id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-rr84-5976-78qm | Google Chrome 2.x through 2.0.172 allows remote attackers to cause a denial of service (application crash) via a long Unicode string argument to the write method, a related issue to CVE-2009-2479. | [] |
|
CVE-2022-3472 | SourceCodester Human Resource Management System city.php sql injection | A vulnerability was found in SourceCodester Human Resource Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file city.php. The manipulation of the argument cityedit leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210716. | [
"cpe:2.3:a:oretnom23:human_resource_management_system:-:*:*:*:*:*:*:*"
] |
GHSA-578j-w5r9-87q8 | It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent. | [] |
|
GHSA-4j5f-hgv3-4fqh | Vulnerability in the Primavera Unifier component of Oracle Construction and Engineering Suite (subcomponent: Web Access). Supported versions that are affected are 15.1, 15.2, 16.1, 16.2, 17.1-17.12 and 18.1-18.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Unifier. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera Unifier, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Unifier accessible data as well as unauthorized read access to a subset of Primavera Unifier accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [] |
|
CVE-2009-3361 | SQL injection vulnerability in index.php in PHP-IPNMonitor allows remote attackers to execute arbitrary SQL commands via the maincat_id parameter. | [
"cpe:2.3:a:paul_gibbs:php-ipnmonitor:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-13159 | Artica Proxy before 4.30.000000 Community Edition allows OS command injection via the Netbios name, Server domain name, dhclient_mac, Hostname, or Alias field. NOTE: this may overlap CVE-2020-10818. | [
"cpe:2.3:a:articatech:artica_proxy:*:*:*:*:community:*:*:*"
] |
|
GHSA-7927-94hw-7qx3 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sébastien Dumont WooCommerce Display Products by Tags allows DOM-Based XSS. This issue affects WooCommerce Display Products by Tags: from n/a through 1.0.0. | [] |
|
CVE-2024-5496 | Use after free in Media Session in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] |
|
CVE-2017-5619 | An issue was discovered in Zammad before 1.0.4, 1.1.x before 1.1.3, and 1.2.x before 1.2.1. Attackers can login with the hashed password itself (e.g., from the DB) instead of the valid password string. | [
"cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zammad:zammad:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zammad:zammad:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zammad:zammad:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zammad:zammad:1.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-14712 | Buffer overflow in appGet.cgi on ASUS RT-AC3200 version 3.0.0.4.382.50010 allows attackers to inject system commands via the "hook" URL parameter. | [
"cpe:2.3:o:asus:rt-ac3200_firmware:3.0.0.4.382.50010:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac3200:-:*:*:*:*:*:*:*"
] |
|
GHSA-xwx6-2367-24jg | Cross-site scripting (XSS) vulnerability in Collaboration - File Sharing 01-20 up to 01-20-/B and 01-30 up to 01-30-/B in Hitachi Groupmax Collaboration Portal up to 07-30-/D, Groupmax Collaboration Web Client - Forum/File Sharing up to 07-30-/C, uCosminexus Collaboration Portal up to 06-30-/D, and uCosminexus Collaboration Portal - Forum/File Sharing up to 06-30-/C on Windows allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-83g3-xrrm-w6x6 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Albertolabs.com Easy EU Cookie law allows Stored XSS.This issue affects Easy EU Cookie law: from n/a through 1.3.3.1. | [] |
|
CVE-2023-20115 | A vulnerability in the SFTP server implementation for Cisco Nexus 3000 Series Switches and 9000 Series Switches in standalone NX-OS mode could allow an authenticated, remote attacker to download or overwrite files from the underlying operating system of an affected device.
This vulnerability is due to a logic error when verifying the user role when an SFTP connection is opened to an affected device. An attacker could exploit this vulnerability by connecting and authenticating via SFTP as a valid, non-administrator user. A successful exploit could allow the attacker to read or overwrite files from the underlying operating system with the privileges of the authenticated user.
There are workarounds that address this vulnerability. | [
"cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(2t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(2v\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(7a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:9.3\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.1\\(2t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(1q\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(3t\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:10.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-16130 | YII2-CMS v1.0 has XSS in protected\core\modules\home\models\Contact.php via a name field to /contact.html. | [
"cpe:2.3:a:hgw168cc:yii-cms:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2005-3155 | Buffer overflow in the W3C logging for MailEnable Enterprise 1.1 and Professional 1.6 allows remote attackers to execute arbitrary code. | [
"cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.6:*:*:*:*:*:*:*"
] |
|
CVE-2022-0244 | An issue has been discovered in GitLab CE/EE affecting all versions starting with 14.5. Arbitrary file read was possible by importing a group was due to incorrect handling of file. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
GHSA-x844-82pm-fvg4 | An issue was discovered in Veritas NetBackup 8.1.x through 8.1.2, 8.2, 8.3.x through 8.3.0.2, 9.x through 9.0.0.1, and 9.1.x through 9.1.0.1 (and related NetBackup products). An attacker with authenticated access to a NetBackup Client could remotely execute arbitrary commands on a NetBackup Primary server (in specific notify conditions). | [] |
|
CVE-2019-14794 | The Meta Box plugin before 4.16.2 for WordPress mishandles the uploading of files to custom folders. | [
"cpe:2.3:a:metabox:meta_box:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-j37q-2wxj-jx73 | An elevation of privilege vulnerability in the Realtek sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-32705232. | [] |
|
CVE-2023-49339 | Ellucian Banner 9.17 allows Insecure Direct Object Reference (IDOR) via a modified bannerId to the /StudentSelfService/ssb/studentCard/retrieveData endpoint. | [
"cpe:2.3:a:ellucian:banner:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-4462 | A validation issue was addressed with improved input sanitization. This issue affected versions prior to macOS Mojave 10.14.2. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-2782 | Buffer overflow in Open-source ARJ archiver 3.10.22 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ARJ archive. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:a:arj_software:arj_archiver:3.10.22:*:*:*:*:*:*:*"
] |
|
GHSA-w3q5-p3mp-g366 | iart.php in XAMPP 1.7.0 has XSS, a related issue to CVE-2008-3569. | [] |
|
GHSA-fh83-6qjg-wh4v | Use of Hard-coded Credentials vulnerability in GE Vernova EnerVista UR Setup allows Privilege Escalation. The local user database is encrypted using an hardcoded password retrievable by an attacker analyzing the application code. | [] |
|
GHSA-j494-7x2v-vvvp | mx-chain-go's relayed transactions always increment nonce | ImpactWhen executing a relayed transaction, if the inner transaction failed, it would have increased the inner transaction's sender account nonce. This could have contributed to a limited DoS attack on a targeted account. The fix is a breaking change so a new flag `RelayedNonceFixEnableEpoch` was needed. This was a strict processing issue while validating blocks on a chain.Patchesv1.4.17 and later versions contain the fix for this issueWorkaroundsthere were no workarounds for this issue. The affected account could only wait for the DoS attack to finish as the attack was not free or to attempt to send transactions in a very fast manner so as to compete on the same nonce with the attacker.ReferencesFor the future understanding of this issue, on v1.4.17 and onwards versions, we have this integration test that addresses the issue and tests the fix.
https://github.com/multiversx/mx-chain-go/blob/babdb144f1316ab6176bf3dbd7d4621120414d43/integrationTests/vm/txsFee/relayedMoveBalance_test.go#LL165C14-L165C14 | [] |
GHSA-8r3c-6cqq-7rmm | Possible integer overflow to buffer overflow in WLAN while parsing nonstandard NAN IE messages. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, IPQ8074, MDM9206, MDM9207C, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA4010, QCA6174A, QCA6574AU, QCA6584AU, QCA8081, QCA9377, QCA9379, QCA9886, QCN7605, QCS405, QCS605, SA6155P, Saipan, SDA845, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SM6150, SM7150, SM8150, SXR1130 | [] |
|
CVE-2019-10430 | Jenkins NeuVector Vulnerability Scanner Plugin 1.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | [
"cpe:2.3:a:jenkins:neuvector_vulnerability_scanner:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2006-3609 | Cross-site scripting (XSS) vulnerability in index.php in Orbitcoders OrbitMATRIX 1.0 allows remote attackers to inject arbitrary web script or HTML via the page_name parameter with an IMG tag containing a javascript URI in the SRC attribute. | [
"cpe:2.3:a:orbitcoders:orbitmatrix:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-hx6r-3wg6-64wf | Cross-site scripting vulnerability in Olive Blog allows remote attackers to inject arbitrary web script or HTML via the search parameter. | [] |
|
CVE-2023-34172 | WordPress WordPress Social Login Plugin <= 3.0.4 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Miled WordPress Social Login plugin <= 3.0.4 versions. | [
"cpe:2.3:a:miled:wordpress_social_login:*:*:*:*:*:wordpress:*:*"
] |
CVE-2020-36062 | Dairy Farm Shop Management System v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised. | [
"cpe:2.3:a:phpgurukul:dairy_farm_shop_management_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-hwqw-97xj-6fp8 | Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions. | [] |
|
GHSA-mww8-4q2m-9jw9 | Portainer before 1.22.1 has XSS (issue 2 of 2). | [] |
|
GHSA-qxgp-gpc4-hhg2 | NVIDIA Jetson Linux Driver Package contains a vulnerability in the Cboot ext4_mount function, where Insufficient validation of untrusted data may allow a highly privileged local attacker to cause an integer overflow. This difficult- to-exploit vulnerability may lead to code execution, escalation of privileges, limited denial of service, and some impact to confidentiality and integrity. | [] |
|
CVE-2020-3180 | Cisco SD-WAN Solution Software Static Credentials Vulnerability | A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, local attacker to access an affected device by using an account that has a default, static password. This account has root privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to an affected system by using this account. A successful exploit could allow the attacker to log in by using this account with root privileges. | [
"cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*"
] |
CVE-2006-3324 | The Automatic Downloading option in the id3 Quake 3 Engine and the Icculus Quake 3 Engine (ioquake3) before revision 804 allows remote attackers to overwrite arbitrary files in the quake3 directory (fs_homepath cvar) via a long string of filenames, as contained in the neededpaks buffer. | [
"cpe:2.3:a:id_software:quake_3_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:1.32b:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:1.32c:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:icculus_803:*:*:*:*:*:*:*",
"cpe:2.3:a:id_software:quake_3_engine:icculus_804:*:*:*:*:*:*:*"
] |
|
CVE-2023-40176 | SXSS in the user profile via the timezone displayer | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any registered user can exploit a stored XSS through their user profile by setting the payload as the value of the time zone user preference. Even though the time zone is selected from a drop down (no free text value) it can still be set from JavaScript (using the browser developer tools) or by calling the save URL on the user profile with the right query string. Once the time zone is set it is displayed without escaping which means the payload gets executed for any user that visits the malicious user profile, allowing the attacker to steal information and even gain more access rights (escalation to programming rights). This issue is present since version 4.1M2 when the time zone user preference was introduced. The issue has been fixed in XWiki 14.10.5 and 15.1RC1. | [
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:4.1:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:15.0:rc1:*:*:*:*:*:*"
] |
CVE-2020-4536 | IBM OpenPages GRC Platform 8.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 182907. | [
"cpe:2.3:a:ibm:openpages_grc_platform:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-0908 | Google Chrome before 25.0.1364.152 does not properly manage bindings of extension processes, which has unspecified impact and attack vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.66:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.68:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.70:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.72:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.73:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.74:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.75:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.76:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.77:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.79:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.80:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.81:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.82:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.84:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.85:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.86:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.87:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.88:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.90:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.91:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.92:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.93:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.95:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.98:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.99:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.108:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.110:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.112:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.113:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.114:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.115:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.116:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.117:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.118:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.119:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.120:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.121:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.122:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.123:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.124:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:25.0.1364.125:*:*:*:*:*:*:*"
] |
|
CVE-2017-5899 | Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument. | [
"cpe:2.3:a:s-nail_project:s-nail:*:*:*:*:*:*:*:*"
] |
|
GHSA-q48j-6v3w-g92f | Apple Safari detects http content in https web pages only when the top-level frame uses https, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying an http page to include an https iframe that references a script file on an http site, related to "HTTP-Intended-but-HTTPS-Loadable (HPIHSL) pages." | [] |
|
GHSA-49hq-h4gp-58jc | Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution . | [] |
|
CVE-2018-1743 | IBM Tivoli Key Lifecycle Manager 2.6, 2.7, and 3.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 148422. | [
"cpe:2.3:a:ibm:security_key_lifecycle_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2002-2337 | Kaspersky Anti-Hacker 1.0, when configured to automatically block attacks, allows remote attackers to block IP addresses and cause a denial of service via spoofed packets. | [
"cpe:2.3:a:kaspersky_lab:kaspersky_anti-hacker:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-xcrg-gx97-7fj9 | An integer underflow may occur due to lack of check when received data length from font_mgr_qsee_request_service is bigger than the minimal value of the segment header, which may result in a buffer overflow, in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SD 845, SD 850. | [] |
|
CVE-2020-9158 | There is a Missing Cryptographic Step vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS of Samgr. | [
"cpe:2.3:o:huawei:emui:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-fxv2-mp59-655q | The Arabic Troll Football (aka com.hamoosh.ArabicTrollFootball) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2005-4456 | Multiple buffer overflows in MailEnable Professional 1.71 and Enterprise 1.1 before patch ME-10009 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) LIST, (2) LSUB, and (3) UID FETCH commands. NOTE: it is possible that these are alternate vectors for the issue described in CVE-2005-4402. | [
"cpe:2.3:a:mailenable:mailenable_enterprise:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.71:*:*:*:*:*:*:*"
] |
|
GHSA-494v-c9x8-6xcw | Multiple eval injection vulnerabilities in the help function in PHPKIT 1.6.1 R2 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary code on the server via unknown attack vectors involving uninitialized variables. | [] |
|
CVE-2025-3299 | PHPGurukul Men Salon Management System appointment.php sql injection | A vulnerability was found in PHPGurukul Men Salon Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /appointment.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
CVE-2013-0161 | Havalite CMS 1.1.7 has a stored XSS vulnerability | [
"cpe:2.3:a:havalite:havalite:1.1.7:*:*:*:*:*:*:*"
] |
|
CVE-2024-33611 | Improper input validation for some Intel(R) PROSet/Wireless WiFi software for Windows before version 23.60 may allow a privileged user to potentially enable denial of service via local access. | [] |
|
CVE-2020-2229 | Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons, resulting in a stored cross-site scripting (XSS) vulnerability. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] |
|
CVE-2022-2712 | In Eclipse GlassFish versions 5.1.0 to 6.2.5, there is a vulnerability in relative path traversal because it does not filter request path starting with './'. Successful exploitation could allow an remote unauthenticated attacker to access critical data, such as configuration files and deployed application source code. | [
"cpe:2.3:a:eclipse:glassfish:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-0811 | The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"
] |
|
GHSA-fhg3-g379-5w22 | XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpEnterCriticalSectionContended+0x0000000000000031." | [] |
|
GHSA-6fv2-72fv-rm3x | A vulnerability was found in Kashipara Dynamic Lab Management System up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login_process.php. The manipulation of the argument password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249874 is the identifier assigned to this vulnerability. | [] |
|
GHSA-vhcm-f3gx-wghc | IBM QRadar SIEM 7.3 and 7.4 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 201778. | [] |
|
CVE-2008-4053 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in the Bluemoon PopnupBLOG module 3.20 and 3.30 for XOOPS allow remote attackers to inject arbitrary web script or HTML via the (1) param, (2) cat_id, and (3) view parameters. | [
"cpe:2.3:a:bluemoon:popnupblog:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:bluemoon:popnupblog:3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:xoops:*:*:*:*:*:*:*:*"
] |
|
GHSA-c7x4-3f9v-h9qf | The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files. | [] |
|
CVE-2025-2999 | PyTorch torch.nn.utils.rnn.unpack_sequence memory corruption | A vulnerability was found in PyTorch 2.6.0. It has been rated as critical. Affected by this issue is the function torch.nn.utils.rnn.unpack_sequence. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. | [] |
GHSA-3j67-8pc9-mgfv | PHP remote file inclusion vulnerability in compteur.php in Compteur 2 allows remote attackers to execute arbitrary PHP code via a URL in the cp parameter. NOTE: the provenance of this information is unknown; the details are obtained from third party information. | [] |
|
CVE-2001-0394 | Remote manager service in Website Pro 3.0.37 allows remote attackers to cause a denial of service via a series of malformed HTTP requests to the /dyn directory. | [
"cpe:2.3:a:oreilly:website_pro:3.0.37:*:*:*:*:*:*:*"
] |
|
CVE-2002-1165 | Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified. | [
"cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*"
] |
|
GHSA-mq6f-3mw5-jg7g | Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | [] |
|
GHSA-8vw4-w62x-p8mx | A cross-site scripting (XSS) vulnerability in Clansphere CMS v2011.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Username parameter. | [] |
|
GHSA-38rm-v4v3-vhx2 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.5, macOS Monterey 12.6.8, macOS Big Sur 11.7.9. Processing a file may lead to a denial-of-service or potentially disclose memory contents. | [] |
|
GHSA-c6hx-6fwx-2855 | In PHP Scripts Mall advanced-real-estate-script 4.0.9, the search-results.php searchtext parameter is vulnerable to XSS. | [] |
|
GHSA-qx8j-xj5q-v7r3 | A security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the `networking.k8s.io` or `extensions` API group) can bypass annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster. | [] |
|
CVE-2010-0159 | The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
] |
|
GHSA-67jv-rwrr-72fv | Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability | [] |
|
GHSA-5j5p-26xm-6h27 | SQL injection vulnerability in index.php in Zeus Cart 2.3 and earlier allows remote attackers to execute arbitrary SQL commands via the maincatid parameter in a showmaincatlanding action. | [] |
|
CVE-2024-49667 | WordPress Local Business Addons For Elementor plugin <= 1.1.5 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in NervyThemes Local Business Addons For Elementor allows Stored XSS.This issue affects Local Business Addons For Elementor: from n/a through 1.1.5. | [
"cpe:2.3:a:nervythemes:local_business_addons_for_elementor:*:*:*:*:*:wordpress:*:*"
] |
GHSA-xxcj-mmq5-mg5m | Composr CMS 10.0.13 has XSS via the site_name parameter in a page=admin-setupwizard&type=step3 request to /adminzone/index.php. | [] |
|
GHSA-r6qr-r386-hmx7 | Heap buffer overflow in UI in Google Chrome prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [] |
|
GHSA-x9xp-g2q8-6p6h | PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use random source ports for DNS requests and does not use random transaction IDs for DNS retries, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4099. | [] |
|
GHSA-5c2j-6v4p-437r | Directory traversal vulnerability in Tattyan HP TOWN before 5_10_1 allows remote attackers to read arbitrary files via a .. (dot dot) in a request. | [] |
|
CVE-2024-26306 | iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | [] |
|
GHSA-3cvr-822r-rqcc | undici before v5.8.0 vulnerable to CRLF injection in request headers | ImpactIt is possible to inject CRLF sequences into request headers in Undici.The same applies to `path` and `method`PatchesUpdate to v5.8.0WorkaroundsSanitize all HTTP headers from untrusted sources to eliminate `\r\n`.Referenceshttps://hackerone.com/reports/409943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12116For more informationIf you have any questions or comments about this advisory:Open an issue in [undici repository](https://github.com/nodejs/undici/issues)To make a report, follow the [SECURITY](https://github.com/nodejs/node/blob/HEAD/SECURITY.md) document | [] |
GHSA-x6cv-xr7v-j9fw | Unspecified vulnerability in Oracle Java SE 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. | [] |
|
GHSA-mh4c-hqr8-mc3f | nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse. | [] |
|
GHSA-4c9x-vhq3-f96q | An issue was discovered in Foxit PhantomPDF before 8.3.10. The application could be exposed to Memory Corruption due to the use of an invalid pointer copy, resulting from a destructed string object. | [] |
|
GHSA-9gjj-4x45-pp4f | Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to an out-of-bounds write condition, which may result in a system crash or allow an attacker to remotely execute arbitrary code. | [] |
|
GHSA-2p48-prhc-qmgx | The connection_state_machine function (connections.c) in lighttpd 1.4.19 and earlier, and 1.5.x before 1.5.0, allows remote attackers to cause a denial of service (active SSL connection loss) by triggering an SSL error, such as disconnecting before a download has finished, which causes all active SSL connections to be lost. | [] |
|
GHSA-w4qp-7pjr-4mq7 | An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body, such as a body of ' /bin/telnetd' for the GetDeviceSettingsset API function. Consequently, an attacker can execute any command remotely when they control this input. | [] |
|
CVE-2014-8829 | SceneKit in Apple OS X before 10.10.2 allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted app. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-fg8c-jv8r-wrhx | Tieba-Cloud-Sign v4.9 was discovered to contain a cross-site scripting (XSS) vulnerability via the function strip_tags. | [] |
|
CVE-2020-25266 | AppImage appimaged before 1.0.3 does not properly check whether a downloaded file is a valid appimage. For example, it will accept a crafted mp3 file that contains an appimage, and install it. | [
"cpe:2.3:a:appimage:appimaged:*:*:*:*:*:*:*:*"
] |
|
GHSA-7frv-9phw-vrvr | Authorization bypass in Strapi | `admin/src/containers/InputModalStepperProvider/index.js` in Strapi before 3.2.5 has unwanted `/proxy?url=` functionality. | [] |
CVE-2020-19294 | A stored cross-site scripting (XSS) vulnerability in the /article/comment component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the article comments section. | [
"cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:*"
] |
|
CVE-2012-3232 | Cross-site scripting (XSS) vulnerability in search.php in web@all 2.0, as downloaded before May 30, 2012, allows remote attackers to inject arbitrary web script or HTML via the _text[title] parameter. | [
"cpe:2.3:a:webatall:web\\@all:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-34658 | Telegram v9.6.3 on iOS allows attackers to hide critical information on the User Interface via calling the function SFSafariViewController. | [
"cpe:2.3:a:telegram:telegram:9.6.3:*:*:*:*:iphone_os:*:*"
] |
|
CVE-2018-14904 | Samsung Syncthru Web Service V4.05.61 is vulnerable to Multiple unauthenticated XSS attacks on several parameters, as demonstrated by ruiFw_pid. | [
"cpe:2.3:a:samsung:syncthru_web_service:4.05.61:*:*:*:*:*:*:*"
] |
|
GHSA-f294-27fc-wgj7 | Malicious Package in buffer-zor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.RecommendationRemove the package from your environment. Ensure no Ethereum funds were compromised. | [] |
CVE-2019-6193 | An information disclosure vulnerability was reported in Lenovo XClarity Administrator (LXCA) versions prior to 2.6.6 that could allow unauthenticated access to some configuration files which may contain usernames, license keys, IP addresses, and encrypted password hashes. | [
"cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-6015 | MLflow Arbitrary File Upload | MLflow allowed arbitrary files to be PUT onto the server. | [
"cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*"
] |
GHSA-98mx-x9g2-pmch | Deco M4 firmware versions prior to 'Deco M4(JP)_V2_1.5.8 Build 20230619' allows a network-adjacent authenticated attacker to execute arbitrary OS commands. | [] |
|
CVE-2015-8241 | The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-4194 | Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue | [
"cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*"
] |
|
GHSA-q9cc-rvjf-74f3 | Insufficient verification vulnerability in the system sharing pop-up module
Impact: Successful exploitation of this vulnerability will affect availability. | [] |
Subsets and Splits