfinalcms_project:jfinalcms:5.0:*:*:*:*:*:*:*"
] |
|
GHSA-4r2r-cf85-vmc7 | A vulnerability has been identified in the Node.js (.msi version) installation process, specifically affecting Windows users who install Node.js using the .msi installer. This vulnerability emerges during the repair operation, where the "msiexec.exe" process, running under the NT AUTHORITY\SYSTEM context, attempts to read the %USERPROFILE% environment variable from the current user's registry.The issue arises when the path referenced by the %USERPROFILE% environment variable does not exist. In such cases, the "msiexec.exe" process attempts to create the specified path in an unsafe manner, potentially leading to the creation of arbitrary folders in arbitrary locations.The severity of this vulnerability is heightened by the fact that the %USERPROFILE% environment variable in the Windows registry can be modified by standard (or "non-privileged") users. Consequently, unprivileged actors, including malicious entities or trojans, can manipulate the environment variable key to deceive the privileged "msiexec.exe" process. This manipulation can result in the creation of folders in unintended and potentially malicious locations.It is important to note that this vulnerability is specific to Windows users who install Node.js using the .msi installer. Users who opt for other installation methods are not affected by this particular issue. | [] |
|
GHSA-ggjv-5q8p-39gf | Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks. | [] |
|
CVE-2023-4616 | thumbnail Directory Path Traversal Allows Unauthenticated Arbitrary File Read Vulnerability | This vulnerability allows remote attackers to disclose sensitive information on affected installations of LG LED Assistant. Authentication is not required to exploit this vulnerability. The specific flaw exists within the /api/thumbnail endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the current user. | [
"cpe:2.3:a:lg:lg_led_assistant:2.1.45:*:*:*:*:*:*:*"
] |
GHSA-jfqh-pjgv-3jhm | The Tecno Spark Pro Android device with a build fingerprint of TECNO/H3722/TECNO-K8:7.0/NRD90M/K8-H3722ABCDE-N-171229V96:user/release-keys contains a pre-installed app with a package name of com.lovelyfont.defcontainer app (versionCode=7, versionName=7.0.5) that allows unauthorized dynamic code loading via a confused deputy attack. This capability can be accessed by any app co-located on the device. | [] |
|
CVE-2007-3521 | SQL injection vulnerability in ArcadeBuilder Game Portal Manager 1.7 allows remote attackers to execute arbitrary SQL commands via a usercookie cookie. | [
"cpe:2.3:a:arcadebuilder:game_portal_manager:1.7:*:*:*:*:*:*:*"
] |
|
GHSA-7qfw-hvhq-23p7 | Heap-based buffer overflow in DUNZIP32.DLL for RealPlayer 8, 10, and 10.5 and RealOne Player 1 and 2 allows remote attackers to execute arbitrary code via a crafted RealPlayer Skin (RJS) file, a different vulnerability than CVE-2004-1094. | [] |
|
CVE-2025-27294 | WordPress WP-Asambleas plugin <= 2.85.0 - Arbitrary Shortcode Execution vulnerability | Missing Authorization vulnerability in platcom WP-Asambleas allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP-Asambleas: from n/a through 2.85.0. | [] |
GHSA-7r78-jwvv-47q7 | Revive Adserver before 3.2.2 does not restrict access to run-mpe.php, which allows remote attackers to run the Maintenance Priority Engine and possibly cause a denial of service (resource consumption) via a direct request. | [] |
|
GHSA-4xmw-qq98-42q5 | The SupportCandy WordPress plugin before 3.1.5 does not validate and escape user input before using it in an SQL statement, which could allow unauthenticated attackers to perform SQL injection attacks | [] |
|
CVE-2018-11424 | There is Memory corruption in the web interface of Moxa OnCell G3470A-LTE Series version 1.6 Build 18021314 and prior, a different vulnerability than CVE-2018-11425. | [
"cpe:2.3:o:moxa:oncell_g3470a-lte-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3470a-lte-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3470a-lte-us-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3470a-lte-us-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3470a-lte-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3470a-lte-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3470a-lte-eu-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3470a-lte-eu-t:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-32775 | Any user can see any fields (including mailbox password) with GroupBy Dashlet | Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.4, a non admin user can get access to many class/field values through GroupBy Dashlet error message. This issue is fixed in versions 2.7.4 and 3.0.0. | [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:combodo:itop:3.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:combodo:itop:3.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:combodo:itop:3.0.0:beta2:*:*:*:*:*:*"
] |
GHSA-5wfp-vx7w-jx9r | HGiga OAKlouds file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary command or disrupt service. | [] |
|
GHSA-w53g-3x4g-6vhq | Possible buffer overflow while updating ikev2 parameters for delete payloads received during informational exchange due to lack of check of input validation for certain parameters received from the ePDG server in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile | [] |
|
CVE-2000-0050 | The Allaire Spectra Webtop allows authenticated users to access other Webtop sections by specifying explicit URLs. | [
"cpe:2.3:a:allaire:spectra:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2025-1336 | CmsEasy image_admin.php deleteimg_action path traversal | A vulnerability has been found in CmsEasy 7.7.7.9 and classified as problematic. Affected by this vulnerability is the function deleteimg_action in the library lib/admin/image_admin.php. The manipulation of the argument imgname leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
GHSA-cwxx-ph2v-87p8 | NETGEAR JGS516PE devices before 2.6.0.43 are affected by lack of access control at the function level. | [] |
|
CVE-2021-0216 | Junos OS: ACX5448, ACX710: BFD sessions might flap due to high rate of transit ARP packets | A vulnerability in Juniper Networks Junos OS running on the ACX5448 and ACX710 platforms may cause BFD sessions to flap when a high rate of transit ARP packets are received. This, in turn, may impact routing protocols and network stability, leading to a Denial of Service (DoS) condition. When a high rate of transit ARP packets are exceptioned to the CPU and BFD flaps, the following log messages may be seen: bfdd[15864]: BFDD_STATE_UP_TO_DOWN: BFD Session 192.168.14.3 (IFL 232) state Up -> Down LD/RD(17/19) Up time:11:38:17 Local diag: CtlExpire Remote diag: None Reason: Detect Timer Expiry. bfdd[15864]: BFDD_TRAP_SHOP_STATE_DOWN: local discriminator: 17, new state: down, interface: irb.998, peer addr: 192.168.14.3 rpd[15839]: RPD_ISIS_ADJDOWN: IS-IS lost L2 adjacency to peer on irb.998, reason: BFD Session Down bfdd[15864]: BFDD_TRAP_SHOP_STATE_UP: local discriminator: 17, new state: up, interface: irb.998, peer addr: 192.168.14.3 This issue only affects the ACX5448 Series and ACX710 Series routers. No other products or platforms are affected by this vulnerability. This issue affects Juniper Networks Junos OS: 18.2 versions prior to 18.2R3-S8 on ACX5448; 18.3 versions prior to 18.3R3-S5 on ACX5448; 18.4 versions prior to 18.4R1-S6, 18.4R3-S7 on ACX5448; 19.1 versions prior to 19.1R3-S5 on ACX5448; 19.2 versions prior to 19.2R2, 19.2R3 on ACX5448; 19.3 versions prior to 19.3R3 on ACX5448; 19.4 versions prior to 19.4R3 on ACX5448; 20.1 versions prior to 20.1R2 on ACX5448; 20.2 versions prior to 20.2R2 on ACX5448 and ACX710. | [
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx5448:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*"
] |
CVE-2024-32554 | WordPress Knight Lab Timeline plugin <= 3.9.3.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Knight Lab Knight Lab Timeline allows Stored XSS.This issue affects Knight Lab Timeline: from n/a through 3.9.3.4.
| [] |
GHSA-7c7q-3jw9-88x4 | Multiple stack-based buffer overflows in the pgsqlQuery function in NullLogic Groupware 1.2.7, when PostgreSQL is used, might allow remote attackers to execute arbitrary code via input to the (1) POP3, (2) SMTP, or (3) web component that triggers a long SQL query. | [] |
|
GHSA-6qjm-h442-97p9 | A vulnerability classified as critical was found in Rebuild up to 3.2.3. Affected by this vulnerability is the function queryListOfConfig of the file /admin/robot/approval/list. The manipulation of the argument q leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is c9474f84e5f376dd2ade2078e3039961a9425da7. It is recommended to apply a patch to fix this issue. The identifier VDB-223381 was assigned to this vulnerability. | [] |
|
GHSA-2j5w-q8vw-5g5m | Dell OpenManage Enterprise version 3.5 and OpenManage Enterprise-Modular version 1.30.00 contain an information disclosure vulnerability. An authenticated low privileged attacker may potentially exploit this vulnerability leading to disclosure of the OIDC server credentials. | [] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.