id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2022-35455 | OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6b0d63. | [
"cpe:2.3:a:otfcc_project:otfcc:0.10.4:*:*:*:*:*:*:*"
] |
|
CVE-2020-0388 | In createEmergencyLocationUserNotification of GnssVisibilityControl.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-156123285 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-2279-5x78-4vqm | A leftover debug code vulnerability exists in the httpd shell.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted HTTP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability. | [] |
|
GHSA-r6mq-3vv9-38j4 | Multiple stack-based buffer overflows in CA (Computer Associates) BrightStor ARCserve Backup for Laptops and Desktops r11.0 through r11.5 allow remote attackers to execute arbitrary code via a long (1) username or (2) password to the rxrLogin command in rxRPC.dll, or a long (3) username argument to the GetUserInfo function. | [] |
|
GHSA-3fgp-cw9p-5ff5 | Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code. | [] |
|
CVE-2016-6800 | The default configuration of the Apache OFBiz framework offers a blog functionality. Different users are able to operate blogs which are related to specific parties. In the form field for the creation of new blog articles the user input of the summary field as well as the article field is not properly sanitized. It is possible to inject arbitrary JavaScript code in these form fields. This code gets executed from the browser of every user who is visiting this article. Mitigation: Upgrade to Apache OFBiz 16.11.01. | [
"cpe:2.3:a:apache:ofbiz:11.04:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:11.04.01:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:11.04.02:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:11.04.03:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:11.04.04:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:11.04.05:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:11.04.06:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:12.04:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:12.04.01:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:12.04.02:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:12.04.03:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:12.04.04:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:12.04.05:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:12.04.06:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:13.07:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:13.07.01:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:13.07.02:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ofbiz:13.07.03:*:*:*:*:*:*:*"
] |
|
CVE-2024-24333 | TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the desc parameter in the setWiFiAclRules function. | [
"cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-2177 | Untrusted search path vulnerability in Installer of Shogyo Touki Denshi Ninsho Software Ver 1.7 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | [
"cpe:2.3:a:shogyo:touki_denshi:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-4542 | EMC RSA Archer GRC 5.x before 5.5.3 allows remote authenticated users to bypass intended access restrictions, and read or modify Discussion Forum Fields messages, via unspecified vectors. | [
"cpe:2.3:a:emc:rsa_archer_grc:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_grc:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_grc:5.5.2:*:*:*:*:*:*:*"
] |
|
CVE-2018-14384 | The Website Manager module in SEO Panel 3.13.0 and earlier is affected by a stored Cross-Site Scripting (XSS) vulnerability, allowing remote authenticated attackers to inject arbitrary web script or HTML via the websites.php name parameter. | [
"cpe:2.3:a:seopanel:seo_panel:*:*:*:*:*:*:*:*"
] |
|
GHSA-mvw5-r6wq-28cm | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | [] |
|
GHSA-m44c-p74c-j3j2 | There is an information disclosure vulnerability in several smartphones. The device does not sufficiently validate the identity of smart wearable device in certain specific scenario, the attacker need to gain certain information in the victim's smartphone to launch the attack, and successful exploit could cause information disclosure.Affected product versions include:HUAWEI Mate 20 versions earlier than 10.1.0.160(C00E160R3P8),versions earlier than 10.1.0.160(C01E160R2P8);HUAWEI Mate 20 X versions earlier than 10.1.0.160(C00E160R2P8),versions earlier than 10.1.0.160(C01E160R2P8);HUAWEI P30 Pro versions earlier than 10.1.0.160(C00E160R2P8);Laya-AL00EP versions earlier than 10.1.0.160(C786E160R3P8);Tony-AL00B versions earlier than 10.1.0.160(C00E160R2P11);Tony-TL00B versions earlier than 10.1.0.160(C01E160R2P11). | [] |
|
CVE-2018-19326 | Zyxel VMG1312-B10D devices before 5.13(AAXA.8)C0 allow ../ Directory Traversal, as demonstrated by reading /etc/passwd. | [
"cpe:2.3:o:zyxel:vmg1312-b10d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:vmg1312-b10d:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-1000017 | Chamilo Chamilo-lms version 1.11.8 and earlier contains an Incorrect Access Control vulnerability in Tickets component that can result in an authenticated user can read all tickets available on the platform, due to lack of access controls. This attack appears to be exploitable via ticket_id=[ticket number]. This vulnerability appears to have been fixed in 1.11.x after commit 33e2692a37b5b6340cf5bec1a84e541460983c03. | [
"cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*"
] |
|
GHSA-9442-gm4v-r222 | Undertow's url-encoded request path information can be broken on ajp-listener | A vulnerability was found in Undertow, where URL-encoded request paths can be mishandled during concurrent requests on the AJP listener. This issue arises because the same buffer is used to decode the paths for multiple requests simultaneously, leading to incorrect path information being processed. As a result, the server may attempt to access the wrong path, causing errors such as "404 Not Found" or other application failures. This flaw can potentially lead to a denial of service, as legitimate resources become inaccessible due to the path mix-up. | [] |
CVE-2021-3273 | Nagios XI below 5.7 is affected by code injection in the /nagiosxi/admin/graphtemplates.php component. To exploit this vulnerability, someone must have an admin user account in Nagios XI's web system. | [
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*"
] |
|
GHSA-c965-f93g-39w9 | Cab Booking Script 1.0 has SQL Injection via the /service-list city parameter. | [] |
|
CVE-2024-13152 | SQLi in BSS Software's Mobuy Online Machinery Monitoring Panel | Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in BSS Software Mobuy Online Machinery Monitoring Panel allows SQL Injection.This issue affects Mobuy Online Machinery Monitoring Panel: before 2.0. | [] |
CVE-2008-3326 | Cross-site scripting (XSS) vulnerability in blog/edit.php in Moodle 1.6.x before 1.6.7 and 1.7.x before 1.7.5 allows remote attackers to inject arbitrary web script or HTML via the etitle parameter (blog entry title). | [
"cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:1.7.4:*:*:*:*:*:*:*"
] |
|
GHSA-gw24-pw7h-6mfq | An issue was discovered in Roche Accu-Chek Inform II Instrument before 03.06.00 (Serial number below 14000) and 04.x before 04.03.00 (Serial Number above 14000), CoaguChek Pro II before 04.03.00, CoaguChek XS Plus before 03.01.06, CoaguChek XS Pro before 03.01.06, cobas h 232 before 03.01.03 (Serial number below KQ0400000 or KS0400000), and cobas h 232 before 04.00.04 (Serial number above KQ0400000 or KS0400000). A vulnerability in the software update mechanism allows authenticated attackers in the adjacent network to overwrite arbitrary files on the system through a crafted update package. | [] |
|
GHSA-f8j7-34r5-rv6c | A remote code execution (RCE) in e/install/index.php of EmpireCMS 7.5 allows attackers to execute arbitrary PHP code via writing malicious code to the install file. | [] |
|
GHSA-j7v6-jr86-53j7 | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.59, 8.60 and 8.61. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. While the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N). | [] |
|
GHSA-97g8-j85h-q6rm | While sending the rendered surface content to the screen, Error handling is not properly checked results in an unpredictable behaviour in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6564, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9531, QCA9880, QCA9886, QCA9980, QCN5502, QCS404, QCS605, SD 210/SD 212/SD 205, SD 425, SD 600, SD 625, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM630, SDM660, SDX20, SDX24, SXR1130 | [] |
|
GHSA-jgxf-w4hm-5gmh | Cross-site scripting (XSS) vulnerability in multiple Hal Networks shopping-cart products allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-5rjc-jc28-cwgg | Connect-CMS Access control vulnerability | Impact(影響)There is an Access control vulnerability on the management system of Connect-CMS.
Affected Version : Connect-CMS v1.8.6, 2.4.6 and earlierPatches(修正バージョン)version v1.8.7, v2.4.7Workarounds(運用回避手段)Upgrade Connect-CMS to latest version | [] |
CVE-2022-23332 | Command injection vulnerability in Manual Ping Form (Web UI) in Shenzhen Ejoin Information Technology Co., Ltd. ACOM508/ACOM516/ACOM532 609-915-041-100-020 allows a remote attacker to inject arbitrary code via the field. | [
"cpe:2.3:o:ejointech:acom508_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ejointech:acom508:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ejointech:acom532_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ejointech:acom532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ejointech:acom516_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ejointech:acom516:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-0131 | Cross-site scripting (XSS) vulnerability in login_form.asp in Instant Softwares Dating Site allows remote attackers to inject arbitrary web script or HTML via the msg parameter, a different product than CVE-2006-6022. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:instantsoftwares:dating_site:*:*:*:*:*:*:*:*"
] |
|
GHSA-672m-f2rr-8wvq | The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c. | [] |
|
CVE-2025-21931 | hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio | In the Linux kernel, the following vulnerability has been resolved:
hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio
Commit b15c87263a69 ("hwpoison, memory_hotplug: allow hwpoisoned pages to
be offlined) add page poison checks in do_migrate_range in order to make
offline hwpoisoned page possible by introducing isolate_lru_page and
try_to_unmap for hwpoisoned page. However folio lock must be held before
calling try_to_unmap. Add it to fix this problem.
Warning will be produced if folio is not locked during unmap:
------------[ cut here ]------------
kernel BUG at ./include/linux/swapops.h:400!
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 4 UID: 0 PID: 411 Comm: bash Tainted: G W 6.13.0-rc1-00016-g3c434c7ee82a-dirty #41
Tainted: [W]=WARN
Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015
pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : try_to_unmap_one+0xb08/0xd3c
lr : try_to_unmap_one+0x3dc/0xd3c
Call trace:
try_to_unmap_one+0xb08/0xd3c (P)
try_to_unmap_one+0x3dc/0xd3c (L)
rmap_walk_anon+0xdc/0x1f8
rmap_walk+0x3c/0x58
try_to_unmap+0x88/0x90
unmap_poisoned_folio+0x30/0xa8
do_migrate_range+0x4a0/0x568
offline_pages+0x5a4/0x670
memory_block_action+0x17c/0x374
memory_subsys_offline+0x3c/0x78
device_offline+0xa4/0xd0
state_store+0x8c/0xf0
dev_attr_store+0x18/0x2c
sysfs_kf_write+0x44/0x54
kernfs_fop_write_iter+0x118/0x1a8
vfs_write+0x3a8/0x4bc
ksys_write+0x6c/0xf8
__arm64_sys_write+0x1c/0x28
invoke_syscall+0x44/0x100
el0_svc_common.constprop.0+0x40/0xe0
do_el0_svc+0x1c/0x28
el0_svc+0x30/0xd0
el0t_64_sync_handler+0xc8/0xcc
el0t_64_sync+0x198/0x19c
Code: f9407be0 b5fff320 d4210000 17ffff97 (d4210000)
---[ end trace 0000000000000000 ]--- | [] |
CVE-2022-40149 | Stack Buffer Overflow in Jettison | Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. | [
"cpe:2.3:a:jettison_project:jettison:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
GHSA-3f79-hj49-8fgx | Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function. | [] |
|
GHSA-32r2-x7ch-xmj2 | Substance3D - Stager versions 3.0.2 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
GHSA-hm95-xc86-pqpj | A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Student Attendance Management System 1.0 via the couse filed in index.php. | [] |
|
GHSA-wrvr-8mpx-r7pp | mime Regular Expression Denial of Service when MIME lookup performed on untrusted user input | Affected versions of `mime` are vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.RecommendationUpdate to version 2.0.3 or later. | [] |
GHSA-m24r-p59v-q652 | A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system. | [] |
|
GHSA-mx7c-7mpj-rvjv | The WOW Entrance Effects (WEE!) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wee' shortcode in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2023-21256 | In SettingsHomepageActivity.java, there is a possible way to launch arbitrary activities via Settings due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
| [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
GHSA-x5qj-9vmx-7g6g | Improper Input Validation in .Net Framework API's | A vulnerability exists in certain .Net Framework API's and Visual Studio in the way they parse URL's, aka '.NET Framework and Visual Studio Spoofing Vulnerability'. | [] |
GHSA-hffr-h2c8-jr4p | The General Responder implementation in the IP Service Level Agreement (SLA) feature in Cisco IOS 15.2 and IOS XE 3.1.xS through 3.4.xS before 3.4.5S and 3.5.xS through 3.7.xS before 3.7.2S allows remote attackers to cause a denial of service (device reload) via crafted (1) IPv4 or (2) IPv6 IP SLA packets on UDP port 1167, aka Bug ID CSCuc72594. | [] |
|
GHSA-5pqp-q4fm-4p4h | The Page Builder Gutenberg Blocks WordPress plugin before 3.1.12 does not prevent users from pinging arbitrary hosts via some of its shortcodes, which could allow high privilege users such as contributors to perform SSRF attacks. | [] |
|
GHSA-x8f6-28mj-jhrh | In mtk-aie, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07225857; Issue ID: ALPS07225857. | [] |
|
GHSA-ffr4-5c39-jm79 | db2fmp process in IBM DB2 Content Manager before 8.2 Fix Pack 10 allows local users to cause a denial of service (CPU consumption) by importing a corrupted Microsoft Excel file, aka "CORRUPTED EXEL FILE WILL CAUSE TEXT SEARCH PROCESS LOOPING." | [] |
|
CVE-2006-6041 | Multiple PHP remote file inclusion vulnerabilities in Laurent Van den Reysen WORK system e-commerce 3.0.2, and other versions before 3.0.4, allow remote attackers to execute arbitrary PHP code via a URL in the g_include parameter to (1) index.php, (2) module/forum/forum.php, (3) unspecified files under module/, and (4) unspecified files under administration/module/. | [
"cpe:2.3:a:laurent_van_den_reysen:work_system_e-commerce:*:*:*:*:*:*:*:*"
] |
|
GHSA-34qx-mf2g-mjc4 | The startup script in packages/RedHat/ntop.init in ntop before 3.2, when ntop.conf is writable by users besides root, creates temporary files insecurely, which allows remote attackers to execute arbitrary code. | [] |
|
CVE-2021-30734 | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-8736 | Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*"
] |
|
GHSA-qxf7-7mh5-3w6r | In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile SD 845, SD 850, on a secure device, PD dumps are collected when debugging is not enabled. | [] |
|
GHSA-c37f-63v3-mgp2 | The WooCommerce Additional Fees On Checkout (Free) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘number’ parameter in all versions up to, and including, 1.4.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
CVE-2021-20488 | IBM Security Identity Manager 6.0.2 could allow an authenticated malicious user to change the passwords of other users in the Windows AD environment when IBM Security Identity Manager Windows Password Synch Plug-in is deployed and configured. IBM X-Force ID: 197789. | [
"cpe:2.3:a:ibm:security_identity_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*"
] |
|
GHSA-mrxw-mxhj-p664 | Nokogiri updates packaged libxslt to v1.1.43 to resolve multiple CVEs | SummaryNokogiri v1.18.4 upgrades its dependency libxslt to [v1.1.43](https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.43).libxslt v1.1.43 resolves:CVE-2025-24855: Fix use-after-free of XPath context nodeCVE-2024-55549: Fix UAF related to excluded namespacesImpactCVE-2025-24855"Use-after-free due to xsltEvalXPathStringNs leaking xpathCtxt->node"MITRE has rated this 7.8 High CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:HUpstream report: https://gitlab.gnome.org/GNOME/libxslt/-/issues/128NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2025-24855CVE-2024-55549"Use-after-free related to excluded result prefixes"MITRE has rated this 7.8 High CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:HUpstream report: https://gitlab.gnome.org/GNOME/libxslt/-/issues/127NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2024-55549 | [] |
GHSA-x9gv-xfvw-jcpx | Directory traversal vulnerability in view_source.jsp in Resin 2.1.2 allows remote attackers to read arbitrary files via a "\.." (backslash dot dot). | [] |
|
CVE-2021-23022 | On version 7.2.1.x before 7.2.1.3 and 7.1.x before 7.1.9.9 Update 1, the BIG-IP Edge Client Windows Installer Service's temporary folder has weak file and folder permissions. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager_client:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-47911 | CVE-2022-47911 | Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not properly validate the input module name to the backup services of the software. This could allow a remote attacker to access sensitive functions of the application and execute arbitrary system commands.
| [
"cpe:2.3:a:sewio:real-time_location_system_studio:*:*:*:*:*:*:*:*"
] |
GHSA-pv88-jc7r-cpgq | Unrestricted Upload of File with Dangerous Type vulnerability in Joris van Montfort JVM Gutenberg Rich Text Icons.This issue affects JVM Gutenberg Rich Text Icons: from n/a through 1.2.3. | [] |
|
CVE-2017-5395 | Malicious sites can display a spoofed location bar on a subsequently loaded page when the existing location bar on the new page is scrolled out of view if navigations between pages can be timed correctly. Note: This issue only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox < 51. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-gvfx-jhx9-4mvq | The WooCommerce Shipping WordPress plugin through 1.2.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] |
|
GHSA-3v8m-hgx9-fgh9 | An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing. | [] |
|
CVE-2010-1746 | Multiple cross-site scripting (XSS) vulnerabilities in the Table JX (com_grid) component for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) data_search and (2) rpp parameters to index.php. | [
"cpe:2.3:a:toolsjx:com_grid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-17360 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump. | [
"cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*"
] |
|
GHSA-3hx3-6qpf-m689 | CVE was unused by HPE. | [] |
|
CVE-2024-6767 | WordSurvey <= 3.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via sounding_title Parameter | The WordSurvey plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘sounding_title’ parameter in all versions up to, and including, 3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [] |
GHSA-wqp5-wj3h-2543 | The broken-link-manager plugin before 0.5.0 for WordPress has wpslDelURL or wpslEditURL SQL injection via the url parameter. | [] |
|
GHSA-9qmv-5j7q-crr6 | In MiscService::DoOemSetTcsFci of miscservice.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-241763682References: N/A | [] |
|
CVE-2021-42069 | When a user opens manipulated Tagged Image File Format (.tif) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
] |
|
GHSA-8545-3w77-w6gm | This issue was addressed with improved checks. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. Processing an image may result in disclosure of process memory. | [] |
|
GHSA-2f29-v4g5-53hv | Uncontrolled search path for the FPGA Support Package for the Intel(R) oneAPI DPC++/C++ Compiler software for Windows before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
GHSA-jww8-q46r-8w4c | A DLL hijacking vulnerability exists in Trend Micro Password Manager 5.0 in which, if exploited, would allow an attacker to load an arbitrary unsigned DLL into the signed service's process. This process is very similar, yet not identical to CVE-2019-14684. | [] |
|
GHSA-pgrf-qrwj-3vf5 | A user may be tricked into opening a malicious FBX file that may exploit a stack buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior which may lead to code execution. | [] |
|
GHSA-rqgm-57h6-qgc4 | A vulnerability was found in itsourcecode Society Management System 1.0 and classified as critical. This issue affects some unknown processing of the file check_student.php. The manipulation of the argument student_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272615. | [] |
|
GHSA-8mq7-j2hp-g76j | The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash. | [] |
|
GHSA-vjvq-rcqj-pwvp | Race Condition within a Thread in GitHub repository it-novum/openitcockpit prior to 4.6.5. | [] |
|
CVE-2018-17175 | In the marshmallow library before 2.15.1 and 3.x before 3.0.0b9 for Python, the schema "only" option treats an empty list as implying no "only" option, which allows a request that was intended to expose no fields to instead expose all fields (if the schema is being filtered dynamically using the "only" option, and there is a user role that produces an empty value for "only"). | [
"cpe:2.3:a:marshmallow_project:marshmallow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:marshmallow_project:marshmallow:*:*:*:*:*:python:*:*"
] |
|
CVE-2005-3782 | Mac OS X 10.4.3 up to 10.4.6, when loginwindow uses the "Name and password" setting, and the "Show the Restart, Sleep, and Shut Down buttons" option is disabled, allows users with physical access to bypass login and reboot the system by entering ">restart", ">power", or ">shutdown" sequences after the username. | [
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*"
] |
|
CVE-2024-37004 | Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software | A maliciously crafted SLDPRT file, when parsed in ASMKERN229A.dll through Autodesk applications, can cause a use-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process. | [
"cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*"
] |
GHSA-fh94-5622-c6w9 | Clearswift MAILsweeper for SMTP 4.3.6 SP1 does not execute custom "on strip unsuccessful" hooks, which allows remote attackers to bypass e-mail attachment filtering policies via an attachment that MAILsweeper can detect but not remove. | [] |
|
GHSA-7vgj-gmp4-h3w6 | Security Onion Solutions Squert version 1.0.1 through 1.6.7 contains a CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) vulnerability in .inc/callback.php that can result in execution of OS Commands. This attack appear to be exploitable via Web request to .inc/callback.php with the payload in the txdata parameter, used in tx()/transcript(), or the catdata parameter, used in cat(). This vulnerability appears to have been fixed in 1.7.0. | [] |
|
GHSA-j5rq-2wvx-qqx4 | There is an Out-of-bounds read vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service availability. | [] |
|
GHSA-g3w3-x2xj-4585 | admin/functions/remote.php in Interspire Email Marketer through 6.1.6 has Server Side Request Forgery (SSRF) via a what=importurl&url= request with an http or https URL. This also allows reading local files with a file: URL. | [] |
|
CVE-2006-2314 | PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications that use multibyte encodings that allow the "\" (backslash) byte 0x5c to be the trailing byte of a multibyte character, such as SJIS, BIG5, GBK, GB18030, and UHC, which cannot be handled correctly by a client that does not understand multibyte encodings, aka a second variant of "Encoding-Based SQL Injection." NOTE: it could be argued that this is a class of issue related to interaction errors between the client and PostgreSQL, but a CVE has been assigned since PostgreSQL is treating this as a preventative measure against this class of problem. | [
"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-27381 | A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP3). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds read past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12534) | [
"cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*"
] |
|
GHSA-2ff4-qhx5-wwhw | SysJust Syuan-Gu-Da-Shih, versions before 20191223, contain vulnerability of Request Forgery, allowing attackers to launch inquiries into network architecture or system files of the server via forged inquests. | [] |
|
CVE-2015-0142 | IBM OpenPages GRC Platform 6.2 before IF7, 6.2.1 before 6.2.1.1 IF5, 7.0 before FP4, and 7.1 before FP1 allows remote authenticated users to cause a denial of service (maintenance-mode transition and data-storage outage) by calling the System Administration Mode function. | [
"cpe:2.3:a:ibm:openpages_grc_platform:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:openpages_grc_platform:6.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:openpages_grc_platform:6.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:openpages_grc_platform:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:openpages_grc_platform:7.1.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-5646 | Cybozu Garoon 3.x through 3.7.5 and 4.x through 4.0.3 allows remote authenticated users to execute arbitrary PHP code via unspecified vectors, aka CyVDB-863 and CyVDB-867. | [
"cpe:2.3:a:cybozu:garoon:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-3h7c-hj44-qv97 | Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6068, CVE-2015-6072, CVE-2015-6075, CVE-2015-6077, CVE-2015-6079, CVE-2015-6080, and CVE-2015-6082. | [] |
|
GHSA-99r9-958v-rr3x | Directory traversal vulnerability in the partition2 function in mochiweb_util.erl in MochiWeb before 2.4.0, as used in Apache CouchDB before 1.0.4, 1.1.x before 1.1.2, and 1.2.x before 1.2.1, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the default URI. | [] |
|
GHSA-249h-cc9x-grm3 | In OSSEC-HIDS 2.7 through 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client. | [] |
|
GHSA-m4rh-gx48-v325 | PHP Scripts Mall Basic B2B Script 2.0.9 has has directory traversal via a direct request for a listing of an image directory such as an uploads/ directory. | [] |
|
CVE-2024-4299 | HGiga iSherlock - Command Injection | The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability for Command Injection attacks, enabling execution of arbitrary system commands. | [
"cpe:2.3:a:hgiga:isherlock:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hgiga:isherlock:5.5:*:*:*:*:*:*:*"
] |
GHSA-j8cg-rhp6-hmp5 | A cross-site scripting (XSS) vulnerability in Arris NVG443B 9.3.0h3d36 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request sent to /cgi-bin/logs.ha. | [] |
|
GHSA-v95v-gpw2-p7pv | Cross-Site Request Forgery (CSRF) vulnerability in Nose Graze Novelist.This issue affects Novelist: from n/a through 1.2.2. | [] |
|
CVE-2005-0061 | The kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*"
] |
|
CVE-2008-2309 | Incomplete blacklist vulnerability in CoreTypes in Apple Mac OS X before 10.5.4 allows user-assisted remote attackers to execute arbitrary code via a (1) .xht or (2) .xhtm file, which does not trigger a "potentially unsafe" warning message in (a) the Download Validation feature in Mac OS X 10.4 or (b) the Quarantine feature in Mac OS X 10.5. | [
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*"
] |
|
GHSA-j448-j653-r3vj | Apache Tomcat is vulnerable to HTTP request-smuggling | Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090. | [] |
CVE-2023-25531 | NVIDIA DGX H100 BMC contains a vulnerability in IPMI, where an attacker may cause insufficient protection of credentials. A successful exploit of this vulnerability may lead to code execution, denial of service, information disclosure, and escalation of privileges. | [
"cpe:2.3:a:nvidia:dgx_h100_bmc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:dgx_h100_firmware:*:*:*:*:bmc:*:*:*",
"cpe:2.3:h:nvidia:dgx_h100:-:*:*:*:*:*:*:*"
] |
|
GHSA-4cg7-vxw6-h39q | Cross-site scripting (XSS) vulnerability in js/window.php in the Navis DocumentCloud plugin before 0.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter. | [] |
|
GHSA-2xwg-c668-f9x5 | Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization.
For more information about these vulnerabilities, see the Details section of this advisory. | [] |
|
CVE-2021-27599 | SAP NetWeaver ABAP Server and ABAP Platform (Process Integration - Integration Builder Framework), versions - 7.10, 7.30, 7.31, 7.40, 7.50, allows an attacker to access information under certain conditions, which would otherwise be restricted. | [
"cpe:2.3:a:sap:netweaver_process_integration:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_process_integration:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_process_integration:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_process_integration:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_process_integration:7.50:*:*:*:*:*:*:*"
] |
|
CVE-2007-3597 | Session fixation vulnerability in Zen Cart 1.3.7 and earlier allows remote attackers to hijack web sessions by setting the Cookie parameter. | [
"cpe:2.3:a:zen_cart:zen_cart:*:*:*:*:*:*:*:*"
] |
|
GHSA-rqqx-p675-v2r9 | Information Disclosure vulnerability in McAfee Advanced Threat Defense (ATD prior to 4.8 allows remote authenticated attackers to gain access to the atduser credentials via carefully constructed GET request extracting insecurely information stored in the database. | [] |
|
CVE-2024-38293 | ALCASAR before 3.6.1 allows CSRF and remote code execution in activity.php. | [
"cpe:2.3:o:alcasar:alcasar:*:*:*:*:*:*:*:*"
] |
Subsets and Splits