id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-8hwp-q63f-j7h2 | SQL injection vulnerability in showGallery.php in Gallery (Galerie) 2.4 allows remote attackers to execute arbitrary SQL commands via the galid parameter. | [] |
|
CVE-2022-42402 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in an embedded U3D object can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18632. | [
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*"
] |
|
GHSA-3ww7-h83j-f3rc | The AIomatic - Automatic AI Content Writer for WordPress is vulnerable to arbitrary email sending vulnerability in versions up to, and including, 2.0.5. This is due to insufficient limitations on the email recipient and the content in the 'aiomatic_send_email' function which are reachable via AJAX. This makes it possible for unauthenticated attackers to send emails with any content to any recipient. | [] |
|
CVE-2015-4598 | PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files. | [
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-6761 | Thecosy IceCMS User Data access control | A vulnerability, which was classified as problematic, has been found in Thecosy IceCMS up to 2.0.1. This issue affects some unknown processing of the component User Data Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247889 was assigned to this vulnerability. | [
"cpe:2.3:a:thecosy:icecms:2.0.1:*:*:*:*:*:*:*"
] |
GHSA-8x9p-43q6-hxc6 | Unrestricted file upload vulnerability in LoveCMS 1.4 allows remote authenticated administrators to upload arbitrary files to /modules/content/pictures/tmp/. | [] |
|
GHSA-qccm-wmcq-pwr6 | Tailscale daemon is vulnerable to information disclosure via CSRF | A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables.**Affected platforms:** All
**Patched Tailscale client versions:** v1.32.3 or later, v1.33.257 or later (unstable)What happened?In the Tailscale client, the peer API was vulnerable to DNS rebinding. This allowed an attacker-controlled website visited by the node to rebind DNS for the peer API to an attacker-controlled DNS server, and then making peer API requests in the client, including accessing the node’s Tailscale environment variables.Who is affected?All Tailscale clients prior to version v.1.32.3 are affected.What should I do?Upgrade to v1.32.3 or later to remediate the issue.What is the impact?An attacker with access to the peer API on a node could use that access to read the node’s environment variables, including any credentials or secrets stored in environment variables. This may include Tailscale authentication keys, which could then be used to add new nodes to the user’s tailnet. The peer API access could also be used to learn of other nodes in the tailnet or send files via Taildrop.An attacker with access to the peer API who sent a malicious file via Taildrop which was accessed while it was loading could use this to gain access to the local API, and remotely execute code.There is no evidence of this vulnerability being purposefully triggered or exploited.CreditsWe would like to thank [Emily Trau](https://github.com/emilytrau) and [Jamie McClymont (CyberCX)](https://twitter.com/JJJollyjim) for reporting this issue. Further detail is available in [their blog post](https://emily.id.au/tailscale).References[TS-2022-005](https://tailscale.com/security-bulletins/#ts-2022-005)[Researcher blog post](https://emily.id.au/tailscale)For more informationIf you have any questions or comments about this advisory, [contact Tailscale support](https://tailscale.com/contact/support/). | [] |
GHSA-5v42-qcw2-88f2 | The DNS inspection engine in Cisco ASA Software 9.0 before 9.0(4.13), 9.1 before 9.1(5.7), and 9.2 before 9.2(2) allows remote attackers to cause a denial of service (device reload) via crafted DNS packets, aka Bug ID CSCuo68327. | [] |
|
CVE-2021-42051 | An issue was discovered in AbanteCart before 1.3.2. Any low-privileged user with file-upload permissions can upload a malicious SVG document that contains an XSS payload. | [
"cpe:2.3:a:abantecart:abantecart:*:*:*:*:*:*:*:*"
] |
|
GHSA-8578-mmf4-f327 | Magento 2 Community Edition Cross-site Scripting Vulnerability | A cross-site request forgery vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can result in unintended deletion of the store design schedule. | [] |
CVE-2011-3369 | The add_conversation function in conversations.c in EtherApe before 0.9.12 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RPC packet, related to the get_rpc function in decode_proto.c. | [
"cpe:2.3:a:juan_toledo:etherape:*:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:juan_toledo:etherape:0.9.10:*:*:*:*:*:*:*"
] |
|
GHSA-5mfc-mgw8-gff8 | The Geo Mashup plugin before 1.10.4 for WordPress has insufficient sanitization of post editor and other user input. | [] |
|
GHSA-hm9x-fx9w-m295 | In FreeBSD 11.3-STABLE before r350217, 11.3-RELEASE before 11.3-RELEASE-p1, and 11.2-RELEASE before 11.2-RELEASE-p12, due to insufficient initialization of memory copied to userland in the freebsd32_ioctl interface, small amounts of kernel memory may be disclosed to userland processes. This may allow an attacker to leverage this information to obtain elevated privileges either directly or indirectly. | [] |
|
CVE-2015-3711 | The NTFS implementation in Apple OS X before 10.10.4 allows attackers to obtain sensitive memory-layout information for the kernel via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-6894 | RD Station <= 5.3.2 - Authenticated (Contributor+) Stored Cross-Site Scripting | The RD Station plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.3.2 due to insufficient input sanitization and output escaping of post metaboxes added by the plugin. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:rdstation:rd_station:-:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:rdstation:rd_station:*:*:*:*:*:wordpress:*:*"
] |
GHSA-w8jf-2gpq-9xxx | CRLF injection vulnerability in index.php in Drake CMS 0.4.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the lang parameter. NOTE: Drake CMS has only a beta version available, and the vendor has previously stated "We do not consider security reports valid until the first official release of Drake CMS." | [] |
|
GHSA-m453-2qqp-5rcc | Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | [] |
|
GHSA-mphm-cr6w-958w | The Themes App Honor 8 Lite Huawei mobile phones with software of versions before Prague-L31C576B172, versions before Prague-L31C530B160, versions before Prague-L31C432B180 has a man-in-the-middle (MITM) vulnerability due to the use of the insecure HTTP protocol for theme download. An attacker may exploit this vulnerability to tamper with downloaded themes. | [] |
|
GHSA-qx8j-9mjq-3f2f | All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where untrusted input is used for buffer size calculation leading to denial of service or escalation of privileges. | [] |
|
GHSA-r3gp-gxr6-hfg5 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | [] |
|
GHSA-mc2v-pp94-p8j7 | Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 89.0.4389.72 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. | [] |
|
GHSA-3vcr-vjpj-p33c | join.asp in MiniHTTP Web Forum & File Server PowerPack 4.0 allows remote attackers to add or modify arbitrary user accounts via modified (1) frmMailBox and (2) frmUserPass parameters. | [] |
|
CVE-2025-22824 | WordPress Live Flight Radar Plugin <= 1.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lucia Intelisano Live Flight Radar allows Stored XSS.This issue affects Live Flight Radar: from n/a through 1.0. | [] |
GHSA-8972-953j-j5hm | An issue was discovered in Xpdf 4.01.01. There is a use-after-free in the function JPXStream::fillReadBuf at JPXStream.cc, due to an out of bounds read. | [] |
|
CVE-2020-9741 | Stored XSS in AEM Forms Components | The AEM forms add-on for versions 6.5.5.0 (and below) and 6.4.8.2 (and below) is affected by a stored XSS vulnerability that allows users with 'Author' privileges to store malicious scripts in fields associated with the Forms component. These scripts may be executed in a victim’s browser when they open the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*"
] |
GHSA-5m8c-7j8q-4xq2 | Cross-site scripting (XSS) vulnerability in index.php in Check Point Connectra NGX R62 HFA_01 allows remote attackers to inject arbitrary web script or HTML via the dir parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
GHSA-jcc4-rcvw-33hq | The TFTP client in IBM AIX 6.1 and 7.1, and VIOS 2.2.2.2-FP-26 SP-02, when RBAC is enabled, allows remote authenticated users to bypass intended file-ownership restrictions, and read or overwrite arbitrary files, via unspecified vectors. | [] |
|
GHSA-4m7v-wr6v-2mw5 | AzuraCast missing brute force prevention | The request rate limiting feature on the login page of AzuraCast before version 0.18.3 can be bypassed, which could allow an attacker to brute force login credentials. | [] |
GHSA-f5h4-wmp5-xhg6 | Client Spoofing within the Keycloak Device Authorisation Grant | Under certain pre-conditions the vulnerability allows an attacker to spoof parts of the device flow and use a device_code to retrieve an access token for other OAuth clients. | [] |
GHSA-p33x-cg95-phvw | IBM Tivoli IT Asset Management for IT, Tivoli Service Request Manager, and Change and Configuration Management Database 7.1 through 7.1.1.8 and 7.2 and Maximo Asset Management and Maximo Industry Solutions 7.1 through 7.1.1.8, 7.5 before 7.5.0.7 IFIX003, and 7.6 before 7.6.0.0 IFIX002 allow remote authenticated users to conduct directory traversal attacks via unspecified vectors. | [] |
|
GHSA-mh47-23hp-5vf8 | By flooding a Juniper Networks router running Junos OS with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 traffic may result in a total resource exhaustion and kernel panic. The issue is triggered by traffic destined to the router. Transit traffic does not trigger the vulnerability. This issue only affects devices with IPv6 enabled and configured. Devices not configured to process IPv6 traffic are unaffected by this vulnerability. This issue was found during internal product security testing. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. Affected releases are Juniper Networks Junos OS 11.4 prior to 11.4R13-S3; 12.3 prior to 12.3R3-S4; 12.3X48 prior to 12.3X48-D30; 13.3 prior to 13.3R10, 13.3R4-S11; 14.1 prior to 14.1R2-S8, 14.1R4-S12, 14.1R8; 14.1X53 prior to 14.1X53-D28, 14.1X53-D40; 14.1X55 prior to 14.1X55-D35; 14.2 prior to 14.2R3-S10, 14.2R4-S7, 14.2R6; 15.1 prior to 15.1F2-S5, 15.1F5-S2, 15.1F6, 15.1R3; 15.1X49 prior to 15.1X49-D40; 15.1X53 prior to 15.1X53-D57, 15.1X53-D70. | [] |
|
GHSA-gj4j-xh74-gvw8 | External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to write arbitrary files. | [] |
|
GHSA-v8wf-ggw9-wxph | A vulnerability in SAP NW EP (WPC) - versions 7.30, 7.31, 7.40, 7.50, which does not sufficiently validate user-controlled input, allows a remote attacker to conduct a Cross-Site (XSS) scripting attack. A successful exploit could allow the attacker to execute arbitrary script code which could lead to stealing or modifying of authentication information of the user, such as data relating to his or her current session. | [] |
|
CVE-2018-15199 | AuraCMS 2.3 allows XSS via a Bukutamu -> AddGuestbook action. | [
"cpe:2.3:a:auracms:auracms:2.3:*:*:*:*:*:*:*"
] |
|
CVE-2022-2115 | Popup Anything < 2.1.7 - Reflected Cross-Site Scripting | The Popup Anything WordPress plugin before 2.1.7 does not sanitise and escape a parameter before outputting it back in a frontend page, leading to a Reflected Cross-Site Scripting | [
"cpe:2.3:a:essentialplugin:popup_anything:*:*:*:*:*:wordpress:*:*"
] |
GHSA-96f5-4j7x-gc4x | RONDS EPM version 1.19.5 has a vulnerability in which a function could allow unauthenticated users to leak credentials. In some circumstances, an attacker can exploit this vulnerability to execute operating system (OS) commands. | [] |
|
GHSA-cgxw-qrqf-jqq9 | generate_doygen.pl in ace before 6.2.7+dfsg-2 creates predictable file names in the /tmp directory which allows attackers to gain elevated privileges. | [] |
|
CVE-2024-1398 | The Ultimate Bootstrap Elements for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘heading_title_tag’ and ’heading_sub_title_tag’ parameters in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:g5plus:ultimate_bootstrap_elements_for_elementor:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2005-2153 | SQL injection vulnerability in class.ticket.php in osTicket 1.3.1 beta and earlier allows remote attackers to execute arbitrary SQL commands via the ticket variable. | [
"cpe:2.3:a:osticket:osticket_sts:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:osticket:osticket_sts:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:osticket:osticket_sts:1.3_beta:*:*:*:*:*:*:*"
] |
|
CVE-2023-45559 | An issue in Tamaki_hamanoki Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token. | [
"cpe:2.3:a:linecorp:line:13.6.1:*:*:*:*:*:*:*"
] |
|
GHSA-w44h-wfp7-qpq7 | Missing Authorization vulnerability in realmag777 BEAR.This issue affects BEAR: from n/a through 1.1.4.3. | [] |
|
CVE-2008-4326 | The PMA_escapeJsString function in libraries/js_escape.lib.php in phpMyAdmin before 2.11.9.2, when Internet Explorer is used, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via a NUL byte inside a "</script" sequence. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.0_pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.0_pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2.7_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.2_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.2_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.5_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.6_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.6_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.5.7_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.0_pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1_pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.1_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.2_dev:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.2_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.2_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.3_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_pl4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.6.4_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.7.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.7.0_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.7.0_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.7.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.7_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.1_dev:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_dev:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.1_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.9_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.10.3rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.0rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.1rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.3rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.4rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.5rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.6rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:2.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*"
] |
|
GHSA-69c2-x5xc-7pw3 | An issue was discovered in WonderCMS before 2.5.2. An attacker can create a new session on a web application and record the associated session identifier. The attacker then causes the victim to authenticate against the server using the same session identifier. The attacker can access the user's account through the active session. The Session Fixation attack fixes a session on the victim's browser, so the attack starts before the user logs in. | [] |
|
CVE-2019-9443 | In the Android kernel in the vl53L0 driver there is a possible out of bounds write due to a permissions bypass. This could lead to local escalation of privilege due to a set_fs() call without restoring the previous limit with System execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-4897 | Remote Code Execution in parisneo/lollms-webui | parisneo/lollms-webui, in its latest version, is vulnerable to remote code execution due to an insecure dependency on llama-cpp-python version llama_cpp_python-0.2.61+cpuavx2-cp311-cp311-manylinux_2_31_x86_64. The vulnerability arises from the application's 'binding_zoo' feature, which allows attackers to upload and interact with a malicious model file hosted on hugging-face, leading to remote code execution. The issue is linked to a known vulnerability in llama-cpp-python, CVE-2024-34359, which has not been patched in lollms-webui as of commit b454f40a. The vulnerability is exploitable through the application's handling of model files in the 'bindings_zoo' feature, specifically when processing gguf format model files. | [
"cpe:2.3:a:parisneo:lollms-webui:9.5:*:*:*:*:*:*:*"
] |
CVE-2001-0996 | POP3Lite before 0.2.4 does not properly quote a . (dot) in an email message, which could allow a remote attacker to append arbitrary text to the end of an email message, which could then be interpreted by various mail clients as valid POP server responses or other input that could cause clients to crash or otherwise behave unexpectedly. | [
"cpe:2.3:a:pop3lite:pop3lite:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pop3lite:pop3lite:0.2.3b:*:*:*:*:*:*:*"
] |
|
GHSA-5767-6827-66hv | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup 11.3.0.12. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUBackup TimeRange method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database. Was ZDI-CAN-4294. | [] |
|
GHSA-87cq-cch6-5ff8 | An integer overflow error within the "identify()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger a division by zero via specially crafted NOKIARAW file (Note: This vulnerability is caused due to an incomplete fix of CVE-2018-5804). | [] |
|
GHSA-m957-2m8p-m75f | The Application Firewall in Apple Mac OS X 10.5 does not apply changed settings to processes that are started by launchd until the processes are restarted, which might allow attackers to bypass intended access restrictions. | [] |
|
GHSA-vw6f-gmr3-fq8h | Honeywell Notifier Web Server (NWS) Version 3.50 is vulnerable to a path traversal attack, which allows an attacker to bypass access to restricted directories. Honeywell has released a firmware update to address the problem. | [] |
|
CVE-2018-6959 | VMware vRealize Automation (vRA) prior to 7.4.0 contains a vulnerability in the handling of session IDs. Exploitation of this issue may lead to the hijacking of a valid vRA user's session. | [
"cpe:2.3:a:vmware:vrealize_automation:*:*:*:*:*:*:*:*"
] |
|
GHSA-hfg9-v7x5-666q | Untrusted search path vulnerability in Lenovo Thinkpad Bluetooth with Enhanced Data Rate Software 6.4.0.2900 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse DLL that is located in the same folder as a file that is processed by Lenovo Bluetooth. | [] |
|
CVE-2017-8205 | The Bastet driver of Honor 9 Huawei smart phones with software of versions earlier than Stanford-AL10C00B175 has integer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP which has the root privilege; the APP can send a specific parameter to the driver of the smart phone, causing arbitrary code execution. | [
"cpe:2.3:o:huawei:honor_9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_9:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-6302 | The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short. | [
"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
] |
|
CVE-2024-0010 | PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Portal | A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of a user’s browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft. | [
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h2:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h3:*:*:*:*:*:*"
] |
CVE-2024-20503 | Cisco Duo Epic for Hyperdrive Information Disclosure Vulnerability | A vulnerability in Cisco Duo Epic for Hyperdrive could allow an authenticated, local attacker to view sensitive information in cleartext on an affected system.
This vulnerability is due to improper storage of an unencrypted registry key. A low-privileged attacker could exploit this vulnerability by viewing or querying the registry key on the affected system. A successful exploit could allow the attacker to view sensitive information in cleartext. | [
"cpe:2.3:a:cisco:duo_authentication_for_epic:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:duo_authentication_for_epic:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:duo_authentication_for_epic:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:duo_authentication_for_epic:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:duo_authentication_for_epic:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:duo_authentication_for_epic:1.2.0.95:*:*:*:*:*:*:*"
] |
GHSA-6wcr-wcqm-3mfh | Django settings leak in date template filter | The get_format function in `utils/formats.py` in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by `SECRET_KEY`. | [] |
GHSA-q37w-9m74-wmpg | Multiple cross-site scripting (XSS) vulnerabilities in Michael Salzer Guestbox 0.6, and other versions before 0.8, allow remote attackers to inject arbitrary web script or HTML via (1) HTML tags that follow a "http://" string, which bypasses a regular expression check, and (2) other unspecified attack vectors. | [] |
|
CVE-2024-0670 | Privilege escalation in windows agent | Privilege escalation in windows agent plugin in Checkmk before 2.2.0p23, 2.1.0p40 and 2.0.0 (EOL) allows local user to escalate privileges | [
"cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-85q4-g73v-3g52 | A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via the EvoSharedObjStore. This issue affects all versions of Junos OS Evolved prior to 19.1R1. | [] |
|
GHSA-5mp3-cq94-5wfp | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the GPS location wireless interface, a Use After Free condition can occur. | [] |
|
GHSA-jqqf-676c-jm28 | CGIScript.net csNews.cgi allows remote authenticated users to read arbitrary files, and possibly gain privileges, via the (1) pheader or (2) pfooter parameters in the "Advanced Settings" capability. | [] |
|
GHSA-4596-vv4r-8q24 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42. | [] |
|
CVE-2015-7271 | Dell Integrated Remote Access Controller (iDRAC) 7/8 before 2.21.21.21 has a format string issue in racadm getsystinfo. | [
"cpe:2.3:o:dell:integrated_remote_access_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:integrated_remote_access_controller_7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:integrated_remote_access_controller_8:-:*:*:*:*:*:*:*"
] |
|
GHSA-3qv8-vwg9-439r | WithSecure Elements Endpoint Protection Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of WithSecure Elements Endpoint Protection. User interaction on the part of an administrator is required to exploit this vulnerability.The specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23035. | [] |
|
GHSA-4v6v-34r8-27m4 | IrfanView WBZ plugin WB1 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WB1 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22718. | [] |
|
CVE-2011-0445 | The ASN.1 BER dissector in Wireshark 1.4.0 through 1.4.2 allows remote attackers to cause a denial of service (assertion failure) via crafted packets, as demonstrated by fuzz-2010-12-30-28473.pcap. | [
"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*"
] |
|
CVE-2025-21850 | nvmet: Fix crash when a namespace is disabled | In the Linux kernel, the following vulnerability has been resolved:
nvmet: Fix crash when a namespace is disabled
The namespace percpu counter protects pending I/O, and we can
only safely diable the namespace once the counter drop to zero.
Otherwise we end up with a crash when running blktests/nvme/058
(eg for loop transport):
[ 2352.930426] [ T53909] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN PTI
[ 2352.930431] [ T53909] KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
[ 2352.930434] [ T53909] CPU: 3 UID: 0 PID: 53909 Comm: kworker/u16:5 Tainted: G W 6.13.0-rc6 #232
[ 2352.930438] [ T53909] Tainted: [W]=WARN
[ 2352.930440] [ T53909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
[ 2352.930443] [ T53909] Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]
[ 2352.930449] [ T53909] RIP: 0010:blkcg_set_ioprio+0x44/0x180
as the queue is already torn down when calling submit_bio();
So we need to init the percpu counter in nvmet_ns_enable(), and
wait for it to drop to zero in nvmet_ns_disable() to avoid having
I/O pending after the namespace has been disabled. | [] |
CVE-2014-1861 | The client in Jetro COCKPIT Secure Browsing (JCSB) 4.3.1 and 4.3.3 does not validate the FileName element in an RDP_FILE_TRANSFER document, which allows remote JCSB servers to execute arbitrary programs by providing a .EXE extension. | [
"cpe:2.3:a:jetroplatforms:jetro_cockpit_secure_browsing:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jetroplatforms:jetro_cockpit_secure_browsing:4.3.3:*:*:*:*:*:*:*"
] |
|
GHSA-7xjr-vjjg-5v8v | Directory traversal vulnerability in the Importers plugin in Atlassian JIRA before 6.0.5 allows remote attackers to create arbitrary files via unspecified vectors. | [] |
|
GHSA-q8rg-9c8g-rv67 | In JetBrains IntelliJ IDEA before 2022.1 reflected XSS via error messages in internal web server was possible | [] |
|
GHSA-p4mj-rcrm-4875 | Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39169. | [] |
|
GHSA-x9rv-vww8-vmj9 | neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | [] |
|
CVE-1999-1535 | Buffer overflow in AspUpload.dll in Persits Software AspUpload before 1.4.0.2 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long argument in the HTTP request. | [
"cpe:2.3:a:persits:aspupload:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-9025 | Sight – Professional Image Gallery and Portfolio <= 1.1.2 - Missing Authorization to Sensitive Information Exposure in handler_post_title | The Sight – Professional Image Gallery and Portfolio plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'handler_post_title' function in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to expose private, pending, trashed, and draft post titles. Successful exploitation requires the Elementor plugin to be installed and activated. | [
"cpe:2.3:a:codesupplyco:sight_professional_image_gallery_and_portfolio:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesupply:sight:*:*:*:*:*:wordpress:*:*"
] |
GHSA-j2pc-4j53-q3ww | When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks. | [] |
|
GHSA-pv3r-p93c-qvjx | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects: Bitdefender GravityZone versions prior to 3.3.8.249. | [] |
|
GHSA-8f74-5qhp-5pxg | eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn before 2.3.0 installed allow administrative operations by unauthenticated attackers with access to the web interface, because features such as File-Browser and Shell Command (as well as "Set root password") are exposed. | [] |
|
CVE-2001-0412 | Cisco Content Services (CSS) switch products 11800 and earlier, aka Arrowpoint, allows local users to gain privileges by entering debug mode. | [
"cpe:2.3:h:cisco:content_services_switch_11050:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:content_services_switch_11150:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:content_services_switch_11800:*:*:*:*:*:*:*:*"
] |
|
GHSA-mwpc-rq5j-r7mq | SQL injection vulnerability in the Drag & Drop Gallery module 6.x for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [] |
|
CVE-2018-21052 | An issue was discovered on Samsung mobile devices with N(7.x) and O(8.X) (Exynos chipsets) software. There is incorrect usage of shared memory in the vaultkeeper Trustlet, leading to arbitrary code execution. The Samsung ID is SVE-2018-12855 (October 2018). | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] |
|
CVE-2018-19329 | GreenCMS v2.3.0603 allows remote authenticated administrators to delete arbitrary files by modifying a base64-encoded pathname in an m=admin&c=media&a=delfilehandle&id= call, related to the m=admin&c=media&a=restorefile delete button. | [
"cpe:2.3:a:greencms:greencms:2.3.0603:*:*:*:*:*:*:*"
] |
|
GHSA-q7cx-f48p-82m3 | tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c. | [] |
|
CVE-2014-3607 | DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | [
"cpe:2.3:a:ldaptive:ldaptive:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ldaptive:vt-ldap:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-1113 | Cisco Unified Wireless IP Phone 7921, when using Protected Extensible Authentication Protocol (PEAP), does not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks. | [
"cpe:2.3:h:cisco:7921_wireless_ip_phone:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vocera_communications:vocera_communications_badge:*:*:*:*:*:*:*:*"
] |
|
GHSA-44f7-vf3h-r86f | An issue was discovered on Epson Expression Home XP255 20.08.FM10I8 devices. With the SNMPv1 public community, all values can be read, and with the epson community, all the changeable values can be written/updated, as demonstrated by permanently disabling the network card or changing the DNS servers. | [] |
|
CVE-2012-0469 | Use-after-free vulnerability in the mozilla::dom::indexedDB::IDBKeyRange::cycleCollection::Trace function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to execute arbitrary code via vectors related to crafted IndexedDB data. | [
"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*"
] |
|
CVE-2019-19947 | In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c driver, aka CID-da2311a6385c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:fas\\/aff_baseboard_management_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:aff_baseboard_management_controller:a700s:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-20979 | An arbitrary file upload vulnerability in the move_uploaded_file() function of LJCMS v4.3 allows attackers to execute arbitrary code. | [
"cpe:2.3:a:8cms:ljcms:4.3.-:*:*:*:*:*:*:*"
] |
|
CVE-2023-36047 | Windows Authentication Elevation of Privilege Vulnerability | Windows Authentication Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
CVE-2000-1134 | Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. | [
"cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:4.0es:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-2220 | Untrusted search path vulnerability in Installer of CASL II simulator (self-extract format) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | [
"cpe:2.3:a:ipa:casl_ii_simulator:*:*:*:*:*:*:*:*"
] |
|
GHSA-8v3j-hp54-rp54 | Cisco Universal Small Cell devices with firmware R2.12 through R3.5 contain an image-decryption key in flash memory, which allows remote attackers to bypass a certain certificate-validation feature and obtain sensitive firmware-image and IP address data via a request to an unspecified Cisco server, aka Bug ID CSCut98082. | [] |
|
CVE-2022-1099 | Adding a very large number of tags to a runner in GitLab CE/EE affecting all versions prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allows an attacker to impact the performance of GitLab | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2020-4966 | IBM Security Identity Governance and Intelligence 5.2.6 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 192423. | [
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.6:*:*:*:*:*:*:*"
] |
|
GHSA-pvh5-g247-37mv | On Juniper Networks EX4300-MP Series, EX4600 Series and QFX5K Series deployed in (Ethernet VPN) EVPN-(Virtual Extensible LAN) VXLAN configuration, receipt of a stream of specific VXLAN encapsulated layer 2 frames can cause high CPU load, which could lead to network protocol operation issue and traffic interruption. This issue affects devices that are configured as a Layer 2 or Layer 3 gateway of an EVPN-VXLAN deployment. The offending layer 2 frames that cause the issue originate from a different access switch that get encapsulated within the same EVPN-VXLAN domain. This issue affects Juniper Networks Junos OS on EX4300-MP Series, EX4600 Series and QFX5K Series: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R2-S1, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2. | [] |
|
GHSA-76v8-965q-f4x7 | The WordPress File Upload plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wfu_ajax_action_read_subfolders' function in all versions up to, and including, 4.24.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform limited path traversal to view directories and subdirectories in WordPress. Files cannot be viewed. | [] |
|
CVE-2019-14766 | Path Traversal in the file browser of DIMO YellowBox CRM before 6.3.4 allows a standard authenticated user to browse the server filesystem. | [
"cpe:2.3:a:dimo-crm:yellowbox_crm:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-1739 | Apple QuickTime before 7.4.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted ftyp atoms in a movie file, which triggers memory corruption. | [
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-12285 | SEMA API <= 5.27 - Reflected Cross-Site Scripting via catid Parameter | The SEMA API plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘catid’ parameter in all versions up to, and including, 5.27 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
Subsets and Splits