id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2024-42060 | A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V4.16 through V5.38, and USG20(W)-VPN series firmware versions from V4.16 through V5.38 could allow an authenticated attacker with administrator privileges to execute some OS commands on an affected device by uploading a crafted internal user agreement file to the vulnerable device. | [
"cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_50ax_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_100ax:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*"
] |
|
GHSA-j6c8-vggw-4c3v | The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password. | [] |
|
GHSA-56f8-g68r-j699 | Cross-site Scripting in Apache Struts | Multiple Cross-Site Scripting (XSS) in XWork generated error pages in Apache Struts. By default, XWork doesn't escape action's names in automatically generated error page, allowing for a successful XSS attack. When Dynamic Method Invocation (DMI) is enabled, the action name is generated dynamically base on request parameters. This allows to call non-existing page and method to produce error page with injected code as below. As of Struts 2.2.3 the action names are escaped when automatically generated error pages are rendered. | [] |
GHSA-qvw2-4h5w-2c5p | Qaelum DOSE 18.08 through 21.1 before 21.2 allows Directory Traversal via the loadimages name parameter. It allows a user to specify an arbitrary location on the server's filesystem from which to load an image. (Only images are displayed to the attacker. All other files are loaded but not displayed.) The Content-Type response header reflects the actual content type of the file being requested. This allows an attacker to enumerate files on the local system. Additionally, remote resources can be requested via a UNC path, allowing an attacker to coerce authentication out from the server to the attackers machine. | [] |
|
GHSA-p9hv-xq9j-wp64 | Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Table privilege with network access via Oracle Net to compromise Core RDBMS. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Core RDBMS. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L). | [] |
|
CVE-2008-4630 | Multiple unspecified vulnerabilities in Midgard Components (MidCOM) Framework before 8.09.1 have unknown impact and attack vectors. | [
"cpe:2.3:a:midgard:midgard_components_framework:2.9:beta16-beta:*:*:*:*:*:*",
"cpe:2.3:a:midgard:midgard_components_framework:2.9:beta17:*:*:*:*:*:*",
"cpe:2.3:a:midgard:midgard_components_framework:8.09.0:*:*:*:*:*:*:*",
"cpe:2.3:a:midgard:midgard_components_framework:8.09.0:beta1-beta:*:*:*:*:*:*",
"cpe:2.3:a:midgard:midgard_components_framework:8.09.0:beta2-beta:*:*:*:*:*:*",
"cpe:2.3:a:midgard:midgard_components_framework:8.09.0:rc_beta:*:*:*:*:*:*",
"cpe:2.3:a:midgard:midgard_components_framework:8.09.0:rc2_beta:*:*:*:*:*:*"
] |
|
CVE-2023-3379 | WAGO: Improper Privilege Management in web-based management | Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges. | [
"cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc100_firmware:22:patch_1:*:*:*:*:*:*",
"cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc200_firmware:22:patch_1:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:pfc200_firmware:24:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*"
] |
GHSA-63h6-phpf-qj3f | Adobe Digital Editions versions 4.5.4 and earlier contain an insecure library loading vulnerability. The vulnerability is due to unsafe library loading of editor control library functions in the installer plugin. A successful exploitation could lead to arbitrary code execution. | [] |
|
CVE-2024-56720 | bpf, sockmap: Several fixes to bpf_msg_pop_data | In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Several fixes to bpf_msg_pop_data
Several fixes to bpf_msg_pop_data,
1. In sk_msg_shift_left, we should put_page
2. if (len == 0), return early is better
3. pop the entire sk_msg (last == msg->sg.size) should be supported
4. Fix for the value of variable "a"
5. In sk_msg_shift_left, after shifting, i has already pointed to the next
element. Addtional sk_msg_iter_var_next may result in BUG. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-w5jc-xfq4-97p3 | A vulnerability was found in code-projects E-Health Care System 1.0 and classified as critical. This issue affects some unknown processing of the file /Doctor/chat.php. The manipulation of the argument name/message leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "name" to be affected. But it must be assumed that the parameter "message" is affected as well. | [] |
|
CVE-2024-42176 | HCL MyXalytics is affected by concurrent login vulnerability | HCL MyXalytics is affected by concurrent login vulnerability. A concurrent login vulnerability occurs when simultaneous active sessions are allowed for a single credential allowing an attacker to potentially obtain access to a user's account or sensitive information. | [] |
CVE-2008-7258 | The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usability problem for senders of messages with certain long lines, and has no security impact | [
"cpe:2.3:a:anibal_monsalve_salaz:ssmtp:2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:anibal_monsalve_salaz:ssmtp:2.62:*:*:*:*:*:*:*"
] |
|
CVE-2017-0064 | A security feature bypass vulnerability exists in Internet Explorer that allows for bypassing Mixed Content warnings, aka "Internet Explorer Security Feature Bypass Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] |
|
CVE-2019-10679 | Thomson Reuters Eikon 4.0.42144 allows all local users to modify the service executable file because of weak %PROGRAMFILES(X86)%\Thomson Reuters\Eikon permissions. | [
"cpe:2.3:a:thomsonreuters:eikon:4.0.42144:*:*:*:*:*:*:*"
] |
|
GHSA-c6gj-jrcc-q2j8 | Windows Digital Media Elevation of Privilege Vulnerability | [] |
|
CVE-2024-2430 | Website Content in Page or Post < 2024.04.09 - Contributor+ Stored Cross-Site Scripting | The Website Content in Page or Post WordPress plugin before 2024.04.09 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | [
"cpe:2.3:a:matteoenna:website_content_in_page_or_post:*:*:*:*:*:*:*:*",
"cpe:2.3:a:matteoenna:website_content_in_page_or_post:*:*:*:*:*:wordpress:*:*"
] |
CVE-2018-0529 | Cybozu Office 10.0.0 to 10.7.0 allows remote attackers to cause a denial of service via unspecified vectors. | [
"cpe:2.3:a:cybozu:office:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-27801 | A heap-based buffer over-read was discovered in the get_le64 function in bele.h in UPX 4.0.0 via a crafted Mach-O file. | [
"cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-cggh-pq45-6h9x | llhttp vulnerable to HTTP request smuggling | The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20 | [] |
CVE-2024-35200 | NGINX HTTP/3 QUIC vulnerability | When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate. | [
"cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:nginx:1.25.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] |
GHSA-xqrh-6pmp-4rgf | Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba. | [] |
|
GHSA-vfw4-vqmx-jfwg | A remote SQL injection web vulnerability was discovered in the Enigma NMS 65.0.0 and prior web application that allows an attacker to execute SQL commands to expose and compromise the web server, expose database tables and values, and potentially execute system-based commands as the mysql user. This affects the search_pattern value of the manage_hosts_short.cgi script. | [] |
|
GHSA-q837-4wvg-jx7g | In malidp_mw_connector_reset, new memory is allocated with kzalloc, but
no check is performed. In order to prevent null pointer dereferencing,
ensure that mw_state is checked before calling
__drm_atomic_helper_connector_reset. | [] |
|
CVE-2023-6887 | saysky ForestBlog Image Upload img unrestricted upload | A vulnerability classified as critical has been found in saysky ForestBlog up to 20220630. This affects an unknown part of the file /admin/upload/img of the component Image Upload Handler. The manipulation of the argument filename leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248247. | [
"cpe:2.3:a:forestblog_project:forestblog:*:*:*:*:*:*:*:*"
] |
GHSA-3gmx-3pqv-qcgj | ZTE's MF297D product has cryptographic issues vulnerability. Due to the use of weak random values, the security of the device is reduced, and it may face the risk of attack. | [] |
|
GHSA-w5qq-942r-62hc | The SMB client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote SMB servers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Response Parsing Vulnerability." | [] |
|
GHSA-mhfv-8rc9-w38c | Arbitrary shell execution | Uses of shell_exec() and exec() were not escaping filenames and configuration settings in most cases | [] |
GHSA-hw2c-7w6f-7v7f | A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences. | [] |
|
GHSA-hgc2-p5rv-xww2 | System command injection through Netflow function due to improper input validation, allowing attackers to execute arbitrary system commands. This issue affects Pandora FMS: from 700 through <777. | [] |
|
GHSA-mff5-wxc7-9wqp | In ihevcd_parse_buffering_period_sei of ihevcd_parse_headers.c in Android 8.0, 8.1 and 9, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. | [] |
|
CVE-2021-20622 | Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors. | [
"cpe:2.3:o:aterm:wg2600hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg2600hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aterm:wg2600hp2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aterm:wg2600hp2:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-31095 | WordPress Thumbs Rating plugin <= 5.1.0 - Insecure Direct Object References (IDOR) vulnerability | Authorization Bypass Through User-Controlled Key vulnerability in Ricard Torres Thumbs Rating.This issue affects Thumbs Rating: from n/a through 5.1.0.
| [
"cpe:2.3:a:richard_torres:thumbs_rating:*:*:*:*:*:*:*:*"
] |
CVE-2023-41304 | Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window. | [
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-586h-g9g3-585q | In audio DSP, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05844413; Issue ID: ALPS05844413. | [] |
|
CVE-2016-0749 | The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow. | [
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:scientific_computing:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:scientific_computing:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:spice_project:spice:-:*:*:*:*:*:*:*"
] |
|
GHSA-v242-mgpw-8jrg | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: JSF). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L). | [] |
|
CVE-2004-2704 | Hastymail 1.0.1 and earlier (stable) and 1.1 and earlier (development) does not send the "attachment" parameter in the Content-Disposition field for attachments, which causes the attachment to be rendered inline by Internet Explorer when the victim clicks the download link, which facilitates cross-site scripting (XSS) and possibly other attacks. | [
"cpe:2.3:a:hastymail:hastymail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-10410 | Jenkins Log Parser Plugin 2.0 and earlier did not escape an error message, resulting in a cross-site scripting vulnerability exploitable by users able to define log parsing rules. | [
"cpe:2.3:a:jenkins:log_parser:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-8c4h-x48p-mg38 | The Advanced Floating Content plugin for WordPress is vulnerable to SQL Injection via the 'floating_content_duplicate_post' function in all versions up to, and including, 3.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] |
|
CVE-2020-13845 | Sylabs Singularity 3.0 through 3.5 has Improper Validation of an Integrity Check Value. Image integrity is not validated when an ECL policy is enforced. The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature. | [
"cpe:2.3:a:sylabs:singularity:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-9030 | CodeCanyon CRMGo SaaS note cross site scripting | A vulnerability classified as problematic was found in CodeCanyon CRMGo SaaS 7.2. This vulnerability affects unknown code of the file /deal/{note_id}/note. The manipulation of the argument notes leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:codecanyon:crmgo_saas:*:*:*:*:*:*:*:*",
"cpe:2.3:a:workdo:crmgo_saas:7.2:*:*:*:*:*:*:*"
] |
GHSA-h24w-g94h-5fxf | In gatt_dbg_op_name of gatt_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260079141 | [] |
|
GHSA-6fx2-mw65-fcxv | Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow. | [] |
|
GHSA-pxmj-v2v3-474h | Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor. | [] |
|
GHSA-q26w-r8v9-32wv | Cross-site scripting (XSS) vulnerability in search.php in MYRE Business Directory allows remote attackers to inject arbitrary web script or HTML via the look parameter. | [] |
|
CVE-2019-25150 | The Email Templates plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.3. This makes it possible for attackers to present phishing forms or conduct cross-site request forgery attacks against site administrators. | [
"cpe:2.3:a:wpexperts:email_templates:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-pfhm-wwqj-c296 | A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session. | [] |
|
CVE-2024-29089 | WordPress Restaurant Menu and Food Ordering plugin <= 2.4.14 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Five Star Plugins Five Star Restaurant Menu allows Stored XSS.This issue affects Five Star Restaurant Menu: from n/a through 2.4.14.
| [] |
GHSA-xvf8-4rmq-w4c4 | This affects all versions of package s3-kilatstorage. | [] |
|
GHSA-g4xv-f6gh-pr93 | A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Ventura 13.2.1. An app may be able to observe unprotected user data.. | [] |
|
CVE-2024-9226 | Landing Page Cat – Coming Soon Page, Maintenance Page & Squeeze Pages <= 1.7.6 - Reflected Cross-Site Scripting | The Landing Page Cat – Coming Soon Page, Maintenance Page & Squeeze Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.7.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
GHSA-mpg9-jggg-ww84 | A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. | [] |
|
GHSA-9896-7c2v-5wqc | FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font. | [] |
|
CVE-2020-35656 | Jaws through 1.8.0 allows remote authenticated administrators to execute arbitrary code via crafted use of admin.php?reqGadget=Components&reqAction=InstallGadget&comp=FileBrowser and admin.php?reqGadget=FileBrowser&reqAction=Files to upload a .php file. NOTE: this is unrelated to the JAWS (aka Job Access With Speech) product. | [
"cpe:2.3:a:jaws_project:jaws:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-20714 | Directory traversal vulnerability in WP Fastest Cache versions prior to 0.9.1.7 allows a remote attacker with administrator privileges to delete arbitrary files on the server via unspecified vectors. | [
"cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-rcmq-ww8v-3mxm | It was found that the Karaf container used by Red Hat JBoss Fuse 6.x, and Red Hat JBoss A-MQ 6.x, deserializes objects passed to MBeans via JMX operations. An attacker could use this flaw to execute remote code on the server as the user running the Java Virtual Machine if the target MBean contain deserialization gadgets in its classpath. | [] |
|
CVE-2017-7128 | An issue was discovered in certain Apple products. iOS before 11 is affected. macOS before 10.13 is affected. tvOS before 11 is affected. watchOS before 4 is affected. The issue involves the third-party "SQLite" product. Versions before 3.19.3 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-40405 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1. An app may be able to read sensitive location information. | [
"cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*"
] |
|
GHSA-wpqf-pc7w-358f | A remote unauthenticated user can execute commands as root in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to proxy.cgi. | [] |
|
CVE-2020-14515 | CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected. | [
"cpe:2.3:a:wibu:codemeter:*:*:*:*:*:*:*:*"
] |
|
GHSA-vw27-f5gg-gq3j | An issue was discovered in fastadmin 1.0.0.20190705_beta. There is a public/index.php/admin/auth/admin/add CSRF vulnerability. | [] |
|
GHSA-5v48-vw43-jxw9 | PHP remote file inclusion vulnerability in index.php in Josh Schmidt WikyBlog 1.2.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the includeDir parameter. | [] |
|
CVE-2020-23639 | A command injection vulnerability exists in Moxa Inc VPort 461 Series Firmware Version 3.4 or lower that could allow a remote attacker to execute arbitrary commands in Moxa's VPort 461 Series Industrial Video Servers. | [
"cpe:2.3:o:moxa:vport_461_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_461:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-50106 | nfsd: fix race between laundromat and free_stateid | In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix race between laundromat and free_stateid
There is a race between laundromat handling of revoked delegations
and a client sending free_stateid operation. Laundromat thread
finds that delegation has expired and needs to be revoked so it
marks the delegation stid revoked and it puts it on a reaper list
but then it unlock the state lock and the actual delegation revocation
happens without the lock. Once the stid is marked revoked a racing
free_stateid processing thread does the following (1) it calls
list_del_init() which removes it from the reaper list and (2) frees
the delegation stid structure. The laundromat thread ends up not
calling the revoke_delegation() function for this particular delegation
but that means it will no release the lock lease that exists on
the file.
Now, a new open for this file comes in and ends up finding that
lease list isn't empty and calls nfsd_breaker_owns_lease() which ends
up trying to derefence a freed delegation stateid. Leading to the
followint use-after-free KASAN warning:
kernel: ==================================================================
kernel: BUG: KASAN: slab-use-after-free in nfsd_breaker_owns_lease+0x140/0x160 [nfsd]
kernel: Read of size 8 at addr ffff0000e73cd0c8 by task nfsd/6205
kernel:
kernel: CPU: 2 UID: 0 PID: 6205 Comm: nfsd Kdump: loaded Not tainted 6.11.0-rc7+ #9
kernel: Hardware name: Apple Inc. Apple Virtualization Generic Platform, BIOS 2069.0.0.0.0 08/03/2024
kernel: Call trace:
kernel: dump_backtrace+0x98/0x120
kernel: show_stack+0x1c/0x30
kernel: dump_stack_lvl+0x80/0xe8
kernel: print_address_description.constprop.0+0x84/0x390
kernel: print_report+0xa4/0x268
kernel: kasan_report+0xb4/0xf8
kernel: __asan_report_load8_noabort+0x1c/0x28
kernel: nfsd_breaker_owns_lease+0x140/0x160 [nfsd]
kernel: nfsd_file_do_acquire+0xb3c/0x11d0 [nfsd]
kernel: nfsd_file_acquire_opened+0x84/0x110 [nfsd]
kernel: nfs4_get_vfs_file+0x634/0x958 [nfsd]
kernel: nfsd4_process_open2+0xa40/0x1a40 [nfsd]
kernel: nfsd4_open+0xa08/0xe80 [nfsd]
kernel: nfsd4_proc_compound+0xb8c/0x2130 [nfsd]
kernel: nfsd_dispatch+0x22c/0x718 [nfsd]
kernel: svc_process_common+0x8e8/0x1960 [sunrpc]
kernel: svc_process+0x3d4/0x7e0 [sunrpc]
kernel: svc_handle_xprt+0x828/0xe10 [sunrpc]
kernel: svc_recv+0x2cc/0x6a8 [sunrpc]
kernel: nfsd+0x270/0x400 [nfsd]
kernel: kthread+0x288/0x310
kernel: ret_from_fork+0x10/0x20
This patch proposes a fixed that's based on adding 2 new additional
stid's sc_status values that help coordinate between the laundromat
and other operations (nfsd4_free_stateid() and nfsd4_delegreturn()).
First to make sure, that once the stid is marked revoked, it is not
removed by the nfsd4_free_stateid(), the laundromat take a reference
on the stateid. Then, coordinating whether the stid has been put
on the cl_revoked list or we are processing FREE_STATEID and need to
make sure to remove it from the list, each check that state and act
accordingly. If laundromat has added to the cl_revoke list before
the arrival of FREE_STATEID, then nfsd4_free_stateid() knows to remove
it from the list. If nfsd4_free_stateid() finds that operations arrived
before laundromat has placed it on cl_revoke list, it marks the state
freed and then laundromat will no longer add it to the list.
Also, for nfsd4_delegreturn() when looking for the specified stid,
we need to access stid that are marked removed or freeable, it means
the laundromat has started processing it but hasn't finished and this
delegreturn needs to return nfserr_deleg_revoked and not
nfserr_bad_stateid. The latter will not trigger a FREE_STATEID and the
lack of it will leave this stid on the cl_revoked list indefinitely. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*"
] |
GHSA-p38f-rq68-j3c6 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in StylemixThemes Masterstudy Elementor Widgets, StylemixThemes Consulting Elementor Widgets.This issue affects Masterstudy Elementor Widgets: from n/a through 1.2.2; Consulting Elementor Widgets: from n/a through 1.3.0. | [] |
|
CVE-2023-5638 | The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wcj_image' shortcode in versions up to, and including, 7.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-7m5q-w7p8-x8h4 | An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host. | [] |
|
GHSA-jxh7-q7rm-43ww | Ubuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This is reachable via the SetLanguage dbus function. This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1. | [] |
|
CVE-2021-46794 | Insufficient bounds checking in ASP (AMD Secure
Processor) may allow for an out of bounds read in SMI (System Management
Interface) mailbox checksum calculation triggering a data abort, resulting in a
potential denial of service.
| [
"cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5700x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x3d_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5800x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5900x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5945wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5950x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5955wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5965wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5965wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5975wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5995wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3100_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3300x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3500x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3600xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3800xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3900xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3950x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_1200_\\(af\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_1600_\\(af\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2200g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200g_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200g_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200g_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2200ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2200ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2300x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2300x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2300x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2400g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400g_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400g_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400g_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2400ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2400ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2500x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2500x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2500x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600e_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2600e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600e_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600e_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600e_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2600x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700e_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700e_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700e_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700e_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2700x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2920x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2920x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2920x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2920x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2950x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2950x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2950x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2970wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2970wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2970wx_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2970wx_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2970wx_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2990wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_2990wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2990wx_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2990wx_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_2990wx_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_pro_2100ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150g_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150g_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150ge_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_gold_3150ge_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_silver_3050ge_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_silver_3050ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_silver_3050ge_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*"
] |
|
GHSA-xp6r-hhmh-jgfj | Multiple unspecified vulnerabilities in phpns before 2.1.1beta1 have unknown impact and attack vectors. | [] |
|
GHSA-482j-2x2c-wwqf | A vulnerability was found in SourceCodester House Rental Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file manage_user.php of the component Edit User. The manipulation of the argument id/name/username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250610 is the identifier assigned to this vulnerability. | [] |
|
GHSA-6h4r-4p84-m69q | Milesight IP security cameras through 2016-11-14 have a default root password in /etc/shadow that is the same across different customers' installations. | [] |
|
CVE-2025-2166 | CM FAQ – Simplify support with an intuitive FAQ management tool <= 1.2.5 - Reflected Cross-Site Scripting | The CM FAQ – Simplify support with an intuitive FAQ management tool plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
GHSA-g58x-57fv-86jh | Jenkins Google Login Plugin non-constant time token comparison | Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token. | [] |
GHSA-pvw6-vc2c-x7v5 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
CVE-2016-5663 | Multiple cross-site scripting (XSS) vulnerabilities in oauth_callback.php on Accellion Kiteworks appliances before kw2016.03.00 allow remote attackers to inject arbitrary web script or HTML via the (1) code, (2) error, or (3) error_description parameter. | [
"cpe:2.3:a:accellion:kiteworks_appliance:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-2627 | KiviCare Management System < 3.2.1 - Subscriber+ Unauthorised AJAX Calls | The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Admin/Doctors/etc and update plugin's settings | [
"cpe:2.3:a:iqonic:kivicare:*:*:*:*:*:wordpress:*:*"
] |
CVE-2019-6204 | A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, Safari 12.1. Enabling the Safari Reader feature on a maliciously crafted webpage may lead to universal cross site scripting. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-9jmp-7pgh-x746 | Cross-Site Request Forgery (CSRF) vulnerability in TannerRitchie Web Applications/DancePress DancePress (TRWA) allows Cross Site Request Forgery.This issue affects DancePress (TRWA): from n/a through 3.1.11. | [] |
|
CVE-2023-4139 | The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Sensitive Information Exposure via Directory Listing due to missing restriction in export folder indexing in versions up to, and including, 7.9.8. This makes it possible for unauthenticated attackers to list and view exported files. | [
"cpe:2.3:a:smackcoders:wp_ultimate_csv_importer:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2022-20414 | In setImpl of AlarmManagerService.java, there is a possible way to put a device into a boot loop due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234441463 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
GHSA-rf37-cmcm-645m | A vulnerability in Trend Micro Apex One on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected. | [] |
|
GHSA-vq5r-72cr-7jvc | OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e20a0. | [] |
|
GHSA-p772-97pf-8hmx | An Uncontrolled Search Path Element issue was discovered in AzeoTech DAQFactory versions prior to 17.1. An uncontrolled search path element vulnerability has been identified, which may execute malicious DLL files that have been placed within the search path. | [] |
|
GHSA-3rfh-9f52-4ppx | Cross-site Scripting (XSS) - Stored in GitHub repository orchardcms/orchardcore prior to 1.2.2. | [] |
|
CVE-2009-3341 | Buffer overflow on the Linksys WRT54GL wireless router allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.10 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. | [
"cpe:2.3:h:linksys:wrt54gl:*:*:*:*:*:*:*:*"
] |
|
GHSA-742w-p6j3-fcr9 | Multiple SQL injection vulnerabilities in PEARLINGER Pearl Forums 2.4 allow remote attackers to execute arbitrary SQL commands via the (1) forumsId and (2) topicId parameters in index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
CVE-2021-24908 | Check & Log Email < 1.0.4 - Reflected Cross-Site Scripting | The Check & Log Email WordPress plugin before 1.0.4 does not escape the d parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting | [
"cpe:2.3:a:wpchill:check_\\&_log_email:*:*:*:*:*:wordpress:*:*"
] |
CVE-2013-4656 | Symlink Traversal vulnerability in ASUS RT-AC66U and RT-N56U due to misconfiguration in the SMB service. | [
"cpe:2.3:o:asus:rt-ac66u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rt-n56u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*"
] |
|
GHSA-c9h9-p9fc-97p7 | In the Store Commander scexportcustomers module for PrestaShop through 3.6.1, sensitive SQL calls can be executed with a trivial HTTP request and exploited to forge a blind SQL injection. | [] |
|
CVE-2025-24481 | FactoryTalk® View Site Edition - Incorrect Permission Assignment | An Incorrect Permission Assignment Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect permissions being assigned to the remote debugger port and can allow for unauthenticated access to the system configuration. | [] |
GHSA-f57v-94h6-44v7 | tecrail Responsive FileManager 9.13.4 allows remote attackers to write to an arbitrary image file (jpg/jpeg/png) via path traversal with the path parameter, through the save_img action in ajax_calls.php. | [] |
|
GHSA-qg93-v358-g553 | Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764. | [] |
|
GHSA-qg7w-94j3-mr4j | A SQL injection vulnerability in interface/main/finder/patient_select.php from library/patient.inc in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the searchFields parameter. | [] |
|
GHSA-56c2-3f8f-2pfq | An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8208. | [] |
|
CVE-2021-33337 | Cross-site scripting (XSS) vulnerability in the Document Library module's add document menu in Liferay Portal 7.3.0 through 7.3.4, and Liferay DXP 7.1 before fix pack 20, and 7.2 before fix pack 9, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_document_library_web_portlet_DLAdminPortlet_name parameter. | [
"cpe:2.3:a:liferay:dxp:7.1:-:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_1:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_10:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_11:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_12:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_13:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_14:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_15:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_16:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_17:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_18:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_19:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_2:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_3:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_4:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_5:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_6:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_7:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_8:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_9:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:-:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_1:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_2:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_3:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_4:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_5:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_6:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_7:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_8:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-1734 | Streams HTTP wrapper does not fail for headers with invalid name and no colon | In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers. | [] |
GHSA-m9jx-h2qw-h5qj | concrete5 before 5.6.3 allows remote attackers to obtain the installation path via a direct request to (1) system/basics/editor.php, (2) system/view.php, (3) system/environment/file_storage_locations.php, (4) system/mail/importers.php, (5) system/mail/method.php, (6) system/permissions/file_types.php, (7) system/permissions/files.php, (8) system/permissions/tasks.php, (9) system/permissions/users.php, (10) system/seo/view.php, (11) view.php, (12) users/attributes.php, (13) scrapbook/view.php, (14) pages/attributes.php, (15) files/attributes.php, or (16) files/search.php in single_pages/dashboard/. | [] |
|
GHSA-76xj-3v79-3jwj | A vulnerability classified as critical has been found in TOTOLINK N200RE V5 9.3.5u.6437_B20230519. This affects the function Validity_check. The manipulation leads to format string. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238635. | [] |
|
CVE-2024-9445 | Display Medium Posts <= 5.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via display_medium_posts Shortcode | The Display Medium Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's display_medium_posts shortcode in all versions up to, and including, 5.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:acekyd:display_medium_posts:*:*:*:*:*:wordpress:*:*"
] |
Subsets and Splits