Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2024-42060
A post-authentication command injection vulnerability in Zyxel ATP series firmware versions from V4.32 through V5.38, USG FLEX series firmware versions from V4.50 through V5.38, USG FLEX 50(W) series firmware versions from V4.16 through V5.38, and USG20(W)-VPN series firmware versions from V4.16 through V5.38 could allow an authenticated attacker with administrator privileges to execute some OS commands on an affected device by uploading a crafted internal user agreement file to the vulnerable device.
[ "cpe:2.3:o:zyxel:atp100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp100w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:atp800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_100ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_100h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_100w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_200h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_500h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_50ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_700h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg20w-vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:usg_flex_50w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:zyxel:zld:*:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp100:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp100w:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp200:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp500:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp700:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:atp800:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_100:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_100ax:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_100w:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_200:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_50:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_500:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_700:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_flex_50w:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:usg_20w-vpn:-:*:*:*:*:*:*:*" ]
GHSA-j6c8-vggw-4c3v
The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.
[]
GHSA-56f8-g68r-j699
Cross-site Scripting in Apache Struts
Multiple Cross-Site Scripting (XSS) in XWork generated error pages in Apache Struts. By default, XWork doesn't escape action's names in automatically generated error page, allowing for a successful XSS attack. When Dynamic Method Invocation (DMI) is enabled, the action name is generated dynamically base on request parameters. This allows to call non-existing page and method to produce error page with injected code as below. As of Struts 2.2.3 the action names are escaped when automatically generated error pages are rendered.
[]
GHSA-qvw2-4h5w-2c5p
Qaelum DOSE 18.08 through 21.1 before 21.2 allows Directory Traversal via the loadimages name parameter. It allows a user to specify an arbitrary location on the server's filesystem from which to load an image. (Only images are displayed to the attacker. All other files are loaded but not displayed.) The Content-Type response header reflects the actual content type of the file being requested. This allows an attacker to enumerate files on the local system. Additionally, remote resources can be requested via a UNC path, allowing an attacker to coerce authentication out from the server to the attackers machine.
[]
GHSA-p9hv-xq9j-wp64
Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Table privilege with network access via Oracle Net to compromise Core RDBMS. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Core RDBMS. CVSS 3.1 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L).
[]
CVE-2008-4630
Multiple unspecified vulnerabilities in Midgard Components (MidCOM) Framework before 8.09.1 have unknown impact and attack vectors.
[ "cpe:2.3:a:midgard:midgard_components_framework:2.9:beta16-beta:*:*:*:*:*:*", "cpe:2.3:a:midgard:midgard_components_framework:2.9:beta17:*:*:*:*:*:*", "cpe:2.3:a:midgard:midgard_components_framework:8.09.0:*:*:*:*:*:*:*", "cpe:2.3:a:midgard:midgard_components_framework:8.09.0:beta1-beta:*:*:*:*:*:*", "cpe:2.3:a:midgard:midgard_components_framework:8.09.0:beta2-beta:*:*:*:*:*:*", "cpe:2.3:a:midgard:midgard_components_framework:8.09.0:rc_beta:*:*:*:*:*:*", "cpe:2.3:a:midgard:midgard_components_framework:8.09.0:rc2_beta:*:*:*:*:*:*" ]
CVE-2023-3379
WAGO: Improper Privilege Management in web-based management
Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.
[ "cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc100_firmware:22:patch_1:*:*:*:*:*:*", "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc200_firmware:22:patch_1:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc200_firmware:24:*:*:*:*:*:*:*", "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*" ]
GHSA-63h6-phpf-qj3f
Adobe Digital Editions versions 4.5.4 and earlier contain an insecure library loading vulnerability. The vulnerability is due to unsafe library loading of editor control library functions in the installer plugin. A successful exploitation could lead to arbitrary code execution.
[]
CVE-2024-56720
bpf, sockmap: Several fixes to bpf_msg_pop_data
In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Several fixes to bpf_msg_pop_data Several fixes to bpf_msg_pop_data, 1. In sk_msg_shift_left, we should put_page 2. if (len == 0), return early is better 3. pop the entire sk_msg (last == msg->sg.size) should be supported 4. Fix for the value of variable "a" 5. In sk_msg_shift_left, after shifting, i has already pointed to the next element. Addtional sk_msg_iter_var_next may result in BUG.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-w5jc-xfq4-97p3
A vulnerability was found in code-projects E-Health Care System 1.0 and classified as critical. This issue affects some unknown processing of the file /Doctor/chat.php. The manipulation of the argument name/message leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory only mentions the parameter "name" to be affected. But it must be assumed that the parameter "message" is affected as well.
[]
CVE-2024-42176
HCL MyXalytics is affected by concurrent login vulnerability
HCL MyXalytics is affected by concurrent login vulnerability. A concurrent login vulnerability occurs when simultaneous active sessions are allowed for a single credential allowing an attacker to potentially obtain access to a user's account or sensitive information.
[]
CVE-2008-7258
The standardise function in Anibal Monsalve Salazar sSMTP 2.61 and 2.62 allows local users to cause a denial of service (application exit) via an e-mail message containing a long line that begins with a . (dot) character. NOTE: CVE disputes this issue because it is solely a usability problem for senders of messages with certain long lines, and has no security impact
[ "cpe:2.3:a:anibal_monsalve_salaz:ssmtp:2.61:*:*:*:*:*:*:*", "cpe:2.3:a:anibal_monsalve_salaz:ssmtp:2.62:*:*:*:*:*:*:*" ]
CVE-2017-0064
A security feature bypass vulnerability exists in Internet Explorer that allows for bypassing Mixed Content warnings, aka "Internet Explorer Security Feature Bypass Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*" ]
CVE-2019-10679
Thomson Reuters Eikon 4.0.42144 allows all local users to modify the service executable file because of weak %PROGRAMFILES(X86)%\Thomson Reuters\Eikon permissions.
[ "cpe:2.3:a:thomsonreuters:eikon:4.0.42144:*:*:*:*:*:*:*" ]
GHSA-c6gj-jrcc-q2j8
Windows Digital Media Elevation of Privilege Vulnerability
[]
CVE-2024-2430
Website Content in Page or Post < 2024.04.09 - Contributor+ Stored Cross-Site Scripting
The Website Content in Page or Post WordPress plugin before 2024.04.09 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
[ "cpe:2.3:a:matteoenna:website_content_in_page_or_post:*:*:*:*:*:*:*:*", "cpe:2.3:a:matteoenna:website_content_in_page_or_post:*:*:*:*:*:wordpress:*:*" ]
CVE-2018-0529
Cybozu Office 10.0.0 to 10.7.0 allows remote attackers to cause a denial of service via unspecified vectors.
[ "cpe:2.3:a:cybozu:office:*:*:*:*:*:*:*:*" ]
CVE-2020-27801
A heap-based buffer over-read was discovered in the get_le64 function in bele.h in UPX 4.0.0 via a crafted Mach-O file.
[ "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*" ]
GHSA-cggh-pq45-6h9x
llhttp vulnerable to HTTP request smuggling
The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20
[]
CVE-2024-35200
NGINX HTTP/3 QUIC vulnerability
When NGINX Plus or NGINX OSS are configured to use the HTTP/3 QUIC module, undisclosed HTTP/3 requests can cause NGINX worker processes to terminate.
[ "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*", "cpe:2.3:a:f5:nginx:1.25.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ]
GHSA-xqrh-6pmp-4rgf
Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
[]
GHSA-vfw4-vqmx-jfwg
A remote SQL injection web vulnerability was discovered in the Enigma NMS 65.0.0 and prior web application that allows an attacker to execute SQL commands to expose and compromise the web server, expose database tables and values, and potentially execute system-based commands as the mysql user. This affects the search_pattern value of the manage_hosts_short.cgi script.
[]
GHSA-q837-4wvg-jx7g
In malidp_mw_connector_reset, new memory is allocated with kzalloc, but no check is performed. In order to prevent null pointer dereferencing, ensure that mw_state is checked before calling __drm_atomic_helper_connector_reset.
[]
CVE-2023-6887
saysky ForestBlog Image Upload img unrestricted upload
A vulnerability classified as critical has been found in saysky ForestBlog up to 20220630. This affects an unknown part of the file /admin/upload/img of the component Image Upload Handler. The manipulation of the argument filename leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248247.
[ "cpe:2.3:a:forestblog_project:forestblog:*:*:*:*:*:*:*:*" ]
GHSA-3gmx-3pqv-qcgj
ZTE's MF297D product has cryptographic issues vulnerability. Due to the use of weak random values, the security of the device is reduced, and it may face the risk of attack.
[]
GHSA-w5qq-942r-62hc
The SMB client in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote SMB servers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Response Parsing Vulnerability."
[]
GHSA-mhfv-8rc9-w38c
Arbitrary shell execution
Uses of shell_exec() and exec() were not escaping filenames and configuration settings in most cases
[]
GHSA-hw2c-7w6f-7v7f
A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences.
[]
GHSA-hgc2-p5rv-xww2
System command injection through Netflow function due to improper input validation, allowing attackers to execute arbitrary system commands. This issue affects Pandora FMS: from 700 through <777.
[]
GHSA-mff5-wxc7-9wqp
In ihevcd_parse_buffering_period_sei of ihevcd_parse_headers.c in Android 8.0, 8.1 and 9, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.
[]
CVE-2021-20622
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
[ "cpe:2.3:o:aterm:wg2600hp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:aterm:wg2600hp:-:*:*:*:*:*:*:*", "cpe:2.3:o:aterm:wg2600hp2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:aterm:wg2600hp2:-:*:*:*:*:*:*:*" ]
CVE-2024-31095
WordPress Thumbs Rating plugin <= 5.1.0 - Insecure Direct Object References (IDOR) vulnerability
Authorization Bypass Through User-Controlled Key vulnerability in Ricard Torres Thumbs Rating.This issue affects Thumbs Rating: from n/a through 5.1.0.
[ "cpe:2.3:a:richard_torres:thumbs_rating:*:*:*:*:*:*:*:*" ]
CVE-2023-41304
Parameter verification vulnerability in the window module.Successful exploitation of this vulnerability may cause the size of an app window to be adjusted to that of a floating window.
[ "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*" ]
GHSA-586h-g9g3-585q
In audio DSP, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05844413; Issue ID: ALPS05844413.
[]
CVE-2016-0749
The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
[ "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:scientific_computing:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:scientific_computing:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:spice_project:spice:-:*:*:*:*:*:*:*" ]
GHSA-v242-mgpw-8jrg
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: JSF). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebLogic Server. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L).
[]
CVE-2004-2704
Hastymail 1.0.1 and earlier (stable) and 1.1 and earlier (development) does not send the "attachment" parameter in the Content-Disposition field for attachments, which causes the attachment to be rendered inline by Internet Explorer when the victim clicks the download link, which facilitates cross-site scripting (XSS) and possibly other attacks.
[ "cpe:2.3:a:hastymail:hastymail:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*" ]
CVE-2019-10410
Jenkins Log Parser Plugin 2.0 and earlier did not escape an error message, resulting in a cross-site scripting vulnerability exploitable by users able to define log parsing rules.
[ "cpe:2.3:a:jenkins:log_parser:*:*:*:*:*:jenkins:*:*" ]
GHSA-8c4h-x48p-mg38
The Advanced Floating Content plugin for WordPress is vulnerable to SQL Injection via the 'floating_content_duplicate_post' function in all versions up to, and including, 3.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
CVE-2020-13845
Sylabs Singularity 3.0 through 3.5 has Improper Validation of an Integrity Check Value. Image integrity is not validated when an ECL policy is enforced. The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature.
[ "cpe:2.3:a:sylabs:singularity:*:*:*:*:*:*:*:*" ]
CVE-2024-9030
CodeCanyon CRMGo SaaS note cross site scripting
A vulnerability classified as problematic was found in CodeCanyon CRMGo SaaS 7.2. This vulnerability affects unknown code of the file /deal/{note_id}/note. The manipulation of the argument notes leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:codecanyon:crmgo_saas:*:*:*:*:*:*:*:*", "cpe:2.3:a:workdo:crmgo_saas:7.2:*:*:*:*:*:*:*" ]
GHSA-h24w-g94h-5fxf
In gatt_dbg_op_name of gatt_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260079141
[]
GHSA-6fx2-mw65-fcxv
Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.
[]
GHSA-pxmj-v2v3-474h
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
[]
GHSA-q26w-r8v9-32wv
Cross-site scripting (XSS) vulnerability in search.php in MYRE Business Directory allows remote attackers to inject arbitrary web script or HTML via the look parameter.
[]
CVE-2019-25150
The Email Templates plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.3. This makes it possible for attackers to present phishing forms or conduct cross-site request forgery attacks against site administrators.
[ "cpe:2.3:a:wpexperts:email_templates:*:*:*:*:*:wordpress:*:*" ]
GHSA-pfhm-wwqj-c296
A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.
[]
CVE-2024-29089
WordPress Restaurant Menu and Food Ordering plugin <= 2.4.14 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Five Star Plugins Five Star Restaurant Menu allows Stored XSS.This issue affects Five Star Restaurant Menu: from n/a through 2.4.14.
[]
GHSA-xvf8-4rmq-w4c4
This affects all versions of package s3-kilatstorage.
[]
GHSA-g4xv-f6gh-pr93
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Ventura 13.2.1. An app may be able to observe unprotected user data..
[]
CVE-2024-9226
Landing Page Cat – Coming Soon Page, Maintenance Page & Squeeze Pages <= 1.7.6 - Reflected Cross-Site Scripting
The Landing Page Cat – Coming Soon Page, Maintenance Page & Squeeze Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.7.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
GHSA-mpg9-jggg-ww84
A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
[]
GHSA-9896-7c2v-5wqc
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.
[]
CVE-2020-35656
Jaws through 1.8.0 allows remote authenticated administrators to execute arbitrary code via crafted use of admin.php?reqGadget=Components&reqAction=InstallGadget&comp=FileBrowser and admin.php?reqGadget=FileBrowser&reqAction=Files to upload a .php file. NOTE: this is unrelated to the JAWS (aka Job Access With Speech) product.
[ "cpe:2.3:a:jaws_project:jaws:*:*:*:*:*:*:*:*" ]
CVE-2021-20714
Directory traversal vulnerability in WP Fastest Cache versions prior to 0.9.1.7 allows a remote attacker with administrator privileges to delete arbitrary files on the server via unspecified vectors.
[ "cpe:2.3:a:wpfastestcache:wp_fastest_cache:*:*:*:*:*:wordpress:*:*" ]
GHSA-rcmq-ww8v-3mxm
It was found that the Karaf container used by Red Hat JBoss Fuse 6.x, and Red Hat JBoss A-MQ 6.x, deserializes objects passed to MBeans via JMX operations. An attacker could use this flaw to execute remote code on the server as the user running the Java Virtual Machine if the target MBean contain deserialization gadgets in its classpath.
[]
CVE-2017-7128
An issue was discovered in certain Apple products. iOS before 11 is affected. macOS before 10.13 is affected. tvOS before 11 is affected. watchOS before 4 is affected. The issue involves the third-party "SQLite" product. Versions before 3.19.3 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
CVE-2023-40405
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1. An app may be able to read sensitive location information.
[ "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*" ]
GHSA-wpqf-pc7w-358f
A remote unauthenticated user can execute commands as root in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to proxy.cgi.
[]
CVE-2020-14515
CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.
[ "cpe:2.3:a:wibu:codemeter:*:*:*:*:*:*:*:*" ]
GHSA-vw27-f5gg-gq3j
An issue was discovered in fastadmin 1.0.0.20190705_beta. There is a public/index.php/admin/auth/admin/add CSRF vulnerability.
[]
GHSA-5v48-vw43-jxw9
PHP remote file inclusion vulnerability in index.php in Josh Schmidt WikyBlog 1.2.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the includeDir parameter.
[]
CVE-2020-23639
A command injection vulnerability exists in Moxa Inc VPort 461 Series Firmware Version 3.4 or lower that could allow a remote attacker to execute arbitrary commands in Moxa's VPort 461 Series Industrial Video Servers.
[ "cpe:2.3:o:moxa:vport_461_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:vport_461:-:*:*:*:*:*:*:*" ]
CVE-2024-50106
nfsd: fix race between laundromat and free_stateid
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix race between laundromat and free_stateid There is a race between laundromat handling of revoked delegations and a client sending free_stateid operation. Laundromat thread finds that delegation has expired and needs to be revoked so it marks the delegation stid revoked and it puts it on a reaper list but then it unlock the state lock and the actual delegation revocation happens without the lock. Once the stid is marked revoked a racing free_stateid processing thread does the following (1) it calls list_del_init() which removes it from the reaper list and (2) frees the delegation stid structure. The laundromat thread ends up not calling the revoke_delegation() function for this particular delegation but that means it will no release the lock lease that exists on the file. Now, a new open for this file comes in and ends up finding that lease list isn't empty and calls nfsd_breaker_owns_lease() which ends up trying to derefence a freed delegation stateid. Leading to the followint use-after-free KASAN warning: kernel: ================================================================== kernel: BUG: KASAN: slab-use-after-free in nfsd_breaker_owns_lease+0x140/0x160 [nfsd] kernel: Read of size 8 at addr ffff0000e73cd0c8 by task nfsd/6205 kernel: kernel: CPU: 2 UID: 0 PID: 6205 Comm: nfsd Kdump: loaded Not tainted 6.11.0-rc7+ #9 kernel: Hardware name: Apple Inc. Apple Virtualization Generic Platform, BIOS 2069.0.0.0.0 08/03/2024 kernel: Call trace: kernel: dump_backtrace+0x98/0x120 kernel: show_stack+0x1c/0x30 kernel: dump_stack_lvl+0x80/0xe8 kernel: print_address_description.constprop.0+0x84/0x390 kernel: print_report+0xa4/0x268 kernel: kasan_report+0xb4/0xf8 kernel: __asan_report_load8_noabort+0x1c/0x28 kernel: nfsd_breaker_owns_lease+0x140/0x160 [nfsd] kernel: nfsd_file_do_acquire+0xb3c/0x11d0 [nfsd] kernel: nfsd_file_acquire_opened+0x84/0x110 [nfsd] kernel: nfs4_get_vfs_file+0x634/0x958 [nfsd] kernel: nfsd4_process_open2+0xa40/0x1a40 [nfsd] kernel: nfsd4_open+0xa08/0xe80 [nfsd] kernel: nfsd4_proc_compound+0xb8c/0x2130 [nfsd] kernel: nfsd_dispatch+0x22c/0x718 [nfsd] kernel: svc_process_common+0x8e8/0x1960 [sunrpc] kernel: svc_process+0x3d4/0x7e0 [sunrpc] kernel: svc_handle_xprt+0x828/0xe10 [sunrpc] kernel: svc_recv+0x2cc/0x6a8 [sunrpc] kernel: nfsd+0x270/0x400 [nfsd] kernel: kthread+0x288/0x310 kernel: ret_from_fork+0x10/0x20 This patch proposes a fixed that's based on adding 2 new additional stid's sc_status values that help coordinate between the laundromat and other operations (nfsd4_free_stateid() and nfsd4_delegreturn()). First to make sure, that once the stid is marked revoked, it is not removed by the nfsd4_free_stateid(), the laundromat take a reference on the stateid. Then, coordinating whether the stid has been put on the cl_revoked list or we are processing FREE_STATEID and need to make sure to remove it from the list, each check that state and act accordingly. If laundromat has added to the cl_revoke list before the arrival of FREE_STATEID, then nfsd4_free_stateid() knows to remove it from the list. If nfsd4_free_stateid() finds that operations arrived before laundromat has placed it on cl_revoke list, it marks the state freed and then laundromat will no longer add it to the list. Also, for nfsd4_delegreturn() when looking for the specified stid, we need to access stid that are marked removed or freeable, it means the laundromat has started processing it but hasn't finished and this delegreturn needs to return nfserr_deleg_revoked and not nfserr_bad_stateid. The latter will not trigger a FREE_STATEID and the lack of it will leave this stid on the cl_revoked list indefinitely.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*" ]
GHSA-p38f-rq68-j3c6
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in StylemixThemes Masterstudy Elementor Widgets, StylemixThemes Consulting Elementor Widgets.This issue affects Masterstudy Elementor Widgets: from n/a through 1.2.2; Consulting Elementor Widgets: from n/a through 1.3.0.
[]
CVE-2023-5638
The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wcj_image' shortcode in versions up to, and including, 7.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*" ]
GHSA-7m5q-w7p8-x8h4
An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.
[]
GHSA-jxh7-q7rm-43ww
Ubuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This is reachable via the SetLanguage dbus function. This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1.
[]
CVE-2021-46794
Insufficient bounds checking in ASP (AMD Secure Processor) may allow for an out of bounds read in SMI (System Management Interface) mailbox checksum calculation triggering a data abort, resulting in a potential denial of service.
[ "cpe:2.3:o:amd:ryzen_5300g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5300ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5500_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5600x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5700g_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5700ge_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5700x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5800_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5800:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5800x3d_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5800x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5900_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5900:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5900x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5945wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5945wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5950x_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5955wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5955wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5965wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5965wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5975wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5975wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5995wx_firmware:cezannepi-fp6_1.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5995wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3100_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3100:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3100_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3100_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3100_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3300x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3300x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3300x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3300x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3500x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3500x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3600xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3600xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3800xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3800xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3900:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3900xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900xt_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900xt_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3900xt_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2_pi_1.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3950x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3950x_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3950x_firmware:renoirpi-fp6_1.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_1200_\\(af\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_1200_\\(af\\)_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_1600_\\(af\\):-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_1600_\\(af\\)_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2200g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2200g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2200g_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2200g_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2200g_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2200ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2200ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2200ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2200ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2200ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2300x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2300x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2300x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2300x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2300x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2400g_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2400g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2400g_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2400g_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2400g_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2400ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2400ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2400ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2400ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2400ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2500x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2500x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2500x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2500x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2500x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600e_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2600e:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600e_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600e_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600e_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2600x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2700:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700e_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700e_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700e_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700e_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2700x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2920x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2920x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2920x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2920x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2950x_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2950x_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2950x_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2950x_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2970wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2970wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2970wx_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2970wx_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2970wx_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2990wx_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_2990wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2990wx_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2990wx_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_2990wx_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:comboam4pi_1.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_pro_2100ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:comboam4v2_pi_1.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:pinnaclepi-am4_1.0.0.d:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_pro_2100ge_firmware:raven-fp5-am4_1.1.0.f:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_gold_3150g_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_gold_3150g_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_silver_3050ge_firmware:picassopi-fp5_1.0.0.e:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_silver_3050ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_silver_3050ge_firmware:pollockpi-ft5_1.0.0.4:*:*:*:*:*:*:*" ]
GHSA-xp6r-hhmh-jgfj
Multiple unspecified vulnerabilities in phpns before 2.1.1beta1 have unknown impact and attack vectors.
[]
GHSA-482j-2x2c-wwqf
A vulnerability was found in SourceCodester House Rental Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file manage_user.php of the component Edit User. The manipulation of the argument id/name/username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-250610 is the identifier assigned to this vulnerability.
[]
GHSA-6h4r-4p84-m69q
Milesight IP security cameras through 2016-11-14 have a default root password in /etc/shadow that is the same across different customers' installations.
[]
CVE-2025-2166
CM FAQ – Simplify support with an intuitive FAQ management tool <= 1.2.5 - Reflected Cross-Site Scripting
The CM FAQ – Simplify support with an intuitive FAQ management tool plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
GHSA-g58x-57fv-86jh
Jenkins Google Login Plugin non-constant time token comparison
Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token.
[]
GHSA-pvw6-vc2c-x7v5
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
CVE-2016-5663
Multiple cross-site scripting (XSS) vulnerabilities in oauth_callback.php on Accellion Kiteworks appliances before kw2016.03.00 allow remote attackers to inject arbitrary web script or HTML via the (1) code, (2) error, or (3) error_description parameter.
[ "cpe:2.3:a:accellion:kiteworks_appliance:*:*:*:*:*:*:*:*" ]
CVE-2023-2627
KiviCare Management System < 3.2.1 - Subscriber+ Unauthorised AJAX Calls
The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Admin/Doctors/etc and update plugin's settings
[ "cpe:2.3:a:iqonic:kivicare:*:*:*:*:*:wordpress:*:*" ]
CVE-2019-6204
A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, Safari 12.1. Enabling the Safari Reader feature on a maliciously crafted webpage may lead to universal cross site scripting.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
GHSA-9jmp-7pgh-x746
Cross-Site Request Forgery (CSRF) vulnerability in TannerRitchie Web Applications/DancePress DancePress (TRWA) allows Cross Site Request Forgery.This issue affects DancePress (TRWA): from n/a through 3.1.11.
[]
CVE-2023-4139
The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Sensitive Information Exposure via Directory Listing due to missing restriction in export folder indexing in versions up to, and including, 7.9.8. This makes it possible for unauthenticated attackers to list and view exported files.
[ "cpe:2.3:a:smackcoders:wp_ultimate_csv_importer:*:*:*:*:*:wordpress:*:*" ]
CVE-2022-20414
In setImpl of AlarmManagerService.java, there is a possible way to put a device into a boot loop due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-234441463
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
GHSA-rf37-cmcm-645m
A vulnerability in Trend Micro Apex One on Microsoft Windows may allow an attacker to manipulate a particular product folder to disable the security temporarily, abuse a specific Windows function and attain privilege escalation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Please note that version 1909 (OS Build 18363.719) of Microsoft Windows 10 mitigates hard links, but previous versions are affected.
[]
GHSA-vq5r-72cr-7jvc
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e20a0.
[]
GHSA-p772-97pf-8hmx
An Uncontrolled Search Path Element issue was discovered in AzeoTech DAQFactory versions prior to 17.1. An uncontrolled search path element vulnerability has been identified, which may execute malicious DLL files that have been placed within the search path.
[]
GHSA-3rfh-9f52-4ppx
Cross-site Scripting (XSS) - Stored in GitHub repository orchardcms/orchardcore prior to 1.2.2.
[]
CVE-2009-3341
Buffer overflow on the Linksys WRT54GL wireless router allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.10 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
[ "cpe:2.3:h:linksys:wrt54gl:*:*:*:*:*:*:*:*" ]
GHSA-742w-p6j3-fcr9
Multiple SQL injection vulnerabilities in PEARLINGER Pearl Forums 2.4 allow remote attackers to execute arbitrary SQL commands via the (1) forumsId and (2) topicId parameters in index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
CVE-2021-24908
Check & Log Email < 1.0.4 - Reflected Cross-Site Scripting
The Check & Log Email WordPress plugin before 1.0.4 does not escape the d parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting
[ "cpe:2.3:a:wpchill:check_\\&_log_email:*:*:*:*:*:wordpress:*:*" ]
CVE-2013-4656
Symlink Traversal vulnerability in ASUS RT-AC66U and RT-N56U due to misconfiguration in the SMB service.
[ "cpe:2.3:o:asus:rt-ac66u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*", "cpe:2.3:o:asus:rt-n56u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:asus:rt-n56u:-:*:*:*:*:*:*:*" ]
GHSA-c9h9-p9fc-97p7
In the Store Commander scexportcustomers module for PrestaShop through 3.6.1, sensitive SQL calls can be executed with a trivial HTTP request and exploited to forge a blind SQL injection.
[]
CVE-2025-24481
FactoryTalk® View Site Edition - Incorrect Permission Assignment
An Incorrect Permission Assignment Vulnerability exists in the product and version listed above. The vulnerability is due to incorrect permissions being assigned to the remote debugger port and can allow for unauthenticated access to the system configuration.
[]
GHSA-f57v-94h6-44v7
tecrail Responsive FileManager 9.13.4 allows remote attackers to write to an arbitrary image file (jpg/jpeg/png) via path traversal with the path parameter, through the save_img action in ajax_calls.php.
[]
GHSA-qg93-v358-g553
Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, CVE-2017-8756, and CVE-2017-11764.
[]
GHSA-qg7w-94j3-mr4j
A SQL injection vulnerability in interface/main/finder/patient_select.php from library/patient.inc in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the searchFields parameter.
[]
GHSA-56c2-3f8f-2pfq
An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8208.
[]
CVE-2021-33337
Cross-site scripting (XSS) vulnerability in the Document Library module's add document menu in Liferay Portal 7.3.0 through 7.3.4, and Liferay DXP 7.1 before fix pack 20, and 7.2 before fix pack 9, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_document_library_web_portlet_DLAdminPortlet_name parameter.
[ "cpe:2.3:a:liferay:dxp:7.1:-:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_1:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_10:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_11:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_12:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_13:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_14:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_15:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_16:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_17:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_18:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_19:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_2:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_3:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_4:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_5:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_6:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_7:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_8:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.1:fix_pack_9:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:-:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_1:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_2:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_3:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_4:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_5:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_6:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_7:*:*:*:*:*:*", "cpe:2.3:a:liferay:dxp:7.2:fix_pack_8:*:*:*:*:*:*", "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*" ]
CVE-2025-1734
Streams HTTP wrapper does not fail for headers with invalid name and no colon
In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers.
[]
GHSA-m9jx-h2qw-h5qj
concrete5 before 5.6.3 allows remote attackers to obtain the installation path via a direct request to (1) system/basics/editor.php, (2) system/view.php, (3) system/environment/file_storage_locations.php, (4) system/mail/importers.php, (5) system/mail/method.php, (6) system/permissions/file_types.php, (7) system/permissions/files.php, (8) system/permissions/tasks.php, (9) system/permissions/users.php, (10) system/seo/view.php, (11) view.php, (12) users/attributes.php, (13) scrapbook/view.php, (14) pages/attributes.php, (15) files/attributes.php, or (16) files/search.php in single_pages/dashboard/.
[]
GHSA-76xj-3v79-3jwj
A vulnerability classified as critical has been found in TOTOLINK N200RE V5 9.3.5u.6437_B20230519. This affects the function Validity_check. The manipulation leads to format string. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238635.
[]
CVE-2024-9445
Display Medium Posts <= 5.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via display_medium_posts Shortcode
The Display Medium Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's display_medium_posts shortcode in all versions up to, and including, 5.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:acekyd:display_medium_posts:*:*:*:*:*:wordpress:*:*" ]