id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2008-1592 | MQSeries 5.1 in IBM WebSphere MQ 5.1 through 5.3.1 on the HP NonStop and Tandem NSK platforms does not require mqm group membership for execution of administrative tasks, which allows local users to bypass intended access restrictions via the runmqsc program, related to "Pathway panels." | [
"cpe:2.3:o:hp:nonstop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tandem_computers:tandem_operating_system:nsk:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:5.3.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-0380 | Fotobook <= 3.2.3 Reflected Cross-Site Scripting | The Fotobook WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient escaping and the use of $_SERVER['PHP_SELF'] found in the ~/options-fotobook.php file which allows attackers to inject arbitrary web scripts onto the page, in versions up to and including 3.2.3. | [
"cpe:2.3:a:fotobook_project:fotobook:*:*:*:*:*:wordpress:*:*"
] |
GHSA-g246-r9p3-4qh3 | Unknown vulnerability in SGI IRIX 6.5 through 6.5.22m allows remote attackers to cause a denial of service via a certain UDP packet. | [] |
|
CVE-2018-20519 | An issue was discovered in 74cms v4.2.111. It allows remote authenticated users to read or modify arbitrary resumes by changing a job-search intention, as demonstrated by the index.php?c=Personal&a=ajax_save_basic pid parameter. | [
"cpe:2.3:a:74cms:74cms:4.2.111:*:*:*:*:*:*:*"
] |
|
GHSA-pcxx-jh3f-2gx3 | Cross-site scripting (XSS) vulnerability in Zeus Web Server before 4.3r5, when SSL is enabled for the admin server, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2002-1785. | [] |
|
CVE-2021-42669 | A file upload vulnerability exists in Sourcecodester Engineers Online Portal in PHP via dashboard_teacher.php, which allows changing the avatar through teacher_avatar.php. Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. By uploading a php webshell containing "<?php system($_GET["cmd"]); ?>" the attacker can execute commands on the web server with - /admin/uploads/php-webshell?cmd=id. | [
"cpe:2.3:a:engineers_online_portal_project:engineers_online_portal:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-20263 | In ActivityManager, there is a way to read process state for other users due to a missing permission check. This could lead to local information disclosure of app usage with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-217935264 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
CVE-2005-1122 | Format string vulnerability in cgi.c for Monkey daemon (monkeyd) before 0.9.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP GET request containing double-encoded format string specifiers (aka "double expansion error"). | [
"cpe:2.3:a:monkey-project:monkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.8.4:2:*:*:*:*:*:*",
"cpe:2.3:a:monkey-project:monkey:0.8.5:*:*:*:*:*:*:*"
] |
|
CVE-2012-6551 | The default configuration of Apache ActiveMQ before 5.8.0 enables a sample web application, which allows remote attackers to cause a denial of service (broker resource consumption) via HTTP requests. | [
"cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.0:m4:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq:5.6.0:*:*:*:*:*:*:*"
] |
|
CVE-2012-0168 | Microsoft Internet Explorer 6 through 9 allows user-assisted remote attackers to execute arbitrary code via a crafted HTML document that is not properly handled during a "Print table of links" print operation, aka "Print Feature Remote Code Execution Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] |
|
CVE-2021-46423 | Telesquare TLR-2005KSH 1.0.0 is affected by an unauthenticated file download vulnerability that allows a remote attacker to download a full configuration file. | [
"cpe:2.3:o:telesquare:tlr-2005ksh_firmware:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:telesquare:tlr-2005ksh:-:*:*:*:*:*:*:*"
] |
|
GHSA-27cc-f5jv-v62h | Multiple issues in ld64 in the Xcode toolchains were addressed by updating to version ld64-507.4. This issue is fixed in Xcode 11.0. Compiling code without proper input validation could lead to arbitrary code execution with user privilege. | [] |
|
CVE-2017-20092 | Google Analytics Dashboard Plugin cross site scriting | A vulnerability classified as problematic was found in Google Analytics Dashboard Plugin 2.1.1. Affected by this vulnerability is an unknown functionality. The manipulation leads to basic cross site scripting. The attack can be launched remotely. | [
"cpe:2.3:a:yoast:google_analytics_dashboard:2.1.1:*:*:*:*:wordpress:*:*"
] |
CVE-2017-9940 | A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker with access to a low-privileged user account to read or write files on the file system of the SiPass integrated server over the network. | [
"cpe:2.3:a:siemens:sipass_integrated:*:sp2:*:*:*:*:*:*"
] |
|
CVE-2007-2450 | Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors. | [
"cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*"
] |
|
GHSA-gc4q-mf7x-jrrp | zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script. | [] |
|
CVE-2019-5343 | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] |
|
CVE-2018-19994 | An error-based SQL injection vulnerability in product/card.php in Dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary SQL commands via the desiredstock parameter. | [
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:8.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-6qgc-3mp9-49hf | Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service via vectors related to the handling of mouse dragging events. | [] |
|
CVE-2024-31432 | WordPress Restrict Content plugin <= 3.2.8 - Broken Access Control vulnerability | Missing Authorization vulnerability in StellarWP Restrict Content.This issue affects Restrict Content: from n/a through 3.2.8.
| [
"cpe:2.3:a:liquidweb:restrict_content:*:*:*:*:*:wordpress:*:*"
] |
CVE-2007-5250 | The Windows dedicated server for the Unreal engine, as used by America's Army and America's Army Special Forces 2.8.2 and earlier, when Punkbuster (PB) is enabled, allows remote attackers to cause a denial of service (server hang) via packets containing 0x07 characters or other unspecified invalid characters. NOTE: this issue may overlap CVE-2007-4443. NOTE: this issue might be in Punkbuster itself, but there are insufficient details to be certain. | [
"cpe:2.3:a:americasarmy:america\\'s_army:*:*:*:*:*:*:*:*",
"cpe:2.3:a:americasarmy:america\\'s_army_special_forces:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-49233 | drm/amd/display: Call dc_stream_release for remove link enc assignment | In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Call dc_stream_release for remove link enc assignment
[Why]
A porting error resulted in the stream assignment for the link
being retained without being released - a memory leak.
[How]
Fix the porting error by adding back the dc_stream_release() intended
as part of the original patch. | [] |
CVE-2010-0591 | Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 6.x before 6.1(5), 7.x before 7.1(3b)SU2, and 8.x before 8.0(1) allows remote attackers to cause a denial of service (process failure) via a malformed SIP REG message, related to an overflow of the Telephone-URL field, aka Bug ID CSCtc62362. | [
"cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-j5qf-f39x-68h9 | PHP Scripts Mall Car Rental Script 2.0.8 has Cross-Site Request Forgery (CSRF) via accountedit.php. | [] |
|
CVE-2000-0467 | Buffer overflow in Linux splitvt 1.6.3 and earlier allows local users to gain root privileges via a long password in the screen locking function. | [
"cpe:2.3:a:sam_lantinga:splitvt:1.6.3:*:*:*:*:*:*:*"
] |
|
GHSA-mwp8-28v2-4h97 | Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /admin/loginpost.php. | [] |
|
CVE-2016-7858 | Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:flash_player_for_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:x64:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-7669-g6x3-vc23 | Vulnerability in Clibo Manager v1.1.9.1 that could allow an attacker to execute an stored Cross-Site Scripting (stored XSS ) by uploading a malicious .svg image in the section: Profile > Profile picture. | [] |
|
GHSA-898q-rv6w-247h | upload.exe in eFileGo 3.01 allows remote attackers to cause a denial of service (CPU consumption) via an argument with an invalid directory name. | [] |
|
CVE-2007-1739 | Heap-based buffer overflow in the LDAP server in IBM Lotus Domino before 6.5.6 and 7.x before 7.0.2 FP1 allows remote attackers to cause a denial of service (crash) via a long, malformed DN request, which causes only the lower 16 bits of the string length to be used in memory allocation. | [
"cpe:2.3:a:ibm:lotus_domino:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_domino:7.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-p4wg-rm26-6vrf | Unspecified vulnerability in the Oracle WebLogic Portal component in Oracle Fusion Middleware 9.2.3.0, 10.0.1.0, 10.2.1.0, and 10.3.2.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | [] |
|
GHSA-g4w4-g4r3-jrr5 | Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, and CVE-2017-0090. | [] |
|
CVE-2025-32225 | WordPress WP Event Manager plugin <= 3.1.47 - Broken Access Control vulnerability | Missing Authorization vulnerability in WP Event Manager WP Event Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Event Manager: from n/a through 3.1.47. | [] |
GHSA-558w-4jfg-vp65 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in videowhisper MicroPayments allows Reflected XSS. This issue affects MicroPayments: from n/a through 3.1.6. | [] |
|
CVE-2020-24036 | PHP object injection in the Ajax endpoint of the backend in ForkCMS below version 5.8.3 allows an authenticated remote user to execute malicious code. | [
"cpe:2.3:a:fork-cms:fork_cms:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-47883 | The com.altamirano.fabricio.tvbrowser TV browser application through 4.5.1 for Android is vulnerable to JavaScript code execution via an explicit intent due to an exposed MainActivity. | [
"cpe:2.3:a:vladymix:tv_browser:*:*:*:*:*:android:*:*"
] |
|
GHSA-3vhg-2gj6-mm5q | A vulnerability, which was classified as problematic, has been found in Shoplazza 1.1. This issue affects some unknown processing of the file /admin/api/admin/articles/ of the component Add Blog Post Handler. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-216191. | [] |
|
GHSA-p655-rxgh-qw65 | An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is a part of Enhanced Metafile Format (EMF) processing within the image conversion module. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure. | [] |
|
GHSA-44fm-3x7x-368h | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L). | [] |
|
GHSA-p2jx-rwxh-4rq2 | O'Reilly WebSite Pro 2.3.7 installs the uploader.exe program with execute permissions for all users, which allows remote attackers to create and execute arbitrary files by directly calling uploader.exe. | [] |
|
CVE-2019-13691 | Insufficient validation of untrusted input in navigation in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-g993-5jgg-hxg6 | MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) is vulnerable to a stack-based buffer overflow, which could allow an attacker to crash the device or remotely execute arbitrary code. | [] |
|
GHSA-q346-g3x2-q729 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in Simple Machines Forum (SMF) 1.1 RC3 allow remote authenticated users to inject arbitrary web script or HTML via the (1) recipient or (2) BCC field when selecting send in a pm action. | [] |
|
GHSA-6672-57h5-f9rw | Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php. | [] |
|
GHSA-fr74-c8w3-jj9x | Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine ADManager Plus 5.2 Build 5210 allow remote attackers to inject arbitrary web script or HTML via the (1) domainName parameter to jsp/AddDC.jsp or (2) operation parameter to DomainConfig.do. | [] |
|
GHSA-554f-p6jr-9fv8 | Microsoft OneNote Spoofing Vulnerability | [] |
|
CVE-2022-31974 | Online Fire Reporting System v1.0 is vulnerable to SQL Injection via /ofrs/admin/?page=reports&date=. | [
"cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-37q4-89pv-rvxq | The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file. | [] |
|
CVE-2023-31223 | Dradis before 4.8.0 allows persistent XSS by authenticated author users, related to avatars. | [
"cpe:2.3:a:dradisframework:dradis:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-26098 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
CVE-2015-1715 | Microsoft Silverlight 5 before 5.1.40416.00 allows remote attackers to bypass intended integrity-level restrictions via a crafted Silverlight application, aka "Microsoft Silverlight Out of Browser Application Vulnerability." | [
"cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-20857 | VMware Workspace ONE Content contains a passcode bypass vulnerability. A malicious actor, with access to a users rooted device, may be able to bypass the VMware Workspace ONE Content passcode. | [
"cpe:2.3:a:vmware:workspace_one_content:*:*:*:*:*:android:*:*"
] |
|
CVE-2018-15153 | OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/main/daemon_frame.php after modifying the "hylafax_server" global variable in interface/super/edit_globals.php. | [
"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*"
] |
|
GHSA-664f-36fg-45g6 | The Huawei Wear App application before 15.0.0.307 for Android does not validate SSL certificates, which allows local users to have unspecified impact via unknown vectors, aka HWPSIRT-2016-03008. | [] |
|
CVE-2008-2975 | Cross-site scripting (XSS) vulnerability in admin/objects/obj_image.php in TinX/cms 1.1 allows remote attackers to inject arbitrary web script or HTML via the language parameter. | [
"cpe:2.3:a:tinx_cms:tinx_cms:1.1:*:*:*:*:*:*:*"
] |
|
GHSA-jx9v-jv5r-x5ff | Permissions vulnerability found in isoftforce Dreamer CMS v.4.0.1 allows local attackers to obtain sensitive information via the AttachmentController parameter. | [] |
|
GHSA-p2xj-mgm6-jm2x | Use-after-free vulnerability in the JSON.stringify method in js3250.dll in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via unspecified vectors related to the js_HasOwnProperty function and garbage collection. | [] |
|
CVE-2019-12866 | An Insecure Direct Object Reference, with Authorization Bypass through a User-Controlled Key, was possible in JetBrains YouTrack. The issue was fixed in 2018.4.49168. | [
"cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*"
] |
|
GHSA-67w7-6c87-jm63 | An issue was discovered in the pricing-table-by-supsystic plugin before 1.8.2 for WordPress. Because there is no permission check on the ImportJSONTable, createFromTpl, and getJSONExportTable endpoints, unauthenticated users can retrieve pricing table information, create new tables, or import/modify a table. | [] |
|
GHSA-g3r6-454q-qjw9 | Adobe Animate version 21.0.6 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
GHSA-c7p3-h3hc-p348 | Adobe Audition version 24.0 (and earlier) and 23.6.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2007-4479 | Cross-site scripting (XSS) vulnerability in search.html in Search Engine Builder allows remote attackers to inject arbitrary web script or HTML via the searWords parameter. | [
"cpe:2.3:a:aleadsoft.com:search_engine_builder_professional:2.40:*:*:*:*:*:*:*"
] |
|
CVE-2013-0140 | SQL injection vulnerability in the Agent-Handler component in McAfee ePolicy Orchestrator (ePO) before 4.5.7 and 4.6.x before 4.6.6 allows remote attackers to execute arbitrary SQL commands via a crafted request over the Agent-Server communication channel. | [
"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:2.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:3.0:sp2a:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:4.6.5:*:*:*:*:*:*:*"
] |
|
CVE-2019-1809 | Cisco NX-OS Software Patch Signature Verification Bypass Vulnerability | A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software patch on an affected device. The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by crafting an unsigned software patch to bypass signature checks and loading it on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image. | [
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_4-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7000_9-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_2-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7700_6-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f312ck-26:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f324fq-25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f348xp-23:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-f430cq-36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m324fq-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-f248xp-25e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-f306ck-25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-f312fq-25:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m202cf-22l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m206fq-23l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m224xp-23l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*"
] |
GHSA-98p4-xjmm-8mfh | gix-transport indirect code execution via malicious username | Summary`gix-transport` does not check the username part of a URL for text that the external `ssh` program would interpret as an option. A specially crafted clone URL can smuggle options to SSH. The possibilities are syntactically limited, but if a malicious clone URL is used by an application whose current working directory contains a malicious file, arbitrary code execution occurs.DetailsThis is related to the patched vulnerability https://github.com/advisories/GHSA-rrjw-j4m2-mf34, but appears less severe due to a greater attack complexity. Since https://github.com/Byron/gitoxide/pull/1032, `gix-transport` checks the host and path portions of a URL for text that has a `-` in a position that will cause `ssh` to interpret part of all of the URL as an option argument. But it does not check the non-mandatory username portion of the URL.As in Git, when an address is a URL of the form `ssh://username@hostname/path`, or when it takes the special form `username@hostname:dirs/repo`, this is treated as an SSH URL. `gix-transport` will replace some characters in `username` with their `%`-based URL encodings, but otherwise passes `username@hostname` as an argument to the external `ssh` command. This happens even if `username` begins with a hyphen. In that case, `ssh` treats that argument as an option argument, and attempts to interpret and honor it as a sequence of one or more options possibly followed by an operand for the last option.This is harder to exploit than GHSA-rrjw-j4m2-mf34, because the possibilities are constrained by:The difficulty of forming an option argument `ssh` accepts, given that characters such as `=`, `/`, and `\`, are URL-encoded, `:` is removed, and the argument passed to `ssh` contains the `@` sign and subsequent host identifier, which in an effective attack must be parseable as a suffix of the operand passed to the last option.The inability to include a literal `=` prevents the use of `-oNAME=VALUE` (e.g., `-oProxyCommand=payload`). The inability to include a literal `/` or `\` prevents smuggling in a path operand residing outside the current working directory, incuding on Windows. (Although a `~` character may be smuggled in, `ssh` does not perform its own tilde expansion, so it does not form an absolute path.)The difficulty, or perhaps impossibility, of completing a connection (other than when arbitrary code execution has been achieved). This complicates or altogether prevents the use of options such as `-A` and `-X` together with a connection to a real but malicious server. The reason a connection cannot generally be completed when exploiting this vulnerability is that, because the argument `gix-transport` intends as a URL is treated as an option argument, `ssh` treats the subsequent non-option argument `git-upload-pack` as the host instead of the command, but it is not a valid host name.Although `ssh` supports aliases for hosts, even if `git-upload-pack` could be made an alias, that is made difficult by the URL-encoding transformation.However, an attacker who is able to cause a specially named `ssh` configuration file to be placed in the current working directory can smuggle in an `-F` option referencing the file, and this allows arbitrary command execution.This scenario is especially plausible because programs that operate on git repositories are often run in untrusted git repositories, sometimes even to operate on another repository. Situations where this is likely, such that an attacker could predict or arrange it, may for some applications include a malicious repository with a malicious submodule configuration.Other avenues of exploitation exist, but appear to be less severe. For example, the `-E` option can be smuggled to create or append to a file in the current directory (or its target, if it is a symlink). There may also be other significant ways to exploit this that have not yet been discovered, or that would arise with new options in future versions of `ssh`.PoCTo reproduce the known case that facilitates arbitrary code execution, first create a file in the current directory named `configfile@example.com`, of the formwhere `payload` is a command with an observable side effect. On Unix-like systems, this could be `date | tee vulnerable` or an `xdg-open`, `open`, or other command command to launch a graphical application. On Windows, this could be the name of a graphical application already in the search path, such as `calc.exe`.(Although the syntax permitted in the value of `ProxyCommand` may vary by platform, this is not limited to running commands in the current directory. That limitation only applies to paths directly smuggled in the username, not to the contents of a separate malicious configuration file. Arbitrary other settings may be specified in `configfile@example.com` as well.)Then run:Or:(The `--` is required to ensure that `gix` is really passing the argument as a URL for use in `gix-transport`, rather than interpreting it as an option itself, which would not necessarily be a vulnerability.)In either case, the payload specified in `configfile@example.com` runs, and its side effect can be observed.Other cases may likewise be produced, in either of the above two forms of SSH addresses. For example, to create or append to the file `errors@example.com`, or to create or append to its target if it is a symlink:ImpactAs in https://github.com/advisories/GHSA-rrjw-j4m2-mf34, this would typically require user interaction to trigger an attempt to clone or otherwise connect using the malicious URL. Furthermore, known means of exploiting this vulnerability to execute arbitrary commands require further preparatory steps to establish a specially named file in the current directory. The impact is therefore expected to be lesser, though it is difficult to predict it with certainty because it is not known exactly what scenarios will arise when using the `gix-transport` library.Users who use applications that make use of `gix-transport` are potentially vulnerable, especially:On repositories with submodules that are automatically added, depending how the application manages submodules.When operating on other repositories from inside an untrusted repository.When reviewing contributions from untrusted developers by checking out a branch from an untrusted fork and performing clones from that location. | [] |
CVE-2024-41345 | openflights commit 5234b5b is vulnerable to Cross-Site Scripting (XSS) via php/trip.php | [
"cpe:2.3:a:jpatokal:openflights:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jpatokal:openflights:2024-08-20:*:*:*:*:*:*:*"
] |
|
GHSA-r5rf-xw5q-xf24 | A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root. | [] |
|
CVE-2024-38041 | Windows Kernel Information Disclosure Vulnerability | Windows Kernel Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] |
CVE-2013-6176 | Multiple SQL injection vulnerabilities in EMC Document Sciences xPression 4.1 SP1 before Patch 47, 4.2 before Patch 26, and 4.5 before Patch 05, as used in Documentum Edition, Enterprise Edition Publish Engine, and Enterprise Edition Compuset Engine, allow remote authenticated users to execute arbitrary SQL commands via unspecified input to a (1) xAdmin or (2) xDashboard form. | [
"cpe:2.3:a:emc:document_sciences_xpression:4.1:sp1:-:*:enterprise:-:-:publish_engine",
"cpe:2.3:a:emc:document_sciences_xpression:4.2:-:-:*:enterprise:-:-:publish_engine",
"cpe:2.3:a:emc:document_sciences_xpression:4.5:-:-:*:enterprise:-:-:publish_engine",
"cpe:2.3:a:emc:document_sciences_xpression:4.1:sp1:-:*:documentum:*:*:*",
"cpe:2.3:a:emc:document_sciences_xpression:4.2:-:-:*:documentum:*:*:*",
"cpe:2.3:a:emc:document_sciences_xpression:4.5:-:-:*:documentum:*:*:*",
"cpe:2.3:a:emc:document_sciences_xpression:4.1:sp1:-:*:enterprise:-:-:compuset_engine",
"cpe:2.3:a:emc:document_sciences_xpression:4.2:-:-:*:enterprise:-:-:compuset_engine",
"cpe:2.3:a:emc:document_sciences_xpression:4.5:-:-:*:enterprise:-:-:compuset_engine"
] |
|
CVE-2000-0807 | The OPSEC communications authentication mechanism (fwn1) in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to spoof connections, aka the "OPSEC Authentication Vulnerability." | [
"cpe:2.3:a:checkpoint:firewall-1:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-41480 | Tenda AC1200 US_AC6V2.0RTL_V15.03.06.51_multi_TDE01 was discovered to contain a buffer overflow in the 0x475dc function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request. | [
"cpe:2.3:o:tenda:ac6v2.0_firmware:15.03.06.51:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac6:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2014-3180 | In kernel/compat.c in the Linux kernel before 3.17, as used in Google Chrome OS and other products, there is a possible out-of-bounds read. restart_syscall uses uninitialized data when restarting compat_sys_nanosleep. NOTE: this is disputed because the code path is unreachable | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*"
] |
|
CVE-2002-0440 | Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients. | [
"cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:trend_micro:interscan_viruswall:3.51:*:*:*:*:*:*:*"
] |
|
GHSA-28q3-23hp-5939 | Zoho ManageEngine ServiceDesk Plus MSP before 14504 allows stored XSS (by a low-privileged technician) via a task's name in a time sheet. | [] |
|
CVE-2003-1144 | Buffer overflow in the log viewing interface in Perception LiteServe 1.25 through 2.2 allows remote attackers to execute arbitrary code via a GET request with a long file name. | [
"cpe:2.3:a:perception:liteserve:1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:perception:liteserve:1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:perception:liteserve:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perception:liteserve:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perception:liteserve:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perception:liteserve:2.2:*:*:*:*:*:*:*"
] |
|
CVE-2006-3927 | Cross-site scripting (XSS) vulnerability in auctionsearch.php in PhpProBid 5.24 allows remote attackers to inject arbitrary web script or HTML via the advsrc parameter. | [
"cpe:2.3:a:php_pro_bid:php_pro_bid:5.24:*:*:*:*:*:*:*"
] |
|
CVE-2021-23246 | In ACE2 ColorOS11, the attacker can obtain the foreground package name through permission promotion, resulting in user information disclosure. | [
"cpe:2.3:o:oppo:coloros:11:*:*:*:*:*:*:*",
"cpe:2.3:h:oppo:ace2:-:*:*:*:*:*:*:*"
] |
|
CVE-2000-0745 | admin.php3 in PHP-Nuke does not properly verify the PHP-Nuke administrator password, which allows remote attackers to gain privileges by requesting a URL that does not specify the aid or pwd parameter. | [
"cpe:2.3:a:francisco_burzi:php-nuke:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:2.5:*:*:*:*:*:*:*"
] |
|
CVE-2024-2617 |
A vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a
malicious actor successfully exploits this vulnerability, they
could use it to update the RTU500 with unsigned firmware.
| [
"cpe:2.3:o:hitachienergy:rtu500_firmware:13.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hitachienergy:rtu500_firmware:13.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hitachienergy:rtu500_firmware:13.5.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-grrh-mjp7-g52c | The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT. | [] |
|
CVE-2023-23896 | WordPress URL Shortener by MyThemeShop Plugin <= 1.0.17 is vulnerable to Broken Access Control | Missing Authorization vulnerability in MyThemeShop URL Shortener by MyThemeShop.This issue affects URL Shortener by MyThemeShop: from n/a through 1.0.17.
| [
"cpe:2.3:a:mythemeshop:url_shortener:*:*:*:*:*:wordpress:*:*"
] |
GHSA-hcr5-cf9m-7gf4 | Heap-based buffer overflow in loader_tga.c in imlib2 before 1.2.1, and possibly other versions, allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TGA image. | [] |
|
GHSA-qq59-g9rc-v6vx | DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the ruequest_certificate function. | [] |
|
CVE-2015-5423 | Unspecified vulnerability in HP KeyView before 10.23.0.1 and 10.24.x before 10.24.0.1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2884. | [
"cpe:2.3:a:hp:keyview:*:*:*:*:*:*:*:*"
] |
|
GHSA-8w48-m6hx-rjw2 | Zope Command Execution Vulnerability | Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2, allows remote attackers to execute arbitrary commands via vectors related to the `p_` class in `OFS/misc_.py` and the use of Python modules. | [] |
CVE-2008-6685 | Unspecified vulnerability in Frontend Filemanager (air_filemanager) 0.6.1 and earlier extension for TYPO3 allows remote attackers to execute arbitrary commands via unknown vectors. | [
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:thomas_waggershauser:air_filemanager:0.6.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-26708 | mptcp: really cope with fastopen race | In the Linux kernel, the following vulnerability has been resolved:
mptcp: really cope with fastopen race
Fastopen and PM-trigger subflow shutdown can race, as reported by
syzkaller.
In my first attempt to close such race, I missed the fact that
the subflow status can change again before the subflow_state_change
callback is invoked.
Address the issue additionally copying with all the states directly
reachable from TCP_FIN_WAIT1. | [] |
CVE-2023-27444 | WordPress DecaLog Plugin <= 3.7.0 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Pierre Lannoy / PerfOps One DecaLog plugin <= 3.7.0 versions. | [
"cpe:2.3:a:perfops:decalog:*:*:*:*:*:wordpress:*:*"
] |
CVE-2014-6578 | Unspecified vulnerability in the Workspace Manager component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SDO_TOPO and WMSYS.LT. | [
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2010-2308 | Unspecified vulnerability in the filter driver (savonaccessfilter.sys) in Sophos Anti-Virus before 7.6.20 allows local users to gain privileges via crafted arguments to the NtQueryAttributesFile function. | [
"cpe:2.3:a:sophos:anti-virus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.78:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.78d:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.79:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.80:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.81:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.82:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.83:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.84:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.85:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.86:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.90:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.91:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.95:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:3.96.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.03:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.04:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.05:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:4.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:7.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:7.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:7.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:7.6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:anti-virus:7.6.18:*:*:*:*:*:*:*"
] |
|
CVE-2020-13539 | An exploitable local privilege elevation vulnerability exists in the file system permissions of the Win-911 Enterprise V4.20.13 install directory via “WIN-911 Mobile Runtime” service. Depending on the vector chosen, an attacker can overwrite various executables which could lead to escalation of the privileges when executed. | [
"cpe:2.3:a:win911:win-911:4.20.13:*:*:*:enterprise:*:*:*"
] |
|
CVE-2014-1635 | Buffer overflow in login.cgi in MiniHttpd in Belkin N750 Router with firmware before F9K1103_WW_1.10.17m allows remote attackers to execute arbitrary code via a long string in the jump parameter. | [
"cpe:2.3:o:belkin:n750_wireless_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:belkin:n750_wireless_router:f9k1103:*:*:*:*:*:*:*"
] |
|
GHSA-9w9h-g4r2-9977 | An information disclosure vulnerability in kernel components, including the process-grouping subsystem and the networking subsystem, in Android before 2016-11-05 could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Android ID: A-30149174. | [] |
|
CVE-2015-8890 | platform/msm_shared/partition_parser.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices does not validate certain GUID Partition Table (GPT) data, which allows attackers to bypass intended access restrictions via a crafted MultiMediaCard (MMC), aka Android internal bug 28822878 and Qualcomm internal bug CR823461. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
GHSA-v736-h5g7-qvj3 | Hospital Management System v 4.0 is vulnerable to Cross Site Scripting (XSS) via /hospital/hms/admin/patient-search.php. | [] |
|
GHSA-hp98-w9mh-2g6q | The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class. | [] |
|
CVE-2017-10235 | Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.7 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] |
|
GHSA-7hhg-cf2m-8xw7 | The unofficial Svelte extension before 104.8.0 for Visual Studio Code allows attackers to execute arbitrary code via a crafted workspace configuration. | [] |
|
CVE-2012-4156 | Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2051, CVE-2012-4147, CVE-2012-4148, CVE-2012-4149, CVE-2012-4150, CVE-2012-4151, CVE-2012-4152, CVE-2012-4153, CVE-2012-4154, CVE-2012-4155, CVE-2012-4157, CVE-2012-4158, CVE-2012-4159, and CVE-2012-4160. | [
"cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-xc8x-vp79-p3wm | twisted.web has disordered HTTP pipeline response | Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc1, when sending multiple HTTP requests in one TCP packet, twisted.web will process the requests asynchronously without guaranteeing the response order. If one of the endpoints is controlled by an attacker, the attacker can delay the response on purpose to manipulate the response of the second request when a victim launched two requests using HTTP pipeline. Version 23.10.0rc1 contains a patch for this issue.DetailsThere's an example faulty program:When two requests for `/first` and `/second` are sent in the same order, the second request will be responded to first. | [] |
Subsets and Splits