id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2011-3634 | methods/https.cc in apt before 0.8.11 accepts connections when the certificate host name fails validation and Verify-Host is enabled, which allows man-in-the-middle attackers to obtain repository credentials via unspecified vectors. | [
"cpe:2.3:a:debian:advanced_package_tool:*:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:advanced_package_tool:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:advanced_package_tool:0.8.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:debian:advanced_package_tool:0.8.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:debian:advanced_package_tool:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:advanced_package_tool:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:advanced_package_tool:0.8.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:advanced_package_tool:0.8.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*"
] |
|
GHSA-7pf2-j67p-qhmh | An issue was discovered in idreamsoft iCMS 7.0.13. admincp.php?app=apps&do=save allows directory traversal via _app=/../ to begin the process of creating a ZIP archive file with the complete contents of any directory because of an apps.admincp.php error. This ZIP archive file can then be downloaded via an admincp.php?app=apps&do=pack request. | [] |
|
CVE-2024-12601 | Calculated Fields Form <= 5.2.63 - Denial of Service | The Calculated Fields Form plugin for WordPress is vulnerable to Denial of Service in all versions up to, and including, 5.2.63. This is due to unlimited height and width parameters for CAPTCHA images. This makes it possible for unauthenticated attackers to send multiple requests with large values, resulting in slowing server resources if the server does not mitigate Denial of Service attacks. | [] |
CVE-2023-6568 | Reflected XSS via Content-Type Header in mlflow/mlflow | A reflected Cross-Site Scripting (XSS) vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the Content-Type header in POST requests. An attacker can inject malicious JavaScript code into the Content-Type header, which is then improperly reflected back to the user without adequate sanitization or escaping, leading to arbitrary JavaScript execution in the context of the victim's browser. The vulnerability is present in the mlflow/server/auth/__init__.py file, where the user-supplied Content-Type header is directly injected into a Python formatted string and returned to the user, facilitating the XSS attack. | [
"cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*"
] |
GHSA-2qrp-v3mf-g36h | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow attackers to execute arbitrary code via a PDF file with crafted Flash content, involving the newfunction (0x44) operator and an "invalid pointer vulnerability" that triggers memory corruption, a different vulnerability than CVE-2010-1285 and CVE-2010-2201. | [] |
|
GHSA-fj9h-4fjr-4345 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted SPP files. This could allow an attacker to execute code in the context of the current process. | [] |
|
CVE-2017-3294 | Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters ). Supported versions that are affected are 8.5.2 and 8.5.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS v3.0 Base Score 7.5 (Availability impacts). | [
"cpe:2.3:a:oracle:outside_in_technology:8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.3:*:*:*:*:*:*:*"
] |
|
CVE-2020-6826 | Mozilla developers Tyson Smith, Bob Clary, and Alexandru Michis reported memory safety bugs present in Firefox 74. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 75. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-4492 | Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call. | [
"cpe:2.3:a:i18n_project:i18n:*:*:*:*:*:ruby:*:*"
] |
|
CVE-2022-30600 | A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:4.0.0:-:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] |
|
GHSA-wx6f-4f38-p25q | SQL injection vulnerability in Super Store Finder PHP Script v.3.6 allows a remote attacker to execute arbitrary code via a crafted payload to the username parameter. | [] |
|
GHSA-2x37-ffq7-5322 | MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people:id/relationships` endpoint and first_name and last_name parameter. | [] |
|
CVE-2024-2981 | Tenda FH1202 fast_setting_wifi_set form_fast_setting_wifi_set stack-based overflow | A vulnerability, which was classified as critical, was found in Tenda FH1202 1.2.0.14(408). Affected is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation of the argument ssid leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258150 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*"
] |
CVE-2017-15110 | In Moodle 3.x, students can find out email addresses of other students in the same course. Using search on the Participants page, students could search email addresses of all participants regardless of email visibility. This allows enumerating and guessing emails of other students. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] |
|
GHSA-r225-67h8-37wh | cgi/b on the BT Home Hub router allows remote attackers to bypass authentication, and read or modify administrative settings or make arbitrary VoIP telephone calls, by placing a character at the end of the PATH_INFO, as demonstrated by (1) %5C (encoded backslash), (2) '%' (percent), and (3) '~' (tilde). NOTE: the '/' (slash) vector is already covered by CVE-2007-5383. | [] |
|
GHSA-4v5g-r6mf-cq6v | IBM MQ 9.0 and 9.1 is vulnerable to a denial of service attack due to an error in the Channel processing function. IBM X-Force ID: 173625. | [] |
|
CVE-2018-7662 | Couch through 2.0 allows remote attackers to discover the full path via a direct request to includes/mysql2i/mysql2i.func.php or addons/phpmailer/phpmailer.php. | [
"cpe:2.3:a:couchcms:couch:*:*:*:*:*:*:*:*"
] |
|
GHSA-g2x7-rq6p-w7gg | Cross-site scripting (XSS) vulnerability in the Inline Entity Form module 7.x-1.x before 7.x-1.6 for Drupal allows remote authenticated users with permission to create or edit fields to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-1999-1305 | Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access. | [
"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*"
] |
|
GHSA-g4ww-5v49-gv5x | Cross-site scripting (XSS) vulnerability in login.cgi in D-Link router DIR-655 (rev Bx) with firmware before 2.12b01 allows remote attackers to inject arbitrary web script or HTML via the html_response_page parameter. | [] |
|
CVE-2018-7290 | Cross Site Scripting (XSS) exists in Tiki before 12.13, 15.6, 17.2, and 18.1. | [
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:18.0:*:*:*:*:*:*:*"
] |
|
GHSA-wx73-f633-64gg | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, and XR500 before 2.3.2.32. | [] |
|
CVE-2007-6328 | DOSBox 0.72 and earlier allows local users to obtain access to the filesystem on the host operating system via the mount command. NOTE: the researcher reports a vendor response stating that this is not a security problem | [
"cpe:2.3:a:dosbox:dosbox:*:*:*:*:*:*:*:*"
] |
|
CVE-2009-2361 | SQL injection vulnerability in include/class.staff.php in osTicket before 1.6 RC5 allows remote attackers to execute arbitrary SQL commands via the staff username parameter. | [
"cpe:2.3:a:osticket:osticket:*:rc4:*:*:*:*:*:*",
"cpe:2.3:a:osticket:osticket:1.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:osticket:osticket:1.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:osticket:osticket:1.6:rc3:*:*:*:*:*:*"
] |
|
CVE-2022-21357 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] |
|
GHSA-pjmv-2gvx-rph8 | Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message. NOTE: the vendor states that the issue is caused by "an XSS vulnerability in Firefox browsers." | [] |
|
CVE-2020-1239 | A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1238. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-r8v4-4fm3-v2p5 | A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality. | [] |
|
CVE-2019-11640 | An issue was discovered in GNU recutils 1.8. There is a heap-based buffer overflow in the function rec_fex_parse_str_simple at rec-fex.c in librec.a. | [
"cpe:2.3:a:gnu:recutils:1.8:*:*:*:*:*:*:*"
] |
|
CVE-2017-6167 | In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Link Controller, PEM and WebSafe software version 13.0.0 and 12.1.0 - 12.1.2, race conditions in iControl REST may lead to commands being executed with different privilege levels than expected. | [
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:13.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-1338 | Easily Generate Rest API Url <= 1.0.0 - Admin+ Stored Cross-Site Scripting | The Easily Generate Rest API Url WordPress plugin through 1.0.0 does not escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed | [
"cpe:2.3:a:commonninja:easily_generate_rest_api:*:*:*:*:*:wordpress:*:*"
] |
GHSA-xr2r-4cvv-wp49 | parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a "." (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file. | [] |
|
GHSA-3wx2-5m79-ph37 | Cross-site Scripting (XSS) vulnerability in log view of Secomea SiteManager allows a logged in user to store javascript for later execution. This issue affects: Secomea SiteManager Version 9.6.621421014 and all prior versions. | [] |
|
GHSA-c5pj-m2vw-68wh | LB-LINK BL-AC1900_2.0 v1.0.1, LB-LINK BL-WR9000 v2.4.9, LB-LINK BL-X26 v1.2.5, and LB-LINK BL-LTE300 v1.0.8 were discovered to contain a command injection vulnerability via the mac, time1, and time2 parameters at /goform/set_LimitClient_cfg. | [] |
|
CVE-2024-8445 | 389-ds-base: server crash while modifying `userpassword` using malformed input (incomplete fix for cve-2024-2199) | The fix for CVE-2024-2199 in 389-ds-base was insufficient to cover all scenarios. In certain product versions, an authenticated user may cause a server crash while modifying `userPassword` using malformed input. | [
"cpe:/o:redhat:rhel_els:7",
"cpe:/a:redhat:directory_server:11",
"cpe:/a:redhat:directory_server:12",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9"
] |
GHSA-q2rr-hx82-5fph | Stack based overflow If the maximum number of arguments allowed per request in perflock exceeds in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, APQ8096AU, APQ8098, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, Saipan, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 | [] |
|
GHSA-h2x8-3x5w-pfqr | The mintToken function of a smart contract implementation for GemstoneToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] |
|
CVE-2021-32568 | Deserialization of Untrusted Data in zmister2016/mrdoc | mrdoc is vulnerable to Deserialization of Untrusted Data | [
"cpe:2.3:a:mrdoc:mrdoc:*:*:*:*:*:*:*:*"
] |
CVE-2023-30798 | MultipartParser DOS with too many fields or files in Starlette Framework | There MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service. | [
"cpe:2.3:a:encode:starlette:*:*:*:*:*:python:*:*"
] |
CVE-2022-37113 | Bluecms 1.6 has SQL injection in line 132 of admin/area.php | [
"cpe:2.3:a:bluecms_project:bluecms:1.6:*:*:*:*:*:*:*"
] |
|
GHSA-x7mj-r2cp-pv8c | PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-24495. | [] |
|
CVE-2012-5911 | Cross-site scripting (XSS) vulnerability in blogs/blog1.php in b2evolution 4.1.3 allows remote attackers to inject arbitrary web script or HTML via the message body. | [
"cpe:2.3:a:b2evolution:b2evolution:4.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-54c3-2724-2j2f | An exploitable integer underflow vulnerability exists in the ZigBee firmware update routine of the hubCore binary of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The hubCore process incorrectly handles malformed files existing in its data directory, leading to an infinite loop, which eventually causes the process to crash. An attacker can send an HTTP request to trigger this vulnerability. | [] |
|
GHSA-gh63-q3pg-7q7r | KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and "PID reuse race conditions." | [] |
|
CVE-2021-1486 | Cisco SD-WAN vManage HTTP Authentication User Enumeration Vulnerability | A vulnerability in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to enumerate user accounts. This vulnerability is due to the improper handling of HTTP headers. An attacker could exploit this vulnerability by sending authenticated requests to an affected system. A successful exploit could allow the attacker to compare the HTTP responses that are returned by the affected system to determine which accounts are valid user accounts. | [
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*"
] |
GHSA-497r-prj7-vp7q | Cross-site scripting (XSS) vulnerability in LogiSphere 1.6.0 allows remote attackers to inject arbitrary web script or HTML via the URL, which is reflected in an error page. | [] |
|
GHSA-pgpj-83g3-mfr2 | Jenkins Google Compute Engine Plugin has incorrect permission checks | Jenkins Google Compute Engine Plugin 4.550.vb_327fca_3db_11 and earlier does not correctly perform permission checks in multiple HTTP endpoints. This allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to do the following:Enumerate system-scoped credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.Connect to Google Cloud Platform using attacker-specified credentials IDs obtained through another method, to obtain information about existing projects.Google Compute Engine Plugin 4.551.v5a_4dc98f6962 requires Overall/Administer permission for the affected HTTP endpoints. | [] |
CVE-2022-43432 | Jenkins XFramium Builder Plugin 1.0.22 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download. | [
"cpe:2.3:a:jenkins:xframium_builder:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2014-9050 | Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file. | [
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*"
] |
|
CVE-2004-2756 | Cross-site scripting (XSS) vulnerability in viewtopic.php in Xoops 2.x, possibly 2 through 2.0.5, allows remote attackers to inject arbitrary web script or HTML via the (1) forum and (2) topic_id parameters. | [
"cpe:2.3:a:xoops:xoops:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:xoops:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:xoops:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:xoops:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:xoops:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:xoops:2.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:xoops:2.0.5.2:*:*:*:*:*:*:*"
] |
|
CVE-2014-7677 | The Scudetto (aka com.scudetto) application 2.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:scudetto_project:scudetto:2.7:*:*:*:*:android:*:*"
] |
|
CVE-2013-7484 | Zabbix before 5.0 represents passwords in the users table with unsalted MD5. | [
"cpe:2.3:a:zabbix:zabbix:2.0.8:-:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:4.4.0:alpha2:*:*:*:*:*:*"
] |
|
GHSA-xfjh-8mwq-67xv | The BuddyForms plugin for WordPress is vulnerable to Email Verification Bypass in all versions up to, and including, 2.8.9 via the use of an insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification. | [] |
|
GHSA-p23x-hc9c-jfq6 | An issue was discovered in Contiki-NG through 4.1. There is a buffer over-read in lookup in os/storage/antelope/lvm.c while parsing AQL (lvm_register_variable, lvm_set_variable_value, create_intersection, create_union). | [] |
|
CVE-2021-26824 | DM FingerTool v1.19 in the DM PD065 Secure USB is susceptible to improper authentication by a replay attack, allowing local attackers to bypass user authentication and access all features and data on the USB. | [
"cpe:2.3:a:dm_fingertool_project:dm_fingertool:1.19:*:*:*:*:*:*:*"
] |
|
GHSA-5w94-r98f-mc64 | An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system. | [] |
|
GHSA-hf94-2x3f-x6rc | An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed read access to issue content via GitHub Projects. This was only exploitable in internal repositories and required the attacker to have access to the corresponding project board. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.14 and was fixed in versions 3.13.1, 3.12.6, 3.11.12, 3.10.14, and 3.9.17. This vulnerability was reported via the GitHub Bug Bounty program. | [] |
|
GHSA-2mvw-pgf2-gf3j | SQL injection vulnerability in the Yet Another Calendar (ke_yac) extension before 1.1.2 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [] |
|
CVE-2015-10093 | Mark User as Spammer Plugin plugin.php user_row_actions cross site scripting | A vulnerability was found in Mark User as Spammer Plugin 1.0.0/1.0.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function user_row_actions of the file plugin/plugin.php. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is e7059727274d2767c240c55c02c163eaa4ba6c62. It is recommended to upgrade the affected component. The identifier VDB-222325 was assigned to this vulnerability. | [
"cpe:2.3:a:mark_user_as_spammer_project:mark_user_as_spammer:1.0.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:mark_user_as_spammer_project:mark_user_as_spammer:1.0.1:*:*:*:*:wordpress:*:*"
] |
CVE-2023-37704 | Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the deviceId parameter in the formSetClientState function. | [
"cpe:2.3:h:tenda:fh1203:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:fh1203_firmware:2.0.1.6:*:*:*:*:*:*:*"
] |
|
CVE-2017-12526 | A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | [
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*"
] |
|
CVE-2007-0639 | Multiple static code injection vulnerabilities in error.php in GuppY 4.5.16 and earlier allow remote attackers to inject arbitrary PHP code into a .inc file in the data/ directory via (1) a REMOTE_ADDR cookie or (2) a cookie specifying an element of the msg array with an error number in the first dimension and 0 in the second dimension, as demonstrated by msg[999][0]. | [
"cpe:2.3:a:guppy:guppy:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-55592 | An incorrect authorization vulnerability [CWE-863] in FortiSIEM 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions, may allow an authenticated attacker to perform unauthorized operations on incidents via crafted HTTP requests. | [] |
|
CVE-2023-0913 | SourceCodester Auto Dealer Management System sql injection | A vulnerability classified as critical was found in SourceCodester Auto Dealer Management System 1.0. This vulnerability affects unknown code of the file /adms/admin/?page=vehicles/sell_vehicle. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221482 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:auto_dealer_management_system_project:auto_dealer_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-qm5q-m2f9-vvhj | An issue was discovered in Creme CRM 1.6.12. The salesman creation page is affected by 10 stored cross-site scripting vulnerabilities involving the firstname, lastname, billing_address-address, billing_address-zipcode, billing_address-city, billing_address-department, shipping_address-address, shipping_address-zipcode, shipping_address-city, and shipping_address-department parameters. | [] |
|
CVE-2023-46369 | Tenda W18E V16.01.0.8(1576) contains a stack overflow vulnerability via the portMirrorMirroredPorts parameter in the formSetNetCheckTools function. | [
"cpe:2.3:o:tenda:w18e_firmware:16.01.0.8\\(1576\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:w18e:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2014-1745 | Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger removal of an SVGFontFaceElement object, related to core/svg/SVGFontFaceElement.cpp. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.69:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.71:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.92:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.93:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.95:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.96:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.98:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.99:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.101:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.103:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.104:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.105:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.106:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.107:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.108:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.109:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.110:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.111:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:35.0.1916.112:*:*:*:*:*:*:*"
] |
|
GHSA-4jmr-68h5-qq5j | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.1.53537. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16663. | [] |
|
CVE-2024-4680 | Insufficient Session Expiration in zenml-io/zenml | A vulnerability in zenml-io/zenml version 0.56.3 allows attackers to reuse old session credentials or session IDs due to insufficient session expiration. Specifically, the session does not expire after a password change, enabling an attacker to maintain access to a compromised account without the victim's ability to revoke this access. This issue was observed in a self-hosted ZenML deployment via Docker, where after changing the password from one browser, the session remained active and usable in another browser without requiring re-authentication. | [
"cpe:2.3:a:zenmlio:zenml:0.56.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zenml:zenml:0.56.3:*:*:*:*:*:*:*"
] |
GHSA-fmxm-f4r3-pvgq | Windows Hyper-V Denial of Service Vulnerability | [] |
|
CVE-2022-20310 | In Telecomm, there is a possible disclosure of registered self managed phone accounts due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-192663798 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
GHSA-f2x7-pmw5-f3c9 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). | [] |
|
GHSA-4gxq-mqgw-j2ww | In sprd_sysdump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. | [] |
|
CVE-2018-10382 | MODX Revolution 2.6.3 has XSS. | [
"cpe:2.3:a:modx:modx_revolution:2.6.3:*:*:*:*:*:*:*"
] |
|
GHSA-x73w-g8hx-v7rp | Code injection in electerm | An issue was discovered in Electerm 1.3.22, allows attackers to execute arbitrary code via unverified request to electerms service. | [] |
GHSA-pw4q-58pr-v79g | Cloud Foundry Container Runtime, versions prior to 0.29.0, deploys Kubernetes clusters utilize the same CA (Certificate Authority) to sign and trust certs for ETCD as used by the Kubernetes API. This could allow a user authenticated with a cluster to request a signed certificate leveraging the Kubernetes CSR capability to obtain a credential that could escalate privilege access to ETCD. | [] |
|
CVE-2024-27910 | A vulnerability was reported in some Lenovo Printers that could allow an unauthenticated attacker to reboot the printer without authentication. | [
"cpe:2.3:o:lenovo:lingxlang_g262dn_firmware:1.00.19:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lingxlang_g336dn_firmware:1.00.20:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lingxlang_lj2320dn_firmware:1.00.10:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lj2310n_firmware:1.00.10:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lingxlang_gm265dn_firmware:1.00.26:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lingxlang_gm337dn_firmware:1.00.24:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m280w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m280dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m1520w_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m1520d_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m1688dw_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m1688w_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m101dw_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m260dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m200dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m7360dnw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_z1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_gm265dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_lj2320dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_lj2320dnp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_g263dns_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_g266dns_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_g336dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_g338dns_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_g337dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_g339dns_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m7360dna_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_m7365dna_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:lijiang_gm268dnas_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-37qj-c4g3-9xvj | Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via multiple IOCTLs, e.g., 0x8810200B, 0x8810200F, 0x8810201B, 0x8810201F, 0x8810202B, 0x8810202F, 0x8810203F, 0x8810204B, 0x88102003, 0x88102007, 0x88102013, 0x88102017, 0x88102027, 0x88102033, 0x88102037, 0x88102043, and 0x88102047. When some conditions in the user-controlled input buffer are not met, the driver writes an error code (0x2000001A) to a user-controlled address. Also, note that all the aforementioned IOCTLs use transfer type METHOD_NEITHER, which means that the I/O manager does not validate any of the supplied pointers and buffer sizes. So, even though the driver checks for input/output buffer sizes, it doesn't validate if the pointers to those buffers are actually valid. So, we can supply a pointer for the output buffer to a kernel address space address, and the error code will be written there. We can take advantage of this condition to modify the SEP_TOKEN_PRIVILEGES structure of the Token object belonging to the exploit process and grant SE_DEBUG_NAME privilege. This allows the exploit process to interact with higher privileged processes running as SYSTEM and execute code in their security context. | [] |
|
CVE-2016-1620 | Multiple unspecified vulnerabilities in Google Chrome before 48.0.2564.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-8415 | SourceCodester Food Ordering Management System add-ticket.php sql injection | A vulnerability was found in SourceCodester Food Ordering Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /routers/add-ticket.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sourcecodester:food_ordering_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-cgxq-vv5m-p85q | A vulnerability has been identified in SIMATIC NET PC Software V14 (All versions), SIMATIC NET PC Software V15 (All versions), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions), SIMATIC WinCC (All versions < V8.0), SINAUT Software ST7sc (All versions). Before SIMATIC WinCC V8, legacy OPC services (OPC DA (Data Access), OPC HDA (Historical Data Access), and OPC AE (Alarms & Events)) were used per default. These
services were designed on top of the Windows ActiveX and DCOM mechanisms and do not implement state-of-the-art security mechanisms for authentication and encryption of contents. | [] |
|
CVE-2021-30609 | Chromium: CVE-2021-30609 Use after free in Sign-In | [
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] |
|
GHSA-g8rq-cfjj-j3hv | Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC). In Keti a sandbox escape vulnerability may lead to post-authentication Remote Code execution. This vulnerability is known to exist in the latest commit at the time of writing this CVE (commit a1c8dbe). For more details see the referenced GHSL-2021-063. | [] |
|
CVE-2018-20124 | hw/rdma/rdma_backend.c in QEMU allows guest OS users to trigger out-of-bounds access via a PvrdmaSqWqe ring element with a large num_sge value. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] |
|
CVE-2020-0405 | In NetworkStackNotifier, there is a possible permissions bypass due to an unsafe implicit PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157475111 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-39602 | A Buffer Overflow vulnerabilty exists in Miniftpd 1.0 in the do_mkd function in the ftpproto.c file, which could let a remote malicious user cause a Denial of Service. | [
"cpe:2.3:a:miniftpd_project:miniftpd:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-9285-vccj-gq3v | Multiple cross-site scripting (XSS) vulnerabilities in Barracuda Spam & Virus Firewall 600 Firmware 4.0.1.009 and earlier allow remote authenticated users to inject arbitrary web script or HTML via (1) Troubleshooting in the Trace route Device module or (2) LDAP Username in the LDAP Configuration module. | [] |
|
CVE-2021-46791 | Insufficient input validation during parsing of the System Management Mode (SMM) binary may allow a maliciously crafted SMM executable binary to corrupt Dynamic Root of Trust for Measurement (DRTM) user application memory that may result in a potential denial of service.
| [
"cpe:2.3:o:amd:milanpi_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*"
] |
|
GHSA-6wg2-qrp2-pr4c | Cross-site scripting vulnerability exists in UNIVERSAL PASSPORT RX versions 1.0.0 to 1.0.7, which may allow a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is using the product. | [] |
|
GHSA-7m66-qhvp-hmf4 | A vulnerability was found in ConcreteCMS up to 9.3.9. It has been declared as problematic. This vulnerability affects the function Save of the component Feature Block Handler. The manipulation of the argument Paragraph Source leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2018-7586 | In the nextgen-gallery plugin before 2.2.50 for WordPress, gallery paths are not secured. | [
"cpe:2.3:a:imagely:nextgen_gallery:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2001-0679 | A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary code by sending a long HELO command to the server. | [
"cpe:2.3:a:trend_micro:interscan_viruswall:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:trend_micro:interscan_viruswall:3.23:*:*:*:*:*:*:*"
] |
|
CVE-2015-6023 | ping.cgi in NetCommWireless HSPA 3G10WVE wireless routers with firmware before 3G10WVE-L101-S306ETS-C01_R05 allows remote attackers to bypass intended access restrictions via a direct request. NOTE: this issue can be combined with CVE-2015-6024 to execute arbitrary commands. | [
"cpe:2.3:o:netcommwireless:hspa_3g10wve_firmware:3g10wve-l101-s306ets-c01_r03:*:*:*:*:*:*:*",
"cpe:2.3:h:netcommwireless:hspa_3g10wve:-:*:*:*:*:*:*:*"
] |
|
GHSA-hf8x-r682-pxjh | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core Components). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L). | [] |
|
GHSA-5464-6c37-jhrh | Cross-site scripting vulnerability in Empirical Project Monitor - eXtended all versions allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2018-6776 | In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A00813C. | [
"cpe:2.3:a:jiangmin:antivirus:16.0.0.100:*:*:*:*:*:*:*"
] |
|
GHSA-57vf-j77f-qh68 | The SSL HTTP Server in HP Web-enabled Management Software 5.0 through 5.92, with anonymous access enabled, allows remote attackers to compromise the trusted certificates by uploading their own certificates. | [] |
|
CVE-2021-42740 | The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character. | [
"cpe:2.3:a:shell-quote_project:shell-quote:*:*:*:*:*:node.js:*:*"
] |
|
GHSA-gcx2-xqvg-96fr | Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability." | [] |
|
CVE-2022-27479 | SQL injection vulnerability in chart data API | Apache Superset before 1.4.2 is vulnerable to SQL injection in chart data requests. Users should update to 1.4.2 or higher which addresses this issue. | [
"cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.