id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2014-8491 | The Grand Flagallery plugin before 4.25 for WordPress allows remote attackers to obtain the installation path via a request to (1) flagallery-skins/banner_widget_default/gallery.php or (2) flash-album-gallery/skins/banner_widget_default/gallery.php. | [
"cpe:2.3:a:codeasily:grand_flagallery:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2023-41775 | Improper access control vulnerability in 'direct' Desktop App for macOS ver 2.6.0 and earlier allows a local attacker to bypass access restriction and to use camrea, microphone, etc. of the device where the product is installed without the user's consent. | [
"cpe:2.3:a:l-is-b:direct:*:*:*:*:desktop:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-48851 | staging: gdm724x: fix use after free in gdm_lte_rx() | In the Linux kernel, the following vulnerability has been resolved:
staging: gdm724x: fix use after free in gdm_lte_rx()
The netif_rx_ni() function frees the skb so we can't dereference it to
save the skb->len. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-jhp4-7rfr-4p9v | Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option. | [] |
|
CVE-2019-17210 | A denial-of-service issue was discovered in the MQTT library in Arm Mbed OS 2017-11-02. The function readMQTTLenString() is called by the function MQTTDeserialize_publish() to get the length and content of the MQTT topic name. In the function readMQTTLenString(), mqttstring->lenstring.len is a part of user input, which can be manipulated. An attacker can simply change it to a larger value to invalidate the if statement so that the statements inside the if statement are skipped, letting the value of mqttstring->lenstring.data default to zero. Later, curn is accessed, which points to mqttstring->lenstring.data. On an Arm Cortex-M chip, the value at address 0x0 is actually the initialization value for the MSP register. It is highly dependent on the actual firmware. Therefore, the behavior of the program is unpredictable from this time on. | [
"cpe:2.3:a:arm:mbed-mqtt:2017-11-02:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:mbed-os:-:*:*:*:*:*:*:*"
] |
|
GHSA-w25p-8q9j-g7j4 | An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "Hypervisor" component. It allows guest OS users to obtain sensitive information from the CR8 control register via unspecified vectors. | [] |
|
CVE-2025-23840 | WordPress WP-NOTCAPTCHA Plugin <= 1.3.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webjema WP-NOTCAPTCHA allows Reflected XSS. This issue affects WP-NOTCAPTCHA: from n/a through 1.3.1. | [] |
CVE-2020-18659 | Cross Site Scripting vulnerability in GetSimpleCMS <=3.3.15 via the (1) sitename, (2) username, and (3) email parameters to /admin/setup.php | [
"cpe:2.3:a:get-simple:getsimplecms:*:*:*:*:*:*:*:*"
] |
|
GHSA-vhqh-5xqw-v85c | Stack-based buffer overflow in GSM SIM Utility (aka SIM Card Editor) 6.6 allows remote attackers to execute arbitrary code via a long entry in a .sms file. | [] |
|
CVE-2021-27733 | In JetBrains YouTrack before 2020.6.6441, stored XSS was possible via an issue attachment. | [
"cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-47665 | Libde265 1.0.9 has a heap buffer overflow vulnerability in de265_image::set_SliceAddrRS(int, int, int) | [
"cpe:2.3:a:struktur:libde265:1.0.9:*:*:*:*:*:*:*"
] |
|
CVE-2007-5622 | Double free vulnerability in the ftpprchild function in ftppr in 3proxy 0.5 through 0.5.3i allows remote attackers to cause a denial of service (daemon crash) via multiple OPEN commands to the FTP proxy. | [
"cpe:2.3:a:3proxy:3proxy:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:3proxy:3proxy:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:3proxy:3proxy:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:3proxy:3proxy:0.5.3g:*:*:*:*:*:*:*",
"cpe:2.3:a:3proxy:3proxy:0.5.3h:*:*:*:*:*:*:*",
"cpe:2.3:a:3proxy:3proxy:0.5.3i:*:*:*:*:*:*:*"
] |
|
CVE-2022-43244 | Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file. | [
"cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-39878 | Improper access control vulnerability in Samsung Checkout prior to version 5.0.55.3 allows attackers to access sensitive information via implicit intent broadcast. | [
"cpe:2.3:a:samsung:checkout:*:*:*:*:*:*:*:*"
] |
|
GHSA-g8qr-xv6v-97fw | An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions, aka 'Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1372. | [] |
|
CVE-2024-23675 | Splunk App Key Value Store (KV Store) Improper Handling of Permissions Leads to KV Store Collection Deletion | In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app key value store (KV Store) improperly handles permissions for users that use the REST application programming interface (API). This can potentially result in the deletion of KV Store collections. | [
"cpe:2.3:a:splunk:cloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*"
] |
GHSA-xmgx-c8hv-cpmg | The admin pages for power types and key types in Beaker before 20.1 do not have any access controls, which allows remote authenticated users to modify power types and key types via navigating to $BEAKER/powertypes and $BEAKER/keytypes respectively. | [] |
|
CVE-2013-6416 | Cross-site scripting (XSS) vulnerability in the simple_format helper in actionpack/lib/action_view/helpers/text_helper.rb in Ruby on Rails 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted HTML attribute. | [
"cpe:2.3:a:rubyonrails:rails:*:-:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*"
] |
|
CVE-2016-7389 | For the NVIDIA Quadro, NVS, GeForce, and Tesla products, NVIDIA GPU Display Driver on Linux R304 before 304.132, R340 before 340.98, R367 before 367.55, R361_93 before 361.93.03, and R370 before 370.28 contains a vulnerability in the kernel mode layer (nvidia.ko) handler for mmap() where improper input validation may allow users to gain access to arbitrary physical memory, leading to an escalation of privileges. | [
"cpe:2.3:a:nvidia:gpu_driver:304.79:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:gpu_driver:340.52:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:gpu_driver:361.91:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:gpu_driver:365.19:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:gpu_driver:368.81:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
CVE-2005-3093 | Nokia 7610 and 3210 phones allows attackers to cause a denial of service via certain characters in the filename of a Bluetooth OBEX transfer. | [
"cpe:2.3:a:nokia:3210:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nokia:7610:*:*:*:*:*:*:*:*"
] |
|
GHSA-9w6m-c9jr-wx8p | A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | [] |
|
CVE-2022-47662 | GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662 | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] |
|
GHSA-x7vj-wqq4-cq4v | Sophos XG Firewall 17.x through v17.5 MR12 allows a Buffer Overflow and remote code execution via the HTTP/S Bookmarks feature for clientless access. Hotfix HF062020.1 was published for all firewalls running v17.x. | [] |
|
CVE-2023-0523 | An issue has been discovered in GitLab affecting all versions starting from 15.6 before 15.8.5, 15.9 before 15.9.4, and 15.10 before 15.10.1. An XSS was possible via a malicious email address for certain instances. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:enterprise:*:*:*"
] |
|
CVE-2024-55950 | Tabby has a TCC Bypass via Unnecessary Permissive Entitlements in Tabby | Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.216, Tabby terminal emulator contains overly permissive entitlements that are unnecessary for its core functionality and plugin system, creating potential security vulnerabilities. The application currently holds powerful permissions including camera, microphone access, and the ability to access personal folders (Downloads, Documents, etc.) through Apple Events, while also maintaining dangerous entitlements that enable code injection. The concerning entitlements are com.apple.security.cs.allow-dyld-environment-variables and com.apple.security.cs.disable-library-validation. Since Tabby's plugins and themes are NodeJS-based without native libraries or frameworks, and no environment variables are used in the codebase, it is recommended to review and remove at least one of the entitlements (com.apple.security.cs.disable-library-validation or com.apple.security.cs.allow-dyld-environment-variables) to prevent DYLD_INSERT_LIBRARIES injection while maintaining full application functionality. This vulnerability is fixed in 1.0.216. | [] |
GHSA-hg7j-qwv3-fwv5 | Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation component of Oracle Retail Applications (subcomponent: Customer). Supported versions that are affected are 16.0 and 17.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. While the vulnerability is in Oracle Retail Customer Management and Segmentation Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Retail Customer Management and Segmentation Foundation accessible data as well as unauthorized access to critical data or complete access to all Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N). | [] |
|
GHSA-qxrq-72v2-78jv | An arbitrary file upload vulnerability in the plugin installation feature of YZNCMS v2.0.1 allows attackers to execute arbitrary code via uploading a crafted Zip file. | [] |
|
CVE-2019-20615 | An issue was discovered on Samsung mobile devices with N(7.x) and O(8.x) software. Attackers can bypass Factory Reset Protection (FRP) via SVoice T&C. The Samsung ID is SVE-2018-13547 (March 2019). | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] |
|
CVE-2008-3561 | SQL injection vulnerability in s03.php in Powergap Shopsystem, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the ag parameter. | [
"cpe:2.3:a:powergap:shopsystem:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-18479 | In cPanel before 62.0.4, WHM SSL certificate generation uses an unreserved e-mail address (SEC-209). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-1489 | An information disclosure vulnerability exists when the Windows Remote Desktop Protocol (RDP) fails to properly handle objects in memory, aka 'Remote Desktop Protocol Information Disclosure Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"
] |
|
GHSA-gmw9-73pf-rc65 | There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. | [] |
|
GHSA-5x5q-fcw5-7frv | Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may get cleared (resulting in a de-reference of NULL) and freed (resulting in a use-after-free), while other code would continue to assume them to be valid. | [] |
|
GHSA-qp7w-47rc-m64m | Authentication bypass by spoofing issue exists in FileMegane versions above 1.0.0.0 prior to 3.4.0.0, which may lead to user impersonation. If exploited, restricted file contents may be accessed. | [] |
|
GHSA-9vr7-9j8f-cqm4 | CoreGraphics in Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file. | [] |
|
CVE-2019-9345 | In the Android kernel in sdcardfs there is a possible violation of the separation of data between profiles due to shared mapping of obb files. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-8740 | The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request. | [
"cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*"
] |
|
GHSA-4p4x-4mrv-qrrm | Possible buffer overflow due to lack of validation for the length of NAI string read from EFS in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile | [] |
|
CVE-2019-16469 | Adobe Experience Manager versions 6.5, 6.4, 6.3, 6.2, 6.1, and 6.0 have an expression language injection vulnerability. Successful exploitation could lead to sensitive information disclosure. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-36679 | WordPress Spectra plugin <= 2.6.6 - Server Side Request Forgery (SSRF) vulnerability | Server-Side Request Forgery (SSRF) vulnerability in Brainstorm Force Spectra.This issue affects Spectra: from n/a through 2.6.6.
| [] |
CVE-2024-50264 | vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans | In the Linux kernel, the following vulnerability has been resolved:
vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
During loopback communication, a dangling pointer can be created in
vsk->trans, potentially leading to a Use-After-Free condition. This
issue is resolved by initializing vsk->trans to NULL. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*"
] |
CVE-2024-21916 | Rockwell Automation Denial-of-service Vulnerability in ICE1 Controller |
A denial-of-service vulnerability exists in specific Rockwell Automation ControlLogix ang GuardLogix controllers. If exploited, the product could potentially experience a major nonrecoverable fault (MNRF). The device will restart itself to recover from the MNRF. | [
"cpe:2.3:o:rockwellautomation:controllogix_5570_controller_firmware:20.011:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:guardlogix_5570_controller_firmware:20.011:*:*:*:*:*:*:*",
"cpe:2.3:o:rockwellautomation:controllogix_5570_redundant_controller_firmware:20.054_kit1:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:controllogix_5570_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:guardlogix_5570_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:rockwellautomation:controllogix_5570_redundant_controller:-:*:*:*:*:*:*:*"
] |
GHSA-f3wx-h636-9qph | A vulnerability in the Intelligent Platform Management Interface (IPMI) of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of user-supplied commands. An attacker who has administrator privileges and access to the network where the IPMI resides could exploit this vulnerability by submitting crafted input to the affected commands. A successful exploit could allow the attacker to gain root privileges on the affected device. | [] |
|
GHSA-596q-fm96-jm8g | Directory traversal vulnerability in function_foot_1.inc.php for Thorsten Korner 123tkShop before 0.3.1 allows remote attackers to read arbitrary files via .. (dot dot) sequences terminated by a null character in the $designNo variable, which is part of an "include" function call. | [] |
|
CVE-2021-22364 | There is a denial of service vulnerability in the versions 10.1.0.126(C00E125R5P3) of HUAWEI Mate 30 and 10.1.0.152(C00E136R7P2) of HUAWEI Mate 30 (5G) . A module does not verify certain parameters sufficiently and it leads to some exceptions. Successful exploit could cause a denial of service condition. | [
"cpe:2.3:o:huawei:mate_30_firmware:10.1.0.126\\(c00e125r5p3\\):*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_30_5g_firmware:10.1.0.152\\(c00e136r7p2\\):*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_30_5g:-:*:*:*:*:*:*:*"
] |
|
CVE-2006-3956 | Multiple cross-site scripting (XSS) vulnerabilities in contact.php in Advanced Webhost Billing System (AWBS) 2.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) Name, (2) AccountUsername and (3) Message parameters. | [
"cpe:2.3:a:total_online_solutions:advanced_webhost_billing_system:2.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2023-39294 | QTS, QuTS hero | An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.3.2578 build 20231110 and later
QuTS hero h5.1.3.2578 build 20231110 and later
| [
"cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*",
"cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:*"
] |
CVE-2007-4742 | Claroline before 1.8.6 allows remote authenticated administrators to obtain sensitive information via an invalid value in the sort parameter to admin/adminusers.php, which reveals the path in an error message in some circumstances, as demonstrated by a parameter value containing an XSS sequence. | [
"cpe:2.3:a:claroline:claroline:*:*:*:*:*:*:*:*"
] |
|
GHSA-2m7m-jhx5-8crh | IBM Aspera Orchestrator 4.0.1 could allow a remote attacker to enumerate usernames due to observable response discrepancies. IBM X-Force ID: 248545. | [] |
|
CVE-2019-2215 | A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095 | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:aff_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:aff_baseboard_management_controller:a700s:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:a320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:a320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:c190:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:a220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:fas2720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:fas2750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:a800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:alp-tl00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:alp-tl00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ares-al00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ares-al00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ares-al10d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ares-al10d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ares-tl00chw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ares-tl00chw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bla-al00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:bla-tl00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:barca-al00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:barca-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:berkeley-tl10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:berkeley-tl10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:columbia-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:columbia-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:duke-l09i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:duke-l09i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:figo-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:figo-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:florida-al20b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:florida-al20b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:florida-l03_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:florida-l03:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:florida-l22_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:florida-l22:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:florida-tl10b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:florida-tl10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_rs_firmware:9.1.0.321\\(c786e320r1p1t8\\):*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_rs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:y9_2019_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nova_2s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nova_2s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:johnson-tl00d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:leland-al10b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:leland-al10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:leland-l21a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:leland-l21a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:leland-l32a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:leland-l32a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:leland-tl10b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:leland-tl10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:leland-tl10c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:leland-tl10c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:lelandp-al00c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:lelandp-al00c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:lelandp-l22c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:neo-al00d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:rhone-al00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:rhone-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:stanford-l09_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:stanford-l09:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:stanford-l09s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:stanford-l09s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:yale-tl00b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:yale-tl00b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-35313 | Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability | Windows Online Certificate Status Protocol (OCSP) SnapIn Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
GHSA-gh4x-4355-2f32 | gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file. | [] |
|
CVE-2016-2411 | A Qualcomm Power Management kernel driver in Android 6.x before 2016-04-01 allows attackers to gain privileges via a crafted application that leverages root access, aka internal bug 26866053. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2023-34540 | Langchain before v0.0.225 was discovered to contain a remote code execution (RCE) vulnerability in the component JiraAPIWrapper (aka the JIRA API wrapper). This vulnerability allows attackers to execute arbitrary code via crafted input. As noted in the "releases/tag" reference, a fix is available. | [
"cpe:2.3:a:langchain:langchain:0.0.171:*:*:*:*:*:*:*"
] |
|
CVE-2021-23207 | Fresenius Kabi Agilia Connect Infusion System plaintext storage of a password | An attacker with physical access to the host can extract the secrets from the registry and create valid JWT tokens for the Fresenius Kabi Vigilant MasterMed version 2.0.1.3 application and impersonate arbitrary users. An attacker could manipulate RabbitMQ queues and messages by impersonating users. | [
"cpe:2.3:o:fresenius-kabi:agilia_connect:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fresenius-kabi:agilia_connect:-:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:agilia_partner_maintenance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:vigilant_centerium:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:vigilant_insight:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:vigilant_mastermed:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fresenius-kabi:link\\+_agilia_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fresenius-kabi:link\\+_agilia_firmware:3.0:-:*:*:*:*:*:*",
"cpe:2.3:o:fresenius-kabi:link\\+_agilia_firmware:3.0:d15:*:*:*:*:*:*",
"cpe:2.3:h:fresenius-kabi:link\\+_agilia:-:*:*:*:*:*:*:*"
] |
CVE-2024-57017 | TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "pass" parameter in setVpnAccountCfg. | [] |
|
GHSA-3x5w-jx9q-34gc | An issue was discovered in certain Apple products. iOS before 10.1 is affected. The issue involves the "iTunes Backup" component, which improperly hashes passwords, making it easier to decrypt files. | [] |
|
CVE-2018-6540 | In ZZIPlib 0.13.67, there is a bus error caused by loading of a misaligned address in the zzip_disk_findfirst function of zzip/mmapped.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted zip file. | [
"cpe:2.3:a:zziplib_project:zziplib:0.13.67:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] |
|
GHSA-vf2q-2q84-vw3r | Potential security vulnerability of Insufficient Access Controls has been identified in ArcSight Management Center (ArcMC) for versions prior to 2.81. This vulnerability could be exploited to allow for insufficient access controls. | [] |
|
GHSA-g3fh-c7h3-x56j | Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | [] |
|
GHSA-x2pj-73r7-cfwx | Adobe Acrobat and Reader versions 2018.011.20063 and earlier, 2017.011.30102 and earlier, and 2015.006.30452 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] |
|
CVE-2021-21029 | Magento Commerce Reflected Cross-site Scripting Vulnerability Could Lead To Arbitrary JavaScript Execution | Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a Reflected Cross-site Scripting vulnerability via 'file' parameter. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Access to the admin console is required for successful exploitation. | [
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.6:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.6:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:p1:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.1:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.1:-:*:*:open_source:*:*:*"
] |
CVE-2016-6967 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1089, CVE-2016-1091, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6949, CVE-2016-6952, CVE-2016-6953, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6968, CVE-2016-6969, CVE-2016-6971, CVE-2016-6979, CVE-2016-6988, and CVE-2016-6993. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] |
|
GHSA-6qcc-5r9g-pm7w | A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-4.4.0.GA-110(MU7). The vulnerability may be locally exploited to allow disclosure of privileged information. | [] |
|
CVE-2017-9394 | A stored cross-site scripting vulnerability in CA Identity Governance 12.6 allows remote authenticated attackers to display HTML or execute script in the context of another user. | [
"cpe:2.3:a:ca:identity_governance:12.6.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-24446 | An issue was discovered in Zoho ManageEngine Key Manager Plus 6.1.6. A user, with the level Operator, can see all SSH servers (and user information) even if no SSH server or user is associated to the operator. | [
"cpe:2.3:a:zohocorp:manageengine_key_manager_plus:6.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_key_manager_plus:6.1.6:build6100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_key_manager_plus:6.1.6:build6150:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_key_manager_plus:6.1.6:build6151:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_key_manager_plus:6.1.6:build6160:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_key_manager_plus:6.1.6:build6161:*:*:*:*:*:*"
] |
|
CVE-2006-2983 | PHP remote file inclusion vulnerability in Enterprise Timesheet and Payroll Systems (EPS) 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the absolutepath parameter in cal.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:enterprise_payroll_systems:enterprise_payroll_systems:1.0_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:enterprise_payroll_systems:enterprise_payroll_systems:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:enterprise_payroll_systems:enterprise_payroll_systems:1.01_alpha:*:*:*:*:*:*:*"
] |
|
CVE-2020-6441 | Insufficient policy enforcement in omnibox in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to bypass security UI via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] |
|
GHSA-w228-rfpx-fhm4 | cg vulnerable to an Open Redirect Vulnerability on Referer Header | SummaryA vulnerability has been discovered in the handling of the referrer header in the application, which could allow an attacker to conduct open redirects. The issue arises from improper validation of the referrer header in certain conditions. By manipulating the referrer header, an attacker could potentially redirect users to malicious websites, phishing pages, or other dangerous destinations.PoCIf you change the referer header, you will be redirected to that domain without verifying.https://github.com/Clinical-Genomics/cg/blob/master/cg/server/invoices/views.py#L173ImpactAn attacker exploiting this vulnerability could trick users into visiting malicious websites or disclose sensitive information by redirecting them to unintended destinations. This could lead to various attacks including phishing, malware distribution, or further exploitation of other vulnerabilities. | [] |
GHSA-39vm-p9mr-4r27 | Beaker Sensitive Information Disclosure vulnerability | Beaker before 1.6.4, when using PyCrypto to encrypt sessions, uses AES in ECB cipher mode, which might allow remote attackers to obtain portions of sensitive session data via unspecified vectors. | [] |
CVE-2005-4168 | Multiple SQL injection vulnerabilities in eFiction 1.0, 1.1, and 2.0 allow remote attackers to execute arbitrary SQL commands via (1) the let parameter in a viewlist action to titles.php and (2) the username. | [
"cpe:2.3:a:efiction_project:efiction:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:efiction_project:efiction:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:efiction_project:efiction:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2014-0466 | The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file. | [
"cpe:2.3:a:gnu:a2ps:4.14:*:*:*:*:*:*:*"
] |
|
CVE-2017-17104 | Fiyo CMS 2.0.7 has an arbitrary file read vulnerability in dapur/apps/app_theme/libs/check_file.php via $_GET['src'] or $_GET['name']. | [
"cpe:2.3:a:fiyo:fiyo_cms:2.0.7:*:*:*:*:*:*:*"
] |
|
GHSA-jx7v-2grp-7h7p | In nfa_rw_store_ndef_rx_buf of nfa_rw_act.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-123583388. | [] |
|
GHSA-68xv-2p42-wm3q | The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem. | [] |
|
CVE-2024-5508 | Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of KSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22267. | [
"cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
"cpe:2.3:a:luxion:keyshot_network_rendering:*:*:*:*:*:*:*:*"
] |
GHSA-h2gp-cjj3-8m99 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5806. | [] |
|
GHSA-g5q2-63r8-xrq9 | "IBM Cognos Analytics 11.2.1, 11.2.0, 11.1.7 stores user credentials in plain clear text which can be read by an authenticated user. IBM X-Force ID: 229963." | [] |
|
GHSA-8gh8-867m-44fj | Adobe Connect versions 12.6, 11.4.7 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [] |
|
GHSA-3f6h-6ch9-p8jv | libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character. | [] |
|
CVE-2019-2561 | Vulnerability in the Oracle Retail Xstore Office component of Oracle Retail Applications (subcomponent: Internal Operations). Supported versions that are affected are 7.0 and 7.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Office. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Retail Xstore Office accessible data as well as unauthorized update, insert or delete access to some of Oracle Retail Xstore Office accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:retail_xstore_office:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_office:7.1:*:*:*:*:*:*:*"
] |
|
GHSA-84wr-h4hf-228g | A vulnerability has been found in CodeCanyon Perfex CRM up to 3.2.1 and classified as problematic. This vulnerability affects unknown code of the file /contract of the component Contracts. The manipulation of the argument content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-h7wg-2r8j-6v5c | Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [] |
|
GHSA-h4gv-m9gr-hhjw | On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. A strcpy overflows the destination buffer, which has a size of 40 bytes. An attacker can send an arbitrarily long "user" value in order to exploit this vulnerability. | [] |
|
GHSA-r2hj-rpgr-pp7j | Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] |
|
CVE-2023-31031 | CVE | NVIDIA DGX A100 SBIOS contains a vulnerability where a user may cause a heap-based buffer overflow by local access. A successful exploit of this vulnerability may lead to code execution, denial of service, information disclosure, and data tampering. | [
"cpe:2.3:o:nvidia:dgx_a100_firmware:*:*:*:*:sbios:*:*:*",
"cpe:2.3:h:nvidia:dgx_a100:-:*:*:*:*:*:*:*"
] |
GHSA-2cc5-8q8w-gqw8 | Cross-Site Request Forgery (CSRF) vulnerability in Jettochkin Jet Footer Code allows Stored XSS.This issue affects Jet Footer Code: from n/a through 1.4. | [] |
|
GHSA-q6fw-3q9c-jg74 | The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print(). | [] |
|
GHSA-q38m-p7rw-6h5p | In MediaProvider, there is a possible permissions bypass due to SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-140729887 | [] |
|
GHSA-q8m3-2vgv-qgh9 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WP Photo Album Plus: from n/a through 8.5.02.005. | [] |
|
GHSA-hgpg-8wmj-hgr4 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Pages Order allows Reflected XSS. This issue affects Pages Order: from n/a through 1.1.3. | [] |
|
GHSA-f9hv-v3mm-j4mv | Optergy Proton/Enterprise devices allow Username Disclosure. | [] |
|
CVE-1999-1400 | The Economist screen saver 1999 with the "Password Protected" option enabled allows users with physical access to the machine to bypass the screen saver and read files by running Internet Explorer while the screen is still locked. | [
"cpe:2.3:a:the_economist:the_economist_1999_screen_saver:*:*:*:*:*:*:*:*"
] |
|
GHSA-jjc5-cp7j-m4xp | IBM API Connect 2018.1 through 2018.4.1.6 may inadvertently leak sensitive details about internal servers and network via API swagger. IBM X-force ID: 162947. | [] |
|
GHSA-86w6-jjjm-5mx6 | The Evaluate WordPress plugin through 1.0 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup). | [] |
|
CVE-2019-0232 | When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/). | [
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-75xc-rff6-hh5r | Red Hat JBoss Fuse before 6.2.0 allows remote authenticated users to bypass intended restrictions and access the HawtIO console by leveraging an account defined in the users.properties file. | [] |
|
GHSA-2jrq-xvh8-r648 | Potential Time-of-Check to Time-of Use (TOCTOU) vulnerabilities have been identified in the HP BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure. | [] |
|
GHSA-3f5r-8cpv-jgc3 | Johnson & Johnson Animas OneTouch Ping devices allow remote attackers to bypass authentication via replay attacks. | [] |
|
CVE-2020-3137 | Cisco Email Security Appliance Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because the web-based management interface of the affected device does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information. | [
"cpe:2.3:a:cisco:email_security_appliance:*:*:*:*:*:*:*:*"
] |
Subsets and Splits