id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-fjmx-5ghq-2wxh | A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0. It has been classified as critical. This affects the function mysqli_query of the file bsitemp.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222981 was assigned to this vulnerability. | [] |
|
GHSA-w8r5-25wc-2c5m | A prompt injection vulnerability in the chatbox of Butterfly Effect Limited Monica Your AI Copilot powered by ChatGPT4 v6.3.0 allows attackers to access and exfiltrate all previous and subsequent chat data between the user and the AI assistant via a crafted message. | [] |
|
CVE-2008-6949 | Multiple cross-site request forgery (CSRF) vulnerabilities in Collabtive 0.4.8 allow remote attackers to hijack the authentication of administrators for requests that (1) submit or edit a new project, or (2) upload files to a project, or (3) attach files to messages via unknown vectors. NOTE: these issues can be leveraged with other vulnerabilities to create remote attack vectors that do not require authentication. | [
"cpe:2.3:a:collabtive:collabtive:0.4.8:*:*:*:*:*:*:*"
] |
|
GHSA-px3r-27qc-hx5g | NT auth module vulnerability in OpenAM | The NT auth module in OpenAM before 14.6.6 allows a "replace Samba username attack." | [] |
CVE-2013-7263 | The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*"
] |
|
GHSA-q937-ph5c-26qf | When asking to get a file from a file:// URL, libcurl provides a feature that outputs meta-data about the file using HTTP-like headers. The code doing this would send the wrong buffer to the user (stdout or the application's provide callback), which could lead to other private data from the heap to get inadvertently displayed. The wrong buffer was an uninitialized memory area allocated on the heap and if it turned out to not contain any zero byte, it would continue and display the data following that buffer in memory. | [] |
|
CVE-2018-12652 | A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Adrenalin 5.4 HRMS Software. The user supplied input containing JavaScript is echoed back in JavaScript code in an HTML response via the LeaveEmployeeSearch.aspx prntFrmName or prntDDLCntrlName parameter. | [
"cpe:2.3:a:myadrenalin:adrenalin:5.4.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-26588 | A potential security vulnerability has been identified in HPE 3PAR StoreServ, HPE Primera Storage and HPE Alletra 9000 Storage array firmware. An unauthenticated user could remotely exploit the low complexity issue to execute code as administrator. This vulnerability impacts completely the confidentiality, integrity, availability of the array. HPE has made the following software updates and mitigation information to resolve the vulnerability in 3PAR, Primera and Alletra 9000 firmware. | [
"cpe:2.3:o:hpe:3par_os:3.3.1_mp5_p156:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:3par_os:3.3.1_mu1:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:3par_os:3.3.1_mu2_p157:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:3par_os:3.3.2_ga_p_01:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:3par_storeserv_10400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:3par_storeserv_10800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:3par_storeserv_20000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:3par_storeserv_7200c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:3par_storeserv_7400c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:3par_storeserv_7440c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:3par_storeserv_8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:3par_storeserv_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:primera_630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:primera_630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:primera_650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:primera_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:primera_670_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:primera_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:alletra_9060_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:alletra_9060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hpe:alletra_9080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:alletra_9080:-:*:*:*:*:*:*:*"
] |
|
GHSA-vwhh-875j-gcqq | A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with local access to the MS3000 Server and low privileges could gain root privileges by sending specifically crafted packets to a named pipe. Please note that an attacker needs to have local access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known. | [] |
|
CVE-2018-16603 | An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. Out of bounds access to TCP source and destination port fields in xProcessReceivedTCPPacket can leak data back to an attacker. | [
"cpe:2.3:a:amazon:amazon_web_services_freertos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:amazon:freertos:*:*:*:*:*:*:*:*"
] |
|
GHSA-hpj7-4fx3-hmfp | Stack-based buffer overflow vulnerability in V-Server v4.0.15.0 and V-Server Lite v4.0.15.0 and earlier allows an attacker to execute arbitrary code by having user open a specially crafted VPR file. | [] |
|
CVE-2025-24152 | The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app may be able to cause unexpected system termination or corrupt kernel memory. | [] |
|
CVE-2006-3491 | Stack-based buffer overflow in Kaillera Server 0.86 and earlier allows remote attackers to execute arbitrary code via a long nickname. | [
"cpe:2.3:a:christophe_thibault:kaillera:*:*:*:*:*:*:*:*"
] |
|
GHSA-xwqj-7mqr-967j | Format string vulnerability in imap4d server in GNU Mailutils 0.5 and 0.6, and other versions before 0.6.90, allows remote attackers to execute arbitrary code via format string specifiers in the command tag for IMAP commands. | [] |
|
GHSA-q7gr-xr74-27p6 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters. | [] |
|
CVE-2021-1243 | Cisco IOS XR Software SNMP Management Plane Protection ACL Bypass Vulnerability | A vulnerability in the Local Packet Transport Services (LPTS) programming of the SNMP with the management plane protection feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to allow connections despite the management plane protection that is configured to deny access to the SNMP server of an affected device. This vulnerability is due to incorrect LPTS programming when using SNMP with management plane protection. An attacker could exploit this vulnerability by connecting to an affected device using SNMP. A successful exploit could allow the attacker to connect to the device on the configured SNMP ports. Valid credentials are required to execute any of the SNMP requests. | [
"cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:6.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xr:7.2.0:*:*:*:*:*:*:*"
] |
GHSA-x4jx-xq7r-fxx7 | Use-after-free vulnerability in Google Chrome before 24.0.1312.52 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving seek operations on video data. | [] |
|
CVE-2010-0551 | HTTP authentication implementation in Geo++ GNCASTER 1.4.0.7 and earlier allows remote attackers to read authentication headers of other users via a large request with an incorrect authentication attempt, which includes sensitive memory in the response. NOTE: this is referred to as a "memory leak" by some sources, but is better characterized as "memory disclosure." | [
"cpe:2.3:a:geopp:geo\\+\\+_gncaster:*:*:*:*:*:*:*:*",
"cpe:2.3:a:geopp:geo\\+\\+_gncaster:1.4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-3rrw-pv9w-qgch | In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well. | [] |
|
GHSA-7f8p-fv57-7cr3 | Cross-site scripting (XSS) vulnerability in the Autocomplete plugin before 3.0 for SquirrelMail allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2022-40657 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of NIKON NIS-Elements Viewer 1.2100.1483.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSD files. Crafted data in a PSD file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15073. | [
"cpe:2.3:a:nikon:nis-elements_viewer:1.2100.1483.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-6579 | Cross-site scripting (XSS) vulnerability in mailhive/cloudbeez/cloudloader.php and mailhive/cloudbeez/cloudloader_core.php in the MailBeez plugin for ZenCart before 3.9.22 allows remote attackers to inject arbitrary web script or HTML via the cloudloader_mode parameter. | [
"cpe:2.3:a:mailbeez:mailbeez:*:*:*:*:*:zencart:*:*"
] |
|
CVE-2015-6633 | The display drivers in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23987307. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-qq9g-rvjp-rm4j | Buffer overflow in Apache 1.2.5 and earlier allows a remote attacker to cause a denial of service with a large number of GET requests containing a large number of / characters. | [] |
|
GHSA-vf69-hcwp-rxc8 | An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain the backups of the database by requesting the "/embedai/app/uploads/database/<SQL_FILE>" endpoint. | [] |
|
CVE-2024-12870 | Stored Cross-site Scripting (XSS) in infiniflow/ragflow | A stored cross-site scripting (XSS) vulnerability exists in infiniflow/ragflow, affecting the latest commit on the main branch (cec2080). The vulnerability allows an attacker to upload HTML/XML files that can host arbitrary JavaScript payloads. These files are served with the 'application/xml' content type, which is automatically rendered by browsers. This can lead to the execution of arbitrary JavaScript in the context of the user's browser, potentially allowing attackers to steal cookies and gain unauthorized access to user files and resources. The vulnerability does not require authentication, making it accessible to anyone with network access to the instance. | [] |
CVE-2020-11643 | GateManager Information Disclosure Vulnerability | An information disclosure vulnerability in B&R GateManager 4260 and 9250 versions <9.0.20262 and GateManager 8250 versions <9.2.620236042 allows authenticated users to view information of devices belonging to foreign domains. | [
"cpe:2.3:o:br-automation:gatemanager_9250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:br-automation:gatemanager_9250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:br-automation:gatemanager_4260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:br-automation:gatemanager_4260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:br-automation:gatemanager_8250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:br-automation:gatemanager_8250:-:*:*:*:*:*:*:*"
] |
GHSA-6qmq-f9pv-3jqp | The read_game_map function in src/terrain_translation.cpp in Wesnoth before r32987 allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a map with a large (1) width or (2) height. | [] |
|
GHSA-2vvm-3hqv-2c4h | Multiple PHP remote file inclusion vulnerabilities in adminprint.php in PicturesPro Photo Cart 3.9 allow remote attackers to execute arbitrary PHP code via a URL in the (1) admin_folder and (2) path parameters. | [] |
|
CVE-2001-0040 | APC UPS daemon, apcupsd, saves its process ID in a world-writable file, which allows local users to kill an arbitrary process by specifying the target process ID in the apcupsd.pid file. | [
"cpe:2.3:a:apc:apcupsd:3.7.2:*:*:*:*:*:*:*"
] |
|
CVE-2008-4151 | Directory traversal vulnerability in collect.php in CYASK 3.x allows remote attackers to read arbitrary files via a .. (dot dot) in the neturl parameter. | [
"cpe:2.3:a:cyask:cyask:3:*:*:*:*:*:*:*"
] |
|
GHSA-vmj3-p7xv-c3c3 | The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl. | [] |
|
GHSA-c7h9-7hmq-v389 | Microsoft Dynamics GP Elevation Of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23272, CVE-2022-23273. | [] |
|
CVE-2023-0810 | Cross-site Scripting (XSS) - Stored in btcpayserver/btcpayserver | Cross-site Scripting (XSS) - Stored in GitHub repository btcpayserver/btcpayserver prior to 1.7.11. | [
"cpe:2.3:a:btcpayserver:btcpayserver:*:*:*:*:*:*:*:*"
] |
CVE-2023-41963 | Denial-of-service (DoS) vulnerability exists in FTP service of HMI GC-A2 series. If a remote unauthenticated attacker sends a specially crafted packets to specific ports, a denial-of-service (DoS) condition may occur. | [
"cpe:2.3:o:jtekt:gc-a22w-cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:jtekt:gc-a22w-cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:jtekt:gc-a24w-c\\(w\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:jtekt:gc-a24w-c\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:jtekt:gc-a26w-c\\(w\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:jtekt:gc-a26w-c\\(w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:jtekt:gc-a24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:jtekt:gc-a24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:jtekt:gc-a24-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:jtekt:gc-a24-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:jtekt:gc-a25_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:jtekt:gc-a25:-:*:*:*:*:*:*:*",
"cpe:2.3:o:jtekt:gc-a26_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:jtekt:gc-a26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:jtekt:gc-a26-j2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:jtekt:gc-a26-j2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:jtekt:gc-a27-c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:jtekt:gc-a27-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:jtekt:gc-a28-c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:jtekt:gc-a28-c:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-41481 | Tenda AC1200 US_AC6V2.0RTL_V15.03.06.51_multi_TDE01 was discovered to contain a buffer overflow in the 0x47de1c function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. | [
"cpe:2.3:o:tenda:ac6v2.0_firmware:15.03.06.51:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac6:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-5vhp-6mvg-gg49 | The Charity Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.3.2 via the 'nacharity_elementor_template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to. | [] |
|
CVE-2018-11226 | The getString function in decompile.c in libming through 0.4.8 mishandles cases where the header indicates a file size greater than the actual size, which allows remote attackers to cause a denial of service (Segmentation fault and application crash) or possibly have unspecified other impact. | [
"cpe:2.3:a:libming:libming:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-11476 | Concrete5 before 8.5.3 allows Unrestricted Upload of File with Dangerous Type such as a .phar file. | [
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-4826 | PHP remote file inclusion vulnerability in bottom.php in Shadowed Portal 5.599 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the root parameter. | [
"cpe:2.3:a:shadowed_portal:shadowed_portal:*:*:*:*:*:*:*:*"
] |
|
GHSA-j88m-953w-8r2c | rendertron XSS vulnerability | Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs. | [] |
CVE-2023-6511 | Inappropriate implementation in Autofill in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to bypass Autofill restrictions via a crafted HTML page. (Chromium security severity: Low) | [
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-h3gg-7wx2-cq3h | XSS in Flarum Sticky extension | ImpactA change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit.Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an HTML injection where `<script>` tags would not be executed. However it was possible to run javascript from other HTML attributes, enabling a cross-site scripting (XSS) attack to be performed.Since the exploit only happens with the first post of a pinned discussion, an attacker would need the ability to pin their own discussion, or be able to edit a discussion that was previously pinned.On forums where all pinned posts are authored by your staff, you can be relatively certain the vulnerability has not been exploited.Forums where some user-created discussions were pinned can look at the first post edit date to find whether the vulnerability might have been exploited. Because Flarum doesn't store the post content history, you cannot be certain if a malicious edit was reverted.PatchesThe fix will be available in version v0.1.0-beta.16 with Flarum beta 16. The fix has already been back-ported to Flarum beta 15 as version v0.1.0-beta.15.1 of the Sticky extension.WorkaroundsForum administrators can disable the Sticky extension until they are able to apply the update. The vulnerability cannot be exploited while the extension is disabled.References[Release announcement](https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)[Pull Request](https://github.com/flarum/sticky/pull/24)For more informationIf you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support).If you discover a security vulnerability within Flarum, please send an e-mail to [[email protected]](mailto:[email protected]). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy). | [] |
GHSA-76w3-qpqm-hj57 | Dynamics 365 Sales Spoofing Vulnerability | [] |
|
CVE-2024-51541 | Local File Inclusion | Local File Inclusion vulnerabilities allow access to sensitive system information.
Affected products:
ABB ASPECT - Enterprise v3.08.02;
NEXUS Series v3.08.02;
MATRIX Series v3.08.02 | [
"cpe:2.3:a:abb:aspect_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:nexus_series:*:*:*:*:*:*:*:*",
"cpe:2.3:a:abb:matrix_series:*:*:*:*:*:*:*:*"
] |
CVE-2023-23651 | WordPress MainWP Google Analytics Extension Plugin <= 4.0.4 - SQL Injection vulnerability | Auth. (subscriber+) SQL Injection (SQLi) vulnerability in MainWP Google Analytics Extension plugin <= 4.0.4 versions. | [
"cpe:2.3:a:mainwp:mainwp_google_analytics_extension:*:*:*:*:*:wordpress:*:*"
] |
GHSA-wjpv-frf2-3r58 | EC-CUBE Directory traversal vulnerability | Directory traversal vulnerability in EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p4 ) and EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.1.2) allows a remote authenticated attacker with an administrative privilege to obtain the product's directory structure information. | [] |
GHSA-4g82-fhh4-4p9r | Cross-Site Request Forgery (CSRF) vulnerability in Plugincraft Mediamatic – Media Library Folders plugin <= 2.8.1 versions. | [] |
|
CVE-2022-41676 | TEAM JOHNLONG SOFTWARE CO., LTD. MAILD Mail Server - Cross-Site Scripting | Raiden MAILD Mail Server website mail field has insufficient filtering for user input. A remote attacker with general user privilege can send email using the website with malicious JavaScript in the input field, which triggers XSS (Reflected Cross-Site Scripting) attack to the mail recipient. | [
"cpe:2.3:a:raidenmaild:raidenmaild:*:*:*:*:*:*:*:*"
] |
GHSA-j3g6-hfmg-hf5x | Vulnerability in the Oracle Knowledge Management component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Knowledge Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Knowledge Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Knowledge Management accessible data as well as unauthorized update, insert or delete access to some of Oracle Knowledge Management accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [] |
|
CVE-2014-4557 | Cross-site scripting (XSS) vulnerability in test-plugin.php in the Swipe Checkout for Jigoshop (swipe-hq-checkout-for-jigoshop) plugin 3.1.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter. | [
"cpe:2.3:a:jigoshop:swipe_hq_checkout_for_jigoshop:*:-:-:*:-:wordpress:*:*"
] |
|
CVE-2021-2097 | Vulnerability in the Oracle iSupport product of Oracle E-Business Suite (component: Profile). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iSupport. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iSupport, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iSupport accessible data as well as unauthorized update, insert or delete access to some of Oracle iSupport accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:isupport:*:*:*:*:*:*:*:*"
] |
|
GHSA-3xq6-ch8v-2ghj | Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Insufficient Signature Validation OVE-20230524-0014. | [] |
|
CVE-2021-47079 | platform/x86: ideapad-laptop: fix a NULL pointer dereference | In the Linux kernel, the following vulnerability has been resolved:
platform/x86: ideapad-laptop: fix a NULL pointer dereference
The third parameter of dytc_cql_command should not be NULL since it will
be dereferenced immediately. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*"
] |
GHSA-23g2-95w8-rx32 | An issue was discovered on Geeni GNC-CW013 doorbell 1.8.1 devices. A vulnerability exists in the RTSP service that allows a remote attacker to take full control of the device with a high-privileged account. By sending a crafted message, an attacker is able to remotely deliver a telnet session. Any attacker that has the ability to control DNS can exploit this vulnerability to remotely login to the device and gain access to the camera system. | [] |
|
GHSA-w9gf-w4gv-5j2q | Multiple format string vulnerabilities in Lintian 1.23.x through 1.23.28, 1.24.x through 1.24.2.1, and 2.x before 2.3.2 allow remote attackers to have an unspecified impact via vectors involving (1) check scripts and (2) the Lintian::Schedule module. | [] |
|
GHSA-5j8p-9vxc-hp7x | A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to obtain sensitive network information. | [] |
|
CVE-2023-22957 | An issue was discovered in libac_des3.so on AudioCodes VoIP desk phones through 3.4.4.1000. Due to the use of hard-coded cryptographic key, an attacker with access to backup or configuration files is able to decrypt encrypted values and retrieve sensitive information, e.g., the device root password. | [
"cpe:2.3:h:audiocodes_ltd:voip_phones:*:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:c470hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:c470hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:c455hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:c455hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:c435hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:c435hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:445hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:445hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:405hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:405hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:audiocodes:c450hd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:audiocodes:c450hd:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-20068 | Hindu Matrimonial Script usermanagement.php privileges management | A vulnerability was found in Hindu Matrimonial Script. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/usermanagement.php. The manipulation leads to improper privilege management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:hindu_matrimonial_script_project:hindu_matrimonial_script:-:*:*:*:*:*:*:*"
] |
CVE-2025-21658 | btrfs: avoid NULL pointer dereference if no valid extent tree | In the Linux kernel, the following vulnerability has been resolved:
btrfs: avoid NULL pointer dereference if no valid extent tree
[BUG]
Syzbot reported a crash with the following call trace:
BTRFS info (device loop0): scrub: started on devid 1
BUG: kernel NULL pointer dereference, address: 0000000000000208
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 106e70067 P4D 106e70067 PUD 107143067 PMD 0
Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 1 UID: 0 PID: 689 Comm: repro Kdump: loaded Tainted: G O 6.13.0-rc4-custom+ #206
Tainted: [O]=OOT_MODULE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 02/02/2022
RIP: 0010:find_first_extent_item+0x26/0x1f0 [btrfs]
Call Trace:
<TASK>
scrub_find_fill_first_stripe+0x13d/0x3b0 [btrfs]
scrub_simple_mirror+0x175/0x260 [btrfs]
scrub_stripe+0x5d4/0x6c0 [btrfs]
scrub_chunk+0xbb/0x170 [btrfs]
scrub_enumerate_chunks+0x2f4/0x5f0 [btrfs]
btrfs_scrub_dev+0x240/0x600 [btrfs]
btrfs_ioctl+0x1dc8/0x2fa0 [btrfs]
? do_sys_openat2+0xa5/0xf0
__x64_sys_ioctl+0x97/0xc0
do_syscall_64+0x4f/0x120
entry_SYSCALL_64_after_hwframe+0x76/0x7e
</TASK>
[CAUSE]
The reproducer is using a corrupted image where extent tree root is
corrupted, thus forcing to use "rescue=all,ro" mount option to mount the
image.
Then it triggered a scrub, but since scrub relies on extent tree to find
where the data/metadata extents are, scrub_find_fill_first_stripe()
relies on an non-empty extent root.
But unfortunately scrub_find_fill_first_stripe() doesn't really expect
an NULL pointer for extent root, it use extent_root to grab fs_info and
triggered a NULL pointer dereference.
[FIX]
Add an extra check for a valid extent root at the beginning of
scrub_find_fill_first_stripe().
The new error path is introduced by 42437a6386ff ("btrfs: introduce
mount option rescue=ignorebadroots"), but that's pretty old, and later
commit b979547513ff ("btrfs: scrub: introduce helper to find and fill
sector info for a scrub_stripe") changed how we do scrub.
So for kernels older than 6.6, the fix will need manual backport. | [] |
GHSA-vwhf-4g4f-7f93 | A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15. An application may be able to execute arbitrary code with system privileges. | [] |
|
CVE-2022-49493 | ASoC: rt5645: Fix errorenous cleanup order | In the Linux kernel, the following vulnerability has been resolved:
ASoC: rt5645: Fix errorenous cleanup order
There is a logic error when removing rt5645 device as the function
rt5645_i2c_remove() first cancel the &rt5645->jack_detect_work and
delete the &rt5645->btn_check_timer latter. However, since the timer
handler rt5645_btn_check_callback() will re-queue the jack_detect_work,
this cleanup order is buggy.
That is, once the del_timer_sync in rt5645_i2c_remove is concurrently
run with the rt5645_btn_check_callback, the canceled jack_detect_work
will be rescheduled again, leading to possible use-after-free.
This patch fix the issue by placing the del_timer_sync function before
the cancel_delayed_work_sync. | [] |
GHSA-vccr-c5vf-xh9r | Information disclosure in Modem due to buffer over-read while getting length of Unfragmented headers in an IPv6 packet. | [] |
|
GHSA-5mxc-78h5-qrc7 | Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install, a different vulnerability than CVE-2013-5906. | [] |
|
CVE-2023-23088 | Buffer OverFlow Vulnerability in Barenboim json-parser master and v1.1.0 fixed in v1.1.1 allows an attacker to execute arbitrary code via the json_value_parse function. | [
"cpe:2.3:a:json-parser_project:json-parser:1.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-4jxg-7cv4-3gcc | When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12. | [] |
|
CVE-2024-47444 | After Effects | Out-of-bounds Read (CWE-125) | After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-cjm3-84jp-72rj | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /extensionsinstruction?id= (reflected). | [] |
|
GHSA-9q23-65gx-4jw8 | The Mobile Network Connections functionality in the Connection Manager in IBM Lotus Mobile Connect before 6.1.4, when HTTP Access Services (HTTP-AS) is enabled, does not properly handle failed attempts at establishing HTTP-TCP sessions, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) by making many TCP connection attempts. | [] |
|
GHSA-phx8-gf7f-9rqw | SQL injection vulnerability in modtask.php in NexusPHP 1.5 allows remote attackers to execute arbitrary SQL commands via the userid parameter. | [] |
|
GHSA-2m7x-c7px-hp58 | Server Side Template Injection (SSTI) via Twig escape handler | SummaryDue to the unrestricted access to twig extension class from grav context, an attacker can redefine the escape function and execute arbitrary commands.Detailshttps://github.com/twigphp/Twig/blob/3.x/src/Extension/EscaperExtension.php#L99Twig supports the functionality to redefine the escape function through the setEscaper method.
However, that method is not originally exposed to the twig environment, but it is accessible through the payload below.At this point, it accepts callable type as an argument, but as there is no validation for the $callable variable, attackers can set dangerous functions like system as the escaper function.PoCImpactTwig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages.
As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. | [] |
CVE-2020-28723 | Memory leak in IPv6Param::setAddress in CloudAvid PParam 1.3.1. | [
"cpe:2.3:a:cloudavid:pparam:1.3.1:*:*:*:*:*:*:*"
] |
|
CVE-2013-3647 | The WebView class in the Cybozu Live application before 2.0.1 for Android allows attackers to execute arbitrary JavaScript code, and obtain sensitive information, via a crafted application that places this code into a local file associated with a file: URL. NOTE: this vulnerability exists because of a CVE-2012-4009 regression. | [
"cpe:2.3:a:cybozu:cybozu_live:*:-:*:*:*:android:*:*",
"cpe:2.3:a:cybozu:cybozu_live:1.0.4:-:*:*:*:android:*:*"
] |
|
GHSA-p284-fm6w-9rwh | A potential security vulnerability has been identified in HPE iLO Amplifier Pack. The vulnerability could be remotely exploited to allow Cross-Site Scripting (XSS). HPE has provided the following software update to resolve the vulnerability in HPE iLO Amplifier Pack: HPE iLO Amplifier Pack 1.80 or later. | [] |
|
CVE-2010-3703 | The PostScriptFunction::PostScriptFunction function in poppler/Function.cc in the PDF parser in poppler 0.8.7 and possibly other versions up to 0.15.1, and possibly other products, allows context-dependent attackers to cause a denial of service (crash) via a PDF file that triggers an uninitialized pointer dereference. | [
"cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.15.1:*:*:*:*:*:*:*"
] |
|
GHSA-fffr-w5cq-wghr | Heap buffer overflow in SwiftShader in Google Chrome prior to 84.0.4147.135 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] |
|
GHSA-mfwc-4hx2-p48h | Hitachi HiRDB Datareplicator 7HiRDB, 7(64), 6, 6(64), 5.0, and 5.0(64); and various products that bundle HiRDB Datareplicator; allows attackers to cause a denial of service (CPU consumption) via certain data. | [] |
|
CVE-2011-0213 | Buffer overflow in QuickTime in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG file. | [
"cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*"
] |
|
GHSA-4jmf-2ggr-ph9x | Uncontrolled search path in some Libva software maintained by Intel(R) before version 2.20.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
GHSA-4m3c-vp5f-8qxg | A vulnerability was found in cjbi wetech-cms 1.0/1.1/1.2. It has been classified as critical. Affected is the function searchTopic of the file wetech-cms-master\wetech-core\src\main\java\tech\wetech\cms\dao\TopicDao.java. The manipulation of the argument con leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-ccp8-f5cx-4p8g | Pine 4.x allows a remote attacker to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine. | [] |
|
GHSA-564g-g3h9-2h5g | The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3303. | [] |
|
GHSA-qrwv-mr9p-g9x6 | Cross-Site Request Forgery (CSRF) vulnerability in WP Swings Wallet System for WooCommerce.This issue affects Wallet System for WooCommerce: from n/a through 2.5.9. | [] |
|
GHSA-pcxx-jf3j-vjpv | Sourcecodester Toll Tax Management System v1 is vulnerable to SQL Injection. | [] |
|
CVE-2024-43828 | ext4: fix infinite loop when replaying fast_commit | In the Linux kernel, the following vulnerability has been resolved:
ext4: fix infinite loop when replaying fast_commit
When doing fast_commit replay an infinite loop may occur due to an
uninitialized extent_status struct. ext4_ext_determine_insert_hole() does
not detect the replay and calls ext4_es_find_extent_range(), which will
return immediately without initializing the 'es' variable.
Because 'es' contains garbage, an integer overflow may happen causing an
infinite loop in this function, easily reproducible using fstest generic/039.
This commit fixes this issue by unconditionally initializing the structure
in function ext4_es_find_extent_range().
Thanks to Zhang Yi, for figuring out the real problem! | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-mg4p-5r5g-f6x9 | A vulnerability in the SonicWall SMA1000 HTTP Extraweb server allows an unauthenticated remote attacker to cause HTTP server crash which leads to Denial of Service. This vulnerability affected SMA1000 Version 12.1.0-06411 and earlier. | [] |
|
GHSA-w732-gjhm-9ghp | Buffer overflow in qwik-smtpd allows remote attackers to use the server as an SMTP spam relay via a long HELO command, which overwrites the adjacent localIP data buffer. | [] |
|
CVE-2005-0642 | SQL injection vulnerability in the Query Designer for Computer Associates (CA) Unicenter Asset Management (UAM) 4.0 allows remote attackers to execute arbitrary SQL via an imported file. | [
"cpe:2.3:a:broadcom:unicenter_asset_management:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2012-1262 | Cross-site scripting (XSS) vulnerability in cgi-bin/mt/mt-wizard.cgi in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13, when the product is incompletely installed, allows remote attackers to inject arbitrary web script or HTML via the dbuser parameter, a different vulnerability than CVE-2012-0318. | [
"cpe:2.3:a:movabletype:movable_type_open_source:*:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.01:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.261:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.361:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.031:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.051:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.01:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.261:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.361:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.031:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.051:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:*:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.01:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.261:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.361:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.031:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.051:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.01:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.261:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.361:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.031:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.051:*:*:*:*:*:*:*"
] |
|
CVE-2019-8693 | A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Mojave 10.14.6. An application may be able to read restricted memory. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-7064 | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-m2f8-v8q4-3m59 | Authenticated Local Privilege Escalation vulnerability in Intel Optimization for Tensorflow | Improper buffer restrictions in the Intel(R) Optimization for Tensorflow software before version 2.12 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
CVE-2023-47507 | WordPress Master Slider Pro Plugin <= 3.6.5 is vulnerable to PHP Object Injection | Deserialization of Untrusted Data vulnerability in Master Slider Master Slider Pro.This issue affects Master Slider Pro: from n/a through 3.6.5.
| [
"cpe:2.3:a:averta:master_slider_pro:*:*:*:*:*:wordpress:*:*"
] |
CVE-2023-23537 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, watchOS 9.4, macOS Big Sur 11.7.5. An app may be able to read sensitive location information. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-4913 | Inappropriate implementation in Extensions in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who had compromised the renderer process to spoof extension storage via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-jg3j-8qg2-gph3 | In the Linux kernel, the following vulnerability has been resolved:tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()syzbot reported the following general protection fault [1]:general protection fault, probably for non-canonical address 0xdffffc0000000010: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000080-0x0000000000000087]
...
RIP: 0010:tipc_udp_is_known_peer+0x9c/0x250 net/tipc/udp_media.c:291
...
Call Trace:
<TASK>
tipc_udp_nl_bearer_add+0x212/0x2f0 net/tipc/udp_media.c:646
tipc_nl_bearer_add+0x21e/0x360 net/tipc/bearer.c:1089
genl_family_rcv_msg_doit+0x1fc/0x2e0 net/netlink/genetlink.c:972
genl_family_rcv_msg net/netlink/genetlink.c:1052 [inline]
genl_rcv_msg+0x561/0x800 net/netlink/genetlink.c:1067
netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2544
genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076
netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
netlink_unicast+0x53b/0x810 net/netlink/af_netlink.c:1367
netlink_sendmsg+0x8b7/0xd70 net/netlink/af_netlink.c:1909
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0xd5/0x180 net/socket.c:745
____sys_sendmsg+0x6ac/0x940 net/socket.c:2584
___sys_sendmsg+0x135/0x1d0 net/socket.c:2638
__sys_sendmsg+0x117/0x1e0 net/socket.c:2667
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6bThe cause of this issue is that when tipc_nl_bearer_add() is called with
the TIPC_NLA_BEARER_UDP_OPTS attribute, tipc_udp_nl_bearer_add() is called
even if the bearer is not UDP.tipc_udp_is_known_peer() called by tipc_udp_nl_bearer_add() assumes that
the media_ptr field of the tipc_bearer has an udp_bearer type object, so
the function goes crazy for non-UDP bearers.This patch fixes the issue by checking the bearer type before calling
tipc_udp_nl_bearer_add() in tipc_nl_bearer_add(). | [] |
|
CVE-2024-13605 | Form Maker by 10Web < 1.15.33 - Admin+ Stored XSS | The Form Maker by 10Web WordPress plugin before 1.15.33 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] |
GHSA-557r-q6mf-6mfm | Google Chrome before 17.0.963.56 allows remote attackers to cause a denial of service (application crash) via an empty X.509 certificate. | [] |
|
GHSA-838g-cpgm-j985 | MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass versions 1.35.0 to 1.40.5. | [] |
|
CVE-2022-25630 | An authenticated user can embed malicious content with XSS into the admin group policy page. | [
"cpe:2.3:a:symantec:messaging_gateway:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.