Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-hvrx-8j5q-54c6
An exploitable out-of-bounds write vulnerability exists in the ico_read function of the igcore19d.dll library of Accusoft ImageGear 19.6.0. A specially crafted ICO file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.
[]
GHSA-9wrr-4r9v-26xc
CSRF vulnerability in Jenkins Keycloak Authentication Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Keycloak Authentication Plugin 2.3.0 and earlier allows attackers to trick users into logging in to the attacker's account.
[]
GHSA-35g7-p3m9-m7r9
A vulnerability classified as problematic was found in ummmmm nflpick-em.com up to 2.2.x. This vulnerability affects the function _Load_Users of the file html/includes/runtime/admin/JSON/LoadUsers.php. The manipulation of the argument sort leads to sql injection. The attack can be initiated remotely. The name of the patch is dd77a35942f527ea0beef5e0ec62b92e8b93211e. It is recommended to apply a patch to fix this issue. VDB-217270 is the identifier assigned to this vulnerability. NOTE: JSON entrypoint is only accessible via an admin account
[]
CVE-2017-9579
The "JMCU Mobile Banking" by Joplin Metro Credit Union app 3.0.0 -- aka jmcu-mobile-banking/id716065893 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:meafinancial:jmcu_mobile_banking:3.0.0:*:*:*:*:iphone_os:*:*" ]
CVE-2002-0968
Buffer overflow in AnalogX SimpleServer:WWW 1.16 and earlier allows remote attackers to cause a denial of service (crash) and execute code via a long HTTP request method name.
[ "cpe:2.3:a:analogx:simpleserver_www:*:*:*:*:*:*:*:*" ]
CVE-2015-2102
SQL injection vulnerability in view_item.php in ClipBucket 2.7 RC3 (2.7.0.4.v2929-rc3) allows remote attackers to execute arbitrary SQL commands via the item parameter.
[ "cpe:2.3:a:clip-bucket:clipbucket:2.7:rc3:*:*:*:*:*:*" ]
GHSA-pmjr-jg67-xfgh
Unspecified vulnerability in HP Insight Software Installer for Windows before 6.1 allows local users to read or modify data via unknown vectors.
[]
GHSA-cr82-m62c-8j4w
Improper preservation of permissions in Nagios XI 5.7.4 allows a local, low-privileged, authenticated user to weaken the permissions of files, resulting in low-privileged users being able to write to and execute arbitrary PHP code with root privileges.
[]
CVE-2023-0585
The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Administrator role or above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:aioseo:all_in_one_seo:*:*:*:*:*:wordpress:*:*" ]
GHSA-q83c-j3cq-cq3w
A vulnerability was found in ESAFENET CDG V5 and classified as problematic. Affected by this issue is some unknown functionality of the file /todoDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-8mjx-vmhp-8fv4
The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0006.
[]
GHSA-c4f9-8f2h-w5rv
Insufficient policy enforcement in appcache in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
[]
GHSA-8fxv-7v35-mx46
SQL injection vulnerability in ogp_show.php in Online Guestbook Pro allows remote attackers to execute arbitrary SQL commands via the display parameter.
[]
CVE-2018-18366
Symantec Norton Security prior to 22.16.3, SEP (Windows client) prior to and including 12.1 RU6 MP9, and prior to 14.2 RU1, SEP SBE prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22, SEP-12.1.7484.7002 and SEP Cloud prior to 22.16.3 may be susceptible to a kernel memory disclosure, which is a type of issue where a specially crafted IRP request can cause the driver to return uninitialized memory.
[ "cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:mr1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:mr2:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:mr3:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:mr4:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:mr4-mp2:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp2:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp3:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp2:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp4:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp4a:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:11.0:ry7-mp3:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:*:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru1-mp1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru2:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru2-mp1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru3:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru4:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1a:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1b:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru4a:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru5:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp10:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp2:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp3:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp4:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp5:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp6:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp7:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp8:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:14:*:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:14:mp1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:14.0.0:mp2:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:14.0.1:*:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:14.0.1:mp1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:14.0.1:mp2:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:14.2:*:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:14.2:mp1:*:*:*:windows:*:*", "cpe:2.3:a:symantec:endpoint_protection:nis-22.15.2.22:*:*:*:small_business:*:*:*", "cpe:2.3:a:symantec:endpoint_protection:sep-12.1.7484.7002:*:*:*:small_business:*:*:*", "cpe:2.3:a:symantec:endpoint_protection_cloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_protection_cloud_agent:*:*:*:*:small_business:*:*:*", "cpe:2.3:a:symantec:norton_security:*:*:*:*:*:windows:*:*" ]
CVE-2018-0044
NFX Series: Insecure sshd configuration in Juniper Device Manager (JDM) and host OS
An insecure SSHD configuration in Juniper Device Manager (JDM) and host OS on Juniper NFX Series devices may allow remote unauthenticated access if any of the passwords on the system are empty. The affected SSHD configuration has the PermitEmptyPasswords option set to "yes". Affected releases are Juniper Networks Junos OS: 18.1 versions prior to 18.1R4 on NFX Series.
[ "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:nfx150:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:nfx250:-:*:*:*:*:*:*:*" ]
CVE-2022-40642
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_B files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17318.
[ "cpe:2.3:a:ansys:spaceclaim:2022:r1:*:*:*:*:*:*" ]
GHSA-vcgg-hh8m-6p7m
The Corner Ad plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.56. This is due to missing or incorrect nonce validation on its corner_ad_settings_page function. This makes it possible for unauthenticated attackers to trigger the deletion of ads via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
GHSA-9j6f-fvm4-55cm
A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This appears not to be a path traversal weakness. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2009-2498
Microsoft Windows Media Format Runtime 9.0, 9.5, and 11 and Windows Media Services 9.1 and 2008 do not properly parse malformed headers in Advanced Systems Format (ASF) files, which allows remote attackers to execute arbitrary code via a crafted (1) .asf, (2) .wmv, or (3) .wma file, aka "Windows Media Header Parsing Invalid Free Vulnerability."
[ "cpe:2.3:a:microsoft:windows_media_format_runtime:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:windows_media_format_runtime:9.5:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*", "cpe:2.3:a:microsoft:windows_media_format_runtime:9.5:*:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:windows_media_format_runtime:11:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:-:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:-:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:windows_media_services:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:windows_media_services:2008:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:media_foundation_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:-:x64:*:*:*:*:*" ]
GHSA-hpx4-vfrw-237w
Multiple buffer overflows in splitvt before 1.6.5 allow local users to execute arbitrary commands.
[]
CVE-2021-22010
The vCenter Server contains a denial-of-service vulnerability in VPXD service. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to create a denial of service condition due to excessive memory consumption by VPXD service.
[ "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*" ]
GHSA-jmvm-hj36-w5hc
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
[]
GHSA-8cp8-922f-xc53
Missing Authorization vulnerability in QunatumCloud Floating Buttons for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Floating Buttons for WooCommerce: from n/a through 2.8.8.
[]
GHSA-x9j8-mm37-qr4f
WebTide 7.04 allows remote attackers to list arbitrary directories via an HTTP request for %3f.jsp (encoded "?").
[]
GHSA-7c72-6v53-xq93
OpenHarmony-v3.1.2 and prior versions had an Arbitrary file read vulnerability via download_server. Local attackers can install an malicious application on the device and reveal any file from the filesystem that is accessible to download_server service which run with UID 1000.
[]
GHSA-g6f8-4cjh-wx59
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to transformation of blocks of pixels. Successful exploitation could lead to arbitrary code execution.
[]
GHSA-w695-r3qx-vgwq
In multiple locations, there is a possible way to access screenshots due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
GHSA-52x4-pcpg-9vp8
The d8s-ip-addresses package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-csv package. The affected version is 0.1.0.
[]
CVE-2015-2087
Unrestricted file upload vulnerability in the Avatar Uploader module before 6.x-1.3 for Drupal allows remote authenticated users to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via unspecified vectors.
[ "cpe:2.3:a:avatar_uploader_project:avatar_uploader:*:*:*:*:*:drupal:*:*" ]
GHSA-w98h-wrpq-r4p5
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Blocksera Image Hover Effects – Elementor Addon allows Stored XSS.This issue affects Image Hover Effects – Elementor Addon: from n/a through 1.4.
[]
GHSA-h9rm-8fhf-mvcc
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pluggabl LLC Booster for WooCommerce.This issue affects Booster for WooCommerce: from n/a through 7.1.1.
[]
CVE-2009-3676
The SMB client in the kernel in Microsoft Windows Server 2008 R2 and Windows 7 allows remote SMB servers and man-in-the-middle attackers to cause a denial of service (infinite loop and system hang) via a (1) SMBv1 or (2) SMBv2 response packet that contains (a) an incorrect length value in a NetBIOS header or (b) an additional length field at the end of this response packet, aka "SMB Client Incomplete Response Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*" ]
CVE-2022-32802
A logic issue was addressed with improved checks. This issue is fixed in iOS 15.6 and iPadOS 15.6, tvOS 15.6, macOS Monterey 12.5. Processing a maliciously crafted file may lead to arbitrary code execution.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
CVE-2017-1000429
rui Li finecms 5.0.10 is vulnerable to a reflected XSS in the file Weixin.php.
[ "cpe:2.3:a:finecms_project:finecms:5.0.10:*:*:*:*:*:*:*" ]
GHSA-9fxm-qh6m-23f8
In the Linux kernel, the following vulnerability has been resolved:media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZEI expect that the hardware will have limited this to 16, but just in case it hasn't, check for this corner case.
[]
CVE-2019-8600
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. A maliciously crafted SQL query may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
CVE-2019-12400
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.
[ "cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*" ]
GHSA-h2mv-7266-r4gv
readObject in (1) Java Runtime Environment (JRE) and (2) Software Development Kit (SDK) 1.4.0 through 1.4.2_05 allows remote attackers to cause a denial of service (JVM unresponsive) via crafted serialized data.
[]
CVE-2022-2318
There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*" ]
GHSA-6h5m-c899-vgw5
obs-server before 1.7.7 allows logins by 'unconfirmed' accounts due to a bug in the REST api implementation.
[]
CVE-2019-9105
The WebApp v04.68 in the supervisor on SAET Impianti Speciali TEBE Small 05.01 build 1137 devices allows remote attackers to make several types of API calls without authentication, as demonstrated by retrieving password hashes via an inc/utils/REST_API.php?command=CallAPI&customurl=alladminusers call.
[ "cpe:2.3:o:saet:tebe_small_firmware:05.01:1137:*:*:*:*:*:*", "cpe:2.3:h:saet:tebe_small:-:*:*:*:*:*:*:*", "cpe:2.3:a:saet:webapp:04.68:*:*:*:*:*:*:*" ]
CVE-2020-0666
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0667, CVE-2020-0735, CVE-2020-0752.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2023-37229
Loftware Spectrum before 5.1 allows SSRF.
[ "cpe:2.3:a:loftware:spectrum:*:*:*:*:*:*:*:*" ]
CVE-2024-56134
Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.
Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection. This issue affects:  Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.1 (inclusive)    From 7.2.49.0 to 7.2.54.12 (inclusive)    7.2.48.12 and all prior versions Multi-Tenant Hypervisor 7.1.35.12 and all prior versions ECS All prior versions to 7.2.60.1 (inclusive)
[]
GHSA-c3c7-jrp2-v7vx
An issue was discovered in Mattermost Server before 4.7.0, 4.6.2, and 4.5.2. An attacker could authenticate to a different user's account via a crafted SAML response.
[]
CVE-2020-9411
TIBCO Managed File Transfer Platform Server for IBM i Authentication Bypass
The file transfer component of TIBCO Software Inc.'s TIBCO Managed File Transfer Platform Server for IBM i contains a vulnerability that theoretically allows an attacker to perform unauthorized network file transfers to and from the file system accessible to the affected component. This vulnerability is exploitable when the configuration option 'Require Node Resp' is set to 'No'. In the event of a successful exploit, the attacker could theoretically read and write any file on the file system accessible to the affected component, thus fully affecting the confidentiality, integrity, and availability of the operating system hosting the deployment of the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Managed File Transfer Platform Server for IBM i: versions 7.1.0 and below, version 8.0.0.
[ "cpe:2.3:a:tibco:managed_file_transfer_platform_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:managed_file_transfer_platform_server:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*" ]
CVE-2024-4494
Tenda i21 setUplinkInfo formSetUplinkInfo stack-based overflow
A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classified as critical. Affected by this vulnerability is the function formSetUplinkInfo of the file /goform/setUplinkInfo. The manipulation of the argument pingHostIp2 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263083. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-jwj4-pw27-gfq5
The All-Images.ai – IA Image Bank and Custom Image creation plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the '_get_image_by_url' function in all versions up to, and including, 1.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
[]
CVE-2025-22822
WordPress wp custom countdown Plugin <= 2.8 - Stored Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bishawjit Das wp custom countdown allows Stored XSS.This issue affects wp custom countdown: from n/a through 2.8.
[]
GHSA-2w49-cc6p-pggp
Insufficient policy enforcement in installer in Google Chrome on OS X prior to 85.0.4183.102 allowed a local attacker to potentially achieve privilege escalation via a crafted binary.
[]
GHSA-w3pf-28jm-x86v
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in telemetry processing of Juniper Networks Junos OS allows a network-based authenticated attacker to flood the system with multiple telemetry requests, causing the Junos Kernel Debugging Streaming Daemon (jkdsd) process to crash, leading to a Denial of Service (DoS). Continued receipt and processing of telemetry requests will repeatedly crash the jkdsd process and sustain the Denial of Service (DoS) condition.This issue is seen on all Junos platforms. The crash is triggered when multiple telemetry requests come from different collectors. As the load increases, the Dynamic Rendering Daemon (drend) decides to defer processing and continue later, which results in a timing issue accessing stale memory, causing the jkdsd process to crash and restart.This issue affects:Juniper Networks Junos OS:20.4 versions prior to 20.4R3-S9;21.1 versions 21.1R1 and later;21.2 versions prior to 21.2R3-S6;21.3 versions prior to 21.3R3-S5;21.4 versions prior to 21.4R3-S5;22.1 versions prior to 22.1R3-S4;22.2 versions prior to 22.2R3-S2;22.3 versions prior to 22.3R2-S1, 22.3R3-S1;22.4 versions prior to 22.4R2-S2, 22.4R3;23.1 versions prior to 23.1R2;23.2 versions prior to 23.2R2.This issue does not affect Juniper Networks Junos OS versions prior to 19.4R1.
[]
GHSA-2c7f-7v62-c4p8
An improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control via modifying the session-id paramater.
[]
CVE-2004-1981
The web interface for Crystal Reports allows remote attackers to cause a denial of service (disk exhaustion) by repeatedly requesting reports without retrieving the associated image files, which are not cleared from the image file folder.
[ "cpe:2.3:a:businessobjects:crystal_enterprise:9:*:*:*:*:*:*:*", "cpe:2.3:a:businessobjects:crystal_enterprise:10:*:*:*:*:*:*:*", "cpe:2.3:a:businessobjects:crystal_reports:9:*:*:*:*:*:*:*", "cpe:2.3:a:businessobjects:crystal_reports:10:*:*:*:*:*:*:*" ]
GHSA-vg3v-8w3m-rfrq
IrfanView DXF File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24752.
[]
CVE-1999-1387
Windows NT 4.0 SP2 allows remote attackers to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25.
[ "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*" ]
CVE-2023-42088
PDF-XChange Editor JPG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
PDF-XChange Editor JPG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22088.
[ "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.0.1.371:*:*:*:*:*:*:*", "cpe:2.3:a:pdf-xchange:pdf-tools:10.0.1.371:*:*:*:*:*:*:*", "cpe:2.3:a:pdf-xchange:pdf-xchange_pro:10.0.1.371:*:*:*:*:*:*:*" ]
CVE-2025-21898
ftrace: Avoid potential division by zero in function_stat_show()
In the Linux kernel, the following vulnerability has been resolved: ftrace: Avoid potential division by zero in function_stat_show() Check whether denominator expression x * (x - 1) * 1000 mod {2^32, 2^64} produce zero and skip stddev computation in that case. For now don't care about rec->counter * rec->counter overflow because rec->time * rec->time overflow will likely happen earlier.
[]
GHSA-62wr-r4xg-7jx3
Cross-site scripting in filebrowser in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via uploaded file names.
[]
GHSA-q33h-xmcx-jm3h
Roundcube 0.3.1 and earlier does not request that the web browser avoid DNS prefetching of domain names contained in e-mail messages, which makes it easier for remote attackers to determine the network location of the webmail user by logging DNS requests.
[]
CVE-2022-39839
Cotonti Siena 0.9.20 allows admins to conduct stored XSS attacks via a forum post.
[ "cpe:2.3:a:cotonti:cotonti_siena:0.9.20:*:*:*:*:*:*:*" ]
CVE-2023-22042
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are 12.2.3-12.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:applications_framework:*:*:*:*:*:*:*:*" ]
GHSA-c74v-jcgj-9cvf
Command injection vulnerability in ftpd in Synology Diskstation Manager (DSM) before 6.2-23739-1 allows remote authenticated users to execute arbitrary OS commands via the (1) MKD or (2) RMD command.
[]
GHSA-r665-jpxw-qm8g
Cross-site scripting (XSS) vulnerability in index.php in AJ Auction Pro OOPD 3.0 allows remote attackers to inject arbitrary web script or HTML via the txtkeyword parameter in a search action.
[]
CVE-2015-3110
Integer overflow in Adobe Photoshop CC before 16.0 (aka 2015.0.0) and Adobe Bridge CC before 6.11 allows attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:adobe:photoshop_cc:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*" ]
CVE-2019-1044
A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory.To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system, aka 'Windows Secure Kernel Mode Security Feature Bypass Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
GHSA-g53m-685r-w68h
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AAM Advanced Access Manager allows Stored XSS.This issue affects Advanced Access Manager: from n/a through 6.9.20.
[]
GHSA-9cgr-qjc2-p73m
Improper access control vulnerability in Cabinet of Cybozu Office 10.0.0 to 10.8.4 allows authenticated attackers to bypass access restriction and obtain the date of Cabinet via unspecified vectors.
[]
CVE-2000-0722
Helix GNOME Updater helix-update 0.5 and earlier allows local users to install arbitrary RPM packages by creating the /tmp/helix-install installation directory before root has begun installing packages.
[ "cpe:2.3:a:helix_code:gnome_updater:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:helix_code:gnome_updater:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:helix_code:gnome_updater:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:helix_code:gnome_updater:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:helix_code:gnome_updater:0.5:*:*:*:*:*:*:*" ]
GHSA-9wpj-x75c-4r84
An issue was discovered in Vaultize Enterprise File Sharing 17.05.31. There is Stored XSS via the optional message field of a file request.
[]
CVE-2016-10921
The gallery-photo-gallery plugin before 1.0.1 for WordPress has SQL injection.
[ "cpe:2.3:a:ays-pro:photo_gallery:*:*:*:*:*:wordpress:*:*" ]
GHSA-q4wq-xr94-wjhg
Unspecified vulnerability in Justsystem Ichitaro 2006, 2006 trial version, and Government 2006 allows remote attackers to execute arbitrary code via a modified document, possibly because of a buffer overflow, a different vulnerability than CVE-2006-4326.
[]
CVE-2018-15974
Adobe Framemaker versions 1.0.5.1 and below have an insecure library loading (dll hijacking) vulnerability. Successful exploitation could lead to privilege escalation.
[ "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*" ]
GHSA-4589-q5rf-w7g2
The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 5.7.2 due to insufficient input sanitization and output escaping on user supplied attributes like 'title_tag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-mrhr-c569-5wjh
Heap buffer overflow in Exosphere in Google Chrome on Chrome OS, Lacros prior to 105.0.5195.52 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions.
[]
CVE-2023-21210
In initiateHs20IconQueryInternal of sta_iface.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262236331
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
CVE-2004-2679
Check Point Firewall-1 4.1 up to NG AI R55 allows remote attackers to obtain potentially sensitive information by sending an Internet Key Exchange (IKE) with a certain Vendor ID payload that causes Firewall-1 to return a response containing version and other information.
[ "cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp5:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp6:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp7:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp8:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp5:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp5a:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp6:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:r55:*:ng-ai:*:*:*:*:*" ]
GHSA-6cx5-w8wc-hcvh
Cross-site scripting (XSS) vulnerability in the "extra" details in the DiffSource._get_row function in lib/viewvc.py in ViewVC 1.0.x before 1.0.13 and 1.1.x before 1.1.16 allows remote authenticated users with repository commit access to inject arbitrary web script or HTML via the "function name" line.
[]
GHSA-w62h-8659-5jcf
Adobe ColdFusion 8 and 8.0.1 does not properly implement the public access level for CFC methods, which allows remote attackers to invoke these methods via Flex 2 remoting, a different vulnerability than CVE-2006-4725.
[]
GHSA-fvg8-xwx7-9x5m
GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
[]
GHSA-q425-ff95-89pq
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in TE Informatics V5 allows Reflected XSS.This issue affects V5: before 6.2.
[]
CVE-2021-37344
Nagios XI Switch Wizard before version 2.5.7 is vulnerable to remote code execution through improper neutralisation of special elements used in an OS Command (OS Command injection).
[ "cpe:2.3:a:nagios:nagios_xi_switch_wizard:*:*:*:*:*:*:*:*" ]
GHSA-8w89-r7hw-4xgj
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Mihajlovic Nenad Improved Sale Badges – Free Version allows PHP Local File Inclusion. This issue affects Improved Sale Badges – Free Version: from n/a through 1.0.1.
[]
GHSA-2vhw-q36q-j3v5
BASupSrvcUpdater.exe in N-able Take Control Agent through 7.0.41.1141 before 7.0.43 has a TOCTOU Race Condition via a pseudo-symlink at %PROGRAMDATA%\GetSupportService_N-Central\PushUpdates, leading to arbitrary file deletion.
[]
CVE-2012-5638
The setup_logging function in log.h in SANLock uses world-writable permissions for /var/log/sanlock.log, which allows local users to overwrite the file content or bypass intended disk-quota restrictions via standard filesystem write operations.
[ "cpe:2.3:a:ovirt:sanlock:-:*:*:*:*:*:*:*" ]
CVE-2017-9144
In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.5-5:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2018-8556
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8555, CVE-2018-8557, CVE-2018-8588.
[ "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2016-0250
XML external entity (XXE) vulnerability in IBM InfoSphere Information Governance Catalog 11.3 before 11.3.1.2 and 11.5 before 11.5.0.1 allows remote authenticated users to read arbitrary files or cause a denial of service via crafted XML data. IBM X-Force ID: 110510.
[ "cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:infosphere_information_server:11.5:*:*:*:*:*:*:*" ]
CVE-2020-19288
A stored cross-site scripting (XSS) vulnerability in the /localhost/u component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in a private message.
[ "cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:*" ]
CVE-2018-1705
IBM Platform Symphony 7.1 Fix Pack 1 and 7.1.1 and IBM Spectrum Symphony 7.1.2 and 7.2.0.2 contain an information disclosure vulnerability that could allow an authenticated attacker to obtain highly sensitive information. IBM X-Force ID: 146340.
[ "cpe:2.3:a:ibm:platform_symphony:7.1:fp1:*:*:*:*:*:*", "cpe:2.3:a:ibm:platform_symphony:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:spectrum_symphony:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:spectrum_symphony:7.2.0.2:*:*:*:*:*:*:*" ]
CVE-2017-15702
In Apache Qpid Broker-J 0.18 through 0.32, if the broker is configured with different authentication providers on different ports one of which is an HTTP port, then the broker can be tricked by a remote unauthenticated attacker connecting to the HTTP port into using an authentication provider that was configured on a different port. The attacker still needs valid credentials with the authentication provider on the spoofed port. This becomes an issue when the spoofed port has weaker authentication protection (e.g., anonymous access, default accounts) and is normally protected by firewall rules or similar which can be circumvented by this vulnerability. AMQP ports are not affected. Versions 6.0.0 and newer are not affected.
[ "cpe:2.3:a:apache:qpid_broker-j:*:*:*:*:*:*:*:*" ]
CVE-2020-15115
No minimum password length in etcd
etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation, which allows for very short passwords, such as those with a length of one. This may allow an attacker to guess or brute-force users' passwords with little computational effort.
[ "cpe:2.3:a:redhat:etcd:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
CVE-2013-4458
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
[ "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*" ]
GHSA-m8w2-fqpw-59jr
joyplus-cms 1.6.0 has XSS in manager/admin_vod.php via the keyword parameter.
[]
GHSA-74w7-cr4v-wf2v
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction.
[]
GHSA-44vr-jgwf-45qh
Safari in Apple iOS before 8.4.1 does not limit the rate of JavaScript alert messages, which allows remote attackers to cause a denial of service (apparent browser locking) via a crafted web site.
[]
CVE-2022-22204
Junos OS: MX Series and SRX Series: When receiving a specific SIP packets stale call table entries are created which eventually leads to a DoS for all SIP traffic
An Improper Release of Memory Before Removing Last Reference vulnerability in the Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Juniper Networks Junos OS allows unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On all MX and SRX platforms, if the SIP ALG is enabled, receipt of a specific SIP packet will create a stale SIP entry. Sustained receipt of such packets will cause the SIP call table to eventually fill up and cause a DoS for all SIP traffic. The SIP call usage can be monitored by "show security alg sip calls". To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with: user@host> show security alg status | match sip SIP : Enabled Please verify on MX whether the following is configured: [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ] where either a. name = junos-sip or an application or application-set refers to SIP: b. [ applications application <name> application-protocol sip ] or c. [ applications application-set <name> application junos-sip ] This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R2-S2; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
[ "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*" ]
GHSA-vvcg-2c6c-4vcw
The Twenty20 Image Before-After WordPress plugin through 1.5.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[]
GHSA-mfrh-399q-w2ph
Array index error in IOAcceleratorFamily in Apple OS X before 10.9.4 allows attackers to execute arbitrary code via a crafted application.
[]
GHSA-qx89-46x3-pwhf
A vulnerability has been identified in SPPA-T3000 Application Server (All versions). An attacker with network access to the Application Server could gain remote code execution by sending specifically crafted objects via RMI. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
[]
CVE-2020-24586
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
[ "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-230_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-235_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", "cpe:2.3:o:arista:c-200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax210_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ax210:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ac_7265:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax1675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ax1675:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ax1650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:ac_1550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:ac_1550:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]