id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
12.4k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-94mw-4r68-8h9f | User could gain access to secure memory due to incorrect argument into address range validation api used in SDI to capture requested contents in Snapdragon Industrial IOT, Snapdragon Mobile | [] |
|
GHSA-rrvf-5w4r-3x7v | Apache Zeppelin vulnerable to cross-site scripting in the helium module | Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin.Attackers can modify `helium.json` and perform cross-site scripting attacks on normal users. This issue affects Apache Zeppelin: from 0.8.2 before 0.11.1.Users are recommended to upgrade to version 0.11.1, which fixes the issue. | [] |
GHSA-gv87-4wrx-xhh7 | Helix GNOME Updater helix-update 0.5 and earlier allows local users to install arbitrary RPM packages by creating the /tmp/helix-install installation directory before root has begun installing packages. | [] |
|
GHSA-57w8-4258-hhvg | libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing. | [] |
|
CVE-2025-22303 | WordPress WP Mailster plugin <= 1.8.17.0 - Sensitive Data Exposure vulnerability | Insertion of Sensitive Information Into Sent Data vulnerability in brandtoss WP Mailster allows Retrieve Embedded Sensitive Data.This issue affects WP Mailster: from n/a through 1.8.17.0. | [] |
GHSA-2x2h-mgrr-fp68 | A buffer overflow vulnerability has been found in the baremetal component of Apache CloudStack. This applies to all versions prior to 4.13.1. The vulnerability is due to the lack of validation of the mac parameter in baremetal virtual router. If you insert an arbitrary shell command into the mac parameter, v-router will process the command. For example: Normal: http://{GW}:10086/baremetal/provisiondone/{mac}, Abnormal: http://{GW}:10086/baremetal/provisiondone/#';whoami;#. Mitigation of this issue is an upgrade to Apache CloudStack 4.13.1.0 or beyond. | [] |
|
CVE-2022-3388 | Input Validation Vulnerability in Hitachi Energy’s MicroSCADA Pro/X SYS600 Products |
An input validation vulnerability exists in the Monitor Pro interface of MicroSCADA
Pro and MicroSCADA X SYS600. An authenticated user can launch an administrator level remote code execution irrespective of the authenticated user's role.
| [
"cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_x_sys600:10:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_x_sys600:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_x_sys600:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4:*:*:*:*:*:*:*"
] |
CVE-2021-1132 | Cisco Network Services Orchestrator Path Traversal Vulnerability | A vulnerability in the API subsystem and in the web-management interface of Cisco Network Services Orchestrator (NSO) could allow an unauthenticated, remote attacker to access sensitive data.
This vulnerability exists because the web-management interface and certain HTTP-based APIs do not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | [
"cpe:2.3:a:cisco:network_services_orchestrator:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:network_services_orchestrator:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:network_services_orchestrator:5.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:network_services_orchestrator:5.4.0.2:*:*:*:*:*:*:*"
] |
GHSA-5xph-62q2-pxff | libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake. | [] |
|
CVE-2021-43355 | Fresenius Kabi Agilia Connect Infusion System use of client side authentication | Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 allows user input to be validated on the client side without authentication by the server. The server should not rely on the correctness of the data because users might not support or block JavaScript or intentionally bypass the client-side checks. An attacker with knowledge of the service user could circumvent the client-side control and login with service privileges. | [
"cpe:2.3:a:fresenius-kabi:agilia_partner_maintenance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:vigilant_centerium:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:vigilant_insight:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fresenius-kabi:vigilant_mastermed:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fresenius-kabi:agilia_connect_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fresenius-kabi:agilia_connect:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fresenius-kabi:link\\+_agilia_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fresenius-kabi:link\\+_agilia_firmware:3.0:-:*:*:*:*:*:*",
"cpe:2.3:o:fresenius-kabi:link\\+_agilia_firmware:3.0:d15:*:*:*:*:*:*",
"cpe:2.3:h:fresenius-kabi:link\\+_agilia:-:*:*:*:*:*:*:*"
] |
CVE-2019-11350 | CloudBees Jenkins Operations Center 2.150.2.3, when an expired trial license exists, allows Cleartext Password Storage and Retrieval via the proxy configuration page. | [
"cpe:2.3:a:cloudbees:jenkins_operations_center:2.150.2.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-21784 | An out-of-bounds write vulnerability exists in the JPG format SOF marker processing of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:accusoft:imagegear:19.8:*:*:*:*:*:*:*"
] |
|
CVE-2022-20883 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. | [
"cpe:2.3:o:cisco:rv215w_firmware:1.0.3.55:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.0.3.55:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_firmware:1.0.3.55:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.0.3.55:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
] |
CVE-2024-51465 | IBM App Connect Enterprise Certified Container command execution | IBM App Connect Enterprise Certified Container 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, and 12.3 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. | [
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:app_connect_enterprise_certified_container:12.3:*:*:*:*:*:*:*"
] |
GHSA-963p-r75x-r5f8 | The Social Share Buttons by Supsystic WordPress plugin before 2.2.4 does not perform CSRF checks in it's ajax endpoints and admin pages, allowing an attacker to trick any logged in user to manipulate or change the plugin settings, as well as create, delete and rename projects and networks. | [] |
|
GHSA-mxhc-qwjr-6vh5 | The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes. | [] |
|
GHSA-c9c3-h47g-8r8j | The Listamester plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'listamester' shortcode in all versions up to, and including, 2.3.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2020-7021 | Elasticsearch versions before 7.10.0 and 6.8.14 have an information disclosure issue when audit logging and the emit_request_body option is enabled. The Elasticsearch audit log could contain sensitive information such as password hashes or authentication tokens. This could allow an Elasticsearch administrator to view these details. | [
"cpe:2.3:a:elastic:elasticsearch:*:*:*:*:*:*:*:*"
] |
|
GHSA-jr84-3q6c-4x89 | Win32 File Enumeration Remote Code Execution Vulnerability. | [] |
|
CVE-2018-5113 | The "browser.identity.launchWebAuthFlow" function of WebExtensions is only allowed to load content over "https:" but this requirement was not properly enforced. This can potentially allow privileged pages to be loaded by the extension. This vulnerability affects Firefox < 58. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] |
|
CVE-2020-10271 | RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poorly secured wireless networks and open wired ones | MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the ROS computational graph can be accessed fully from the wired exposed ports. In combination with other flaws such as CVE-2020-10269, the computation graph can also be fetched and interacted from wireless networks. This allows a malicious operator to take control of the ROS logic and correspondingly, the complete robot given that MiR's operations are centered around the framework (ROS). | [
"cpe:2.3:o:aliasrobotics:mir100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aliasrobotics:mir100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aliasrobotics:mir200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aliasrobotics:mir200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aliasrobotics:mir250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aliasrobotics:mir250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aliasrobotics:mir500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aliasrobotics:mir500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:aliasrobotics:mir1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:aliasrobotics:mir1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mobile-industrial-robotics:er200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mobile-industrial-robotics:er200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:enabled-robotics:er-lite_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:enabled-robotics:er-lite:-:*:*:*:*:*:*:*",
"cpe:2.3:o:enabled-robotics:er-flex_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:enabled-robotics:er-flex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:enabled-robotics:er-one_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:enabled-robotics:er-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:uvd-robots:uvd_robots_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:uvd-robots:uvd_robots:-:*:*:*:*:*:*:*"
] |
GHSA-3xxh-w577-324m | The Spectra WordPress plugin before 1.15.0 does not sanitize user input as it reaches its style HTML attribute, allowing contributors to conduct stored XSS attacks via the plugin's Gutenberg blocks. | [] |
|
GHSA-vq7h-555j-gv4h | Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Database Server 10.2.0.3, 10.2.0.4, 10.2.0.5, and 11.1.0.7, and Oracle Enterprise Manager Grid Control, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security Framework. | [] |
|
GHSA-pr2g-cv9x-9fg3 | The OS/2 or POSIX subsystem in NT is enabled. | [] |
|
GHSA-h8g4-jwjc-gf58 | The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3. | [] |
|
GHSA-4j46-w4mp-vj6h | The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash). | [] |
|
CVE-2022-3270 | Incomplete Documentation of remote functions in FESTO products. | In multiple products by Festo a remote unauthenticated attacker could use functions of an undocumented protocol which could lead to a complete loss of confidentiality, integrity and availability.
| [
"cpe:2.3:o:festo:bus_module_cpx-e-ep_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_module_cpx-e-ep:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-fb32_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-fb32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-fb33_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-fb33:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-fb36_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-fb36:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-fb37_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-fb37:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-fb39_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-fb39:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-fb40_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-fb40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-fb43_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-fb43:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-m-fb34_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-m-fb34:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-m-fb35_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-m-fb35:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-m-fb44_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-m-fb44:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cpx-m-fb45_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cpx-m-fb45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cteu-ep_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cteu-ep:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cteu-pn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cteu-pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:bus_node_cteu-pn-ex1c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:bus_node_cteu-pn-ex1c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:camera_system_chb-c-n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:camera_system_chb-c-n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:cecx-x-c1_modular_master_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:cecx-x-c1_modular_master_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:cecx-x-m1_modular_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:cecx-x-m1_modular_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:compact_vision_system_sboc-c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:compact_vision_system_sboc-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:compact_vision_system_sboc-m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:compact_vision_system_sboc-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:compact_vision_system_sboc-q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:compact_vision_system_sboc-q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:compact_vision_system_sboi-c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:compact_vision_system_sboi-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:compact_vision_system_sboi-m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:compact_vision_system_sboi-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:compact_vision_system_sboi-q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:compact_vision_system_sboi-q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:control_block_cpx-cec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:control_block_cpx-cec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:control_block_cpx-cec-c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:control_block_cpx-cec-c1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:control_block_cpx-cec-c1-v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:control_block_cpx-cec-c1-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:control_block_cpx-cec-m1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:control_block_cpx-cec-m1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:control_block_cpx-cec-m1-v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:control_block_cpx-cec-m1-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:control_block_cpx-cec-s1-v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:control_block_cpx-cec-s1-v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:control_block_cpx-cmxx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:control_block_cpx-cmxx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:control_block_cpx-fec-1-ie_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:control_block_cpx-fec-1-ie:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cecc-d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cecc-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cecc-d-ba_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cecc-d-ba:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cecc-lk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cecc-lk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cecc-s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cecc-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cecc-x-m1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cecc-x-m1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cecc-x-m1-mv_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cecc-x-m1-mv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cecc-x-m1-mv-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cecc-x-m1-mv-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cecc-x-m1-y-yjkp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cecc-x-m1-y-yjkp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cecc-x-m1-ys-l1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cecc-x-m1-ys-l1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cecc-x-m1-ys-l2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cecc-x-m1-ys-l2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_cmxh-st2-c5-7-diop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_cmxh-st2-c5-7-diop:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:controller_sbrd-q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:controller_sbrd-q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:ethernet\\/ip_interface_cpx-ap-i-ep-m12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:ethernet\\/ip_interface_cpx-ap-i-ep-m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:ethernet\\/ip_interface_cpx-ap-i-pn-m12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:ethernet\\/ip_interface_cpx-ap-i-pn-m12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:gateway_cpx-iot_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:gateway_cpx-iot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:integrated_drive_emca-ec-67_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:integrated_drive_emca-ec-67:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:integrated_drive_emca-ec-67-m-1te-ep_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:integrated_drive_emca-ec-67-m-1te-ep:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmo-st-c5-1-dion_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmo-st-c5-1-dion:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmo-st-c5-1-diop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmo-st-c5-1-diop:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmo-st-c5-1-lkp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmo-st-c5-1-lkp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmp-as-c10-11a-p3-m0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmp-as-c10-11a-p3-m0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmp-as-c10-11a-p3-m3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmp-as-c10-11a-p3-m3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmp-as-c15-11a-p3-m3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmp-as-c15-11a-p3-m3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmp-as-c2-3a-m0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmp-as-c2-3a-m0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmp-as-c2-3a-m3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmp-as-c2-3a-m3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmp-as-c5-11a-p3-m0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmp-as-c5-11a-p3-m0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmp-as-c5-11a-p3-m3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmp-as-c5-11a-p3-m3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmp-as-c5-3a-m0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmp-as-c5-3a-m0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:motor_controller_cmmp-as-c5-3a-m3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:motor_controller_cmmp-as-c5-3a-m3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:operator_unit_cdpx-x-a-s-10_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:operator_unit_cdpx-x-a-s-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:operator_unit_cdpx-x-a-w-13_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:operator_unit_cdpx-x-a-w-13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:operator_unit_cdpx-x-a-w-4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:operator_unit_cdpx-x-a-w-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:operator_unit_cdpx-x-a-w-7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:operator_unit_cdpx-x-a-w-7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:planar_surface_gantry_excm-30_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:planar_surface_gantry_excm-30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:planar_surface_gantry_excm-40_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:planar_surface_gantry_excm-40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c12-11a-p3-ec-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c12-11a-p3-ec-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c12-11a-p3-ep-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c12-11a-p3-ep-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c12-11a-p3-mp-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c12-11a-p3-mp-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c12-11a-p3-pn-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c12-11a-p3-pn-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c2-11a-p3-ec-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c2-11a-p3-ec-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c2-11a-p3-ep-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c2-11a-p3-ep-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c2-11a-p3-mp-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c2-11a-p3-mp-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c2-11a-p3-pn-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c2-11a-p3-pn-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c2-3a-ec-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c2-3a-ec-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c2-3a-ep-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c2-3a-ep-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c2-3a-mp-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c2-3a-mp-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c2-3a-pn-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c2-3a-pn-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c3-11a-p3-ec-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c3-11a-p3-ec-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c3-11a-p3-ep-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c3-11a-p3-ep-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c3-11a-p3-mp-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c3-11a-p3-mp-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c3-11a-p3-pn-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c3-11a-p3-pn-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c4-3a-ec-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c4-3a-ec-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c4-3a-ep-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c4-3a-ep-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c4-3a-mp-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c4-3a-mp-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c4-3a-pn-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c4-3a-pn-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c5-11a-p3-ec-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c5-11a-p3-ec-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c5-11a-p3-ep-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c5-11a-p3-ep-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c5-11a-p3-mp-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c5-11a-p3-mp-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c5-11a-p3-pn-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c5-11a-p3-pn-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c7-11a-p3-ec-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c7-11a-p3-ec-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c7-11a-p3-ep-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c7-11a-p3-ep-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c7-11a-p3-mp-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c7-11a-p3-mp-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_cmmt-as-c7-11a-p3-pn-s1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_cmmt-as-c7-11a-p3-pn-s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_drive_cmmt-st-c8-1c-ep-s0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_drive_cmmt-st-c8-1c-ep-s0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:servo_drive_cmmt-st-c8-1c-pn-s0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:servo_drive_cmmt-st-c8-1c-pn-s0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:vtem-s1-27_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:vtem-s1-27:-:*:*:*:*:*:*:*",
"cpe:2.3:o:festo:vtem-s1-c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:festo:vtem-s1-c:-:*:*:*:*:*:*:*"
] |
CVE-2017-18517 | The bws-pinterest plugin before 1.0.5 for WordPress has multiple XSS issues. | [
"cpe:2.3:a:bestwebsoft:pinterest:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2022-35097 | SWFTools commit 772e55a2 was discovered to contain a segmentation violation via FoFiTrueType::writeTTF at /xpdf/FoFiTrueType.cc. | [
"cpe:2.3:a:swftools:swftools:2021-12-16:*:*:*:*:*:*:*"
] |
|
GHSA-5h7f-mpgw-cxcq | The Spiceworks TFTP Server, as distributed with Spiceworks Inventory 7.5, allows remote attackers to access the Spiceworks data\configurations directory by leveraging the unauthenticated nature of the TFTP service for all clients who can reach UDP port 69, as demonstrated by a WRQ (aka Write request) operation for a configuration file or an executable file. | [] |
|
CVE-2019-16070 | A number of stored Cross-site Scripting (XSS) vulnerabilities were identified in NETSAS Enigma NMS 65.0.0 and prior that could allow a threat actor to inject malicious code directly into the application through web application form inputs. | [
"cpe:2.3:a:netsas:enigma_network_management_solution:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-9044 | Metasys Improper Restriction of XML External Entity Reference | XXE vulnerability exists in the Metasys family of product Web Services which has the potential to facilitate DoS attacks or harvesting of ASCII server files. This affects Johnson Controls' Metasys Application and Data Server (ADS, ADS-Lite) versions 10.1 and prior; Metasys Extended Application and Data Server (ADX) versions 10.1 and prior; Metasys Open Data Server (ODS) versions 10.1 and prior; Metasys Open Application Server (OAS) version 10.1; Metasys Network Automation Engine (NAE55 only) versions 9.0.1, 9.0.2, 9.0.3, 9.0.5, 9.0.6; Metasys Network Integration Engine (NIE55/NIE59) versions 9.0.1, 9.0.2, 9.0.3, 9.0.5, 9.0.6; Metasys NAE85 and NIE85 versions 10.1 and prior; Metasys LonWorks Control Server (LCS) versions 10.1 and prior; Metasys System Configuration Tool (SCT) versions 13.2 and prior; Metasys Smoke Control Network Automation Engine (NAE55, UL 864 UUKL/ORD-C100-13 UUKLC 10th Edition Listed) version 8.1. | [
"cpe:2.3:a:johnsoncontrols:metasys_application_and_data_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:johnsoncontrols:metasys_application_and_data_server:*:*:*:*:lite:*:*:*",
"cpe:2.3:a:johnsoncontrols:metasys_extended_application_and_data_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:johnsoncontrols:metasys_lonworks_control_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:johnsoncontrols:metasys_open_application_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:johnsoncontrols:metasys_open_data_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:johnsoncontrols:metasys_system_configuration_tool:*:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nae55_firmware:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nae55_firmware:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nae55_firmware:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nae55_firmware:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nae55_firmware:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:johnsoncontrols:nae55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie55_firmware:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie55_firmware:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie55_firmware:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie55_firmware:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie55_firmware:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:johnsoncontrols:nie55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie59_firmware:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie59_firmware:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie59_firmware:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie59_firmware:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie59_firmware:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:johnsoncontrols:nie59:-:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nae85_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:johnsoncontrols:nae85:-:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nie85_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:johnsoncontrols:nie85:-:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:nae55_firmware:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:ul_864_uukl_firmware:8.1:*:*:*:*:*:*:*",
"cpe:2.3:h:johnsoncontrols:ul_864_uukl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:johnsoncontrols:ord-c100-13_uuklc_firmware:8.1:*:*:*:*:*:*:*",
"cpe:2.3:h:johnsoncontrols:ord-c100-13_uuklc:-:*:*:*:*:*:*:*"
] |
CVE-2024-53817 | WordPress Acowebs Product Labels For Woocommerce plugin <= 1.5.8 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Acowebs Product Labels For Woocommerce allows Blind SQL Injection.This issue affects Product Labels For Woocommerce: from n/a through 1.5.8. | [] |
GHSA-xr3h-9vvm-4975 | CRLF injection vulnerability on KDDI HOME SPOT CUBE devices before 2 allows remote attackers to inject arbitrary HTTP headers via unspecified vectors. | [] |
|
CVE-2022-1440 | Command Injection vulnerability in [email protected] in yarkeev/git-interface | Command Injection vulnerability in [email protected] in GitHub repository yarkeev/git-interface prior to 2.1.2. If both are provided by user input, then the use of a `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker. | [
"cpe:2.3:a:git-interface_project:git-interface:*:*:*:*:*:node.js:*:*"
] |
GHSA-vfj7-pjwx-gmgc | An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1131, CVE-2020-1134, CVE-2020-1144, CVE-2020-1184, CVE-2020-1185, CVE-2020-1186, CVE-2020-1187, CVE-2020-1188, CVE-2020-1189, CVE-2020-1190, CVE-2020-1191. | [] |
|
GHSA-rh8r-r3vj-9w4g | Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335. | [] |
|
CVE-2023-29772 | A Cross-site scripting (XSS) vulnerability in the System Log/General Log page of the administrator web UI in ASUS RT-AC51U wireless router firmware version up to and including 3.0.0.4.380.8591 allows remote attackers to inject arbitrary web script or HTML via a malicious network request. | [
"cpe:2.3:o:asus:rt-ac51u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac51u:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-37712 | Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links | The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include a directory with one form of the path, followed by a symbolic link with a different string that resolves to the same file system entity, followed by a file using the first form. By first creating a directory, and then replacing that directory with a symlink that had a different apparent name that resolved to the same entry in the filesystem, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and 6.1.9. The v3 branch of node-tar has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of node-tar. If this is not possible, a workaround is available in the referenced GHSA-qq89-hq3f-393p. | [
"cpe:2.3:a:npmjs:tar:*:*:*:*:*:node.js:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:graalvm:20.3.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.2.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"
] |
GHSA-pp2f-p95f-2xhx | Microsoft SQL Server 6.0 through 2000, with SQL Authentication enabled, uses weak password encryption (XOR), which allows remote attackers to sniff and decrypt the password. | [] |
|
CVE-2014-8480 | The instruction decoder in arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel before 3.18-rc2 lacks intended decoder-table flags for certain RIP-relative instructions, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a crafted application. | [
"cpe:2.3:o:linux:linux_kernel:*:rc1:*:*:*:*:*:*"
] |
|
GHSA-j3wj-mf3m-r9xc | A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neither the presence of the mapping nor page writability were taken into account. | [] |
|
CVE-2014-6827 | The DK ONLINE Beta (aka com.sgmobile.dkonline) application 1.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:halgame:dk_online_beta:1.0.2:*:*:*:*:android:*:*"
] |
|
GHSA-qwr8-7rmj-xq9j | A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. A local attacker may be able to view contacts from the lock screen. | [] |
|
GHSA-f46x-3892-wxwq | Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, allow attackers to trigger a use-after-free and execute arbitrary code because JavaScript is mishandled. | [] |
|
GHSA-mhgr-3vxf-9f79 | Remote code execution was discovered in Horde Groupware Webmail 5.2.22 and 5.2.17. Horde/Form/Type.php contains a vulnerable class that handles image upload in forms. When the Horde_Form_Type_image method onSubmit() is called on uploads, it invokes the functions getImage() and _getUpload(), which uses unsanitized user input as a path to save the image. The unsanitized POST parameter object[photo][img][file] is saved in the $upload[img][file] PHP variable, allowing an attacker to manipulate the $tmp_file passed to move_uploaded_file() to save the uploaded file. By setting the parameter to (for example) ../usr/share/horde/static/bd.php, one can write a PHP backdoor inside the web root. The static/ destination folder is a good candidate to drop the backdoor because it is always writable in Horde installations. (The unsanitized POST parameter went probably unnoticed because it's never submitted by the forms, which default to securely using a random path.) | [] |
|
CVE-2025-21270 | Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | [] |
GHSA-4vx4-3qfh-m6gm | Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash). | [] |
|
CVE-2022-0991 | Insufficient Session Expiration in admidio/admidio | Insufficient Session Expiration in GitHub repository admidio/admidio prior to 4.1.9. | [
"cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*"
] |
GHSA-2p2f-w34f-c527 | The frag3 preprocessor in Sourcefire Snort 2.4.3 does not properly reassemble certain fragmented packets with IP options, which allows remote attackers to evade detection of certain attacks, possibly related to IP option lengths. | [] |
|
GHSA-qpj5-r5g2-7h68 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Experts Team WP EASY RECIPE allows Stored XSS.This issue affects WP EASY RECIPE: from n/a through 1.6. | [] |
|
CVE-2023-20561 |
Insufficient validation of the IOCTL (Input Output Control) input buffer in AMD μProf may allow an authenticated user to send an arbitrary address potentially resulting in a Windows crash leading to denial of service.
| [
"cpe:2.3:a:amd:amd_uprof:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
CVE-2013-1435 | (1) snmp.php and (2) rrd.php in Cacti before 0.8.8b allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors. | [
"cpe:2.3:a:cacti:cacti:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6b:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6e:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6f:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6g:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6h:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6i:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6j:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.6k:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7b:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7c:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7d:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7e:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7f:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7g:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7h:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.7i:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cacti:cacti:0.8.8a:*:*:*:*:*:*:*"
] |
|
CVE-2024-7149 | Event Manager, Events Calendar, Tickets, Registrations – Eventin <= 4.0.8 - Authenticated (Contributor+) Local File Inclusion | The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.8 via multiple style parameters. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. | [
"cpe:2.3:a:themewinter:eventin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*"
] |
GHSA-q2cj-g3jg-cp49 | ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitialized when processing an XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process that includes sensitive information, that information sometimes can be leaked via the image data. | [] |
|
GHSA-6w72-cgpx-qmf9 | The GittiGidiyor (aka com.gittigidiyormobil) application 1.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2016-7993 | A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM). | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-6418 | SQL injection in Voovi Social Networking Script | A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via videos.php in the id parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application. | [
"cpe:2.3:a:aatifaneeq:voovi:1.0:*:*:*:*:*:*:*"
] |
GHSA-h993-2j82-ghgv | Use-after-free vulnerability in core/xml/XMLHttpRequest.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger multiple conflicting uses of the same XMLHttpRequest object. | [] |
|
CVE-2024-27920 | Unsigned code template execution through workflows in projectdiscovery/nuclei | projectdiscovery/nuclei is a fast and customisable vulnerability scanner based on simple YAML based DSL. A significant security oversight was identified in Nuclei v3, involving the execution of unsigned code templates through workflows. This vulnerability specifically affects users utilizing custom workflows, potentially allowing the execution of malicious code on the user's system. This advisory outlines the impacted users, provides details on the security patch, and suggests mitigation strategies. The vulnerability is addressed in Nuclei v3.2.0. Users are strongly recommended to update to this version to mitigate the security risk. Users should refrain from using custom workflows if unable to upgrade immediately. Only trusted, verified workflows should be executed. | [] |
GHSA-8pf3-gxq5-866q | Ice Hrm 30.0.0.OS was discovered to contain multiple reflected cross-site scripting (XSS) vulnerabilities via the "key" and "fm" parameters in the component login.php. | [] |
|
GHSA-jf98-49c3-8w82 | ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet. | [] |
|
CVE-2020-7940 | Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to set weak passwords, leading to easier cracking. | [
"cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-23704 | In onCreate of WifiDialogActivity.java, there is a possible way to bypass the DISALLOW_ADD_WIFI_CONFIG restriction due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
] |
|
GHSA-cxfc-hq29-wmm6 | Open edX through Lilac.1 allows XSS in common/static/common/js/discussion/utils.js via crafted LaTeX content within a discussion. | [] |
|
CVE-2007-4031 | Directory traversal vulnerability in a certain ActiveX control in Nessus Vulnerability Scanner 3.0.6 allows remote attackers to delete arbitrary files via a .. (dot dot) in the argument to the deleteReport method, probably related to the SCANCTRL.ScanCtrlCtrl.1 ActiveX control in scan.dll. | [
"cpe:2.3:a:nessus:vulnerability_scanner:3.0.6:*:*:*:*:*:*:*"
] |
|
CVE-2010-4555 | Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) drop-down selection lists, (2) the > (greater than) character in the SquirrelSpell spellchecking plugin, and (3) errors associated with the Index Order (aka options_order) page. | [
"cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.3pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.3pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.4pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.4pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.5pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:0.5pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0pre1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0pre2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.0pre3:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:rc2a:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.0-r1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r2:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r3:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r4:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.2-r5:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:r3:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.3aa:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_cvs:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.8.4fc6:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.9a:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.10a:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.15rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:squirrelmail:squirrelmail:1.4.20:*:*:*:*:*:*:*"
] |
|
GHSA-gp57-h4hf-v8gp | Buffer overflow vulnerability in Immunity Debugger affecting version 1.85, its exploitation could allow a local attacker to execute arbitrary code, due to the lack of proper boundary checking. | [] |
|
GHSA-rwg4-2f3r-qq47 | A vulnerability in the Zone-Based Firewall feature of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to pass traffic that should otherwise have been dropped based on the configuration. More Information: CSCuz21015. Known Affected Releases: 15.3(3)M3. Known Fixed Releases: 15.6(2)T0.1 15.6(2.0.1a)T0 15.6(2.19)T 15.6(3)M. | [] |
|
GHSA-97rg-9gmc-jmqp | The Bizapp for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'error' parameter in all versions up to, and including, 2.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
CVE-2005-2817 | Simple Machines Forum (SMF) 1-0-5 and earlier supports the use of URLs for avatar images, which allows remote attackers to monitor sensitive information of forum visitors such as IP address and user agent, as demonstrated using a PHP script on a malicious server. | [
"cpe:2.3:a:simple_machines:simple_machines_forum:1.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-39p8-pjhj-qfm8 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] |
|
GHSA-jc65-rh6v-pv5p | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor Pro allows Reflected XSS.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17. | [] |
|
CVE-2014-2426 | Unspecified vulnerability in the Oracle OpenSSO component in Oracle Fusion Middleware 8.0 Update 2 Patch 5 allows remote authenticated users to affect integrity and availability via unknown vectors related to Admin Console. | [
"cpe:2.3:a:oracle:fusion_middleware:8.0:update2_patch5:*:*:*:*:*:*"
] |
|
CVE-2019-9817 | Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird < 60.7, Firefox < 67, and Firefox ESR < 60.7. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-27347 | WordPress Direct Checkout Button for WooCommerce plugin <= 1.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in techmix Direct Checkout Button for WooCommerce allows Stored XSS. This issue affects Direct Checkout Button for WooCommerce: from n/a through 1.0. | [] |
GHSA-779w-wqpf-gq64 | MobileIron Core and Connector before 10.3.0.4, 10.4.x before 10.4.0.4, 10.5.x before 10.5.1.1, 10.5.2.x before 10.5.2.1, and 10.6.x before 10.6.0.1, and Sentry before 9.7.3 and 9.8.x before 9.8.1, allow remote attackers to execute arbitrary code via unspecified vectors. | [] |
|
GHSA-xpcm-qv2j-fxfr | FreeBSD kernel 4.6 and earlier closes the file descriptors 0, 1, and 2 after they have already been assigned to /dev/null when the descriptors reference procfs or linprocfs, which could allow local users to reuse the file descriptors in a setuid or setgid program to modify critical data and gain privileges. | [] |
|
CVE-2023-46082 | WordPress Broken Link Checker | Finder plugin <= 2.4.2 - Broken Access Control vulnerability | Missing Authorization vulnerability in Cyberlord92 Broken Link Checker | Finder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Broken Link Checker | Finder: from n/a through 2.4.2. | [] |
CVE-2024-20396 | A vulnerability in the protocol handlers of Cisco Webex App could allow an unauthenticated, remote attacker to gain access to sensitive information.
This vulnerability exists because the affected application does not safely handle file protocol handlers. An attacker could exploit this vulnerability by persuading a user to follow a link that is designed to cause the application to send requests. If the attacker can observe transmitted traffic in a privileged network position, a successful exploit could allow the attacker to capture sensitive information, including credential information, from the requests. | [] |
|
CVE-2015-2944 | Multiple cross-site scripting (XSS) vulnerabilities in Apache Sling API before 2.2.2 and Apache Sling Servlets Post before 2.1.2 allow remote attackers to inject arbitrary web script or HTML via the URI, related to (1) org/apache/sling/api/servlets/HtmlResponse and (2) org/apache/sling/servlets/post/HtmlResponse. | [
"cpe:2.3:a:apache:sling_api:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:sling_servlets_post:*:*:*:*:*:*:*:*"
] |
|
GHSA-28fw-fj88-q3vr | Multiple cross-site scripting (XSS) vulnerabilities in comments.php in Simplog 0.9.3.2, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) cname (Name) or (2) email parameters. | [] |
|
CVE-2006-0485 | The TCL shell in Cisco IOS 12.2(14)S before 12.2(14)S16, 12.2(18)S before 12.2(18)S11, and certain other releases before 25 January 2006 does not perform Authentication, Authorization, and Accounting (AAA) command authorization checks, which may allow local users to execute IOS EXEC commands that were prohibited via the AAA configuration, aka Bug ID CSCeh73049. | [
"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2mx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2n:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(11\\)yk2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3\\(11\\)yl:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*"
] |
|
GHSA-vp4c-3hqp-3f9q | Vulnerability in the Oracle Common Applications Calendar product of Oracle E-Business Suite (component: Notes). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] |
|
CVE-2020-6786 | Uncontrolled Search Path Element in Bosch Video Recording Manager Installer | Loading a DLL through an Uncontrolled Search Path Element in the Bosch Video Recording Manager installer up to and including version 3.82.0055 for 3.82, up to and including version 3.81.0064 for 3.81 and 3.71 and older potentially allows an attacker to execute arbitrary code on a victim's system. A prerequisite is that the victim is tricked into placing a malicious DLL in the same directory where the installer is started from. | [
"cpe:2.3:a:bosch:video_recording_manager:*:*:*:*:*:*:*:*"
] |
CVE-2024-8258 | Insecure Electron Fuses in Logitech Options Plus Allowing Arbitrary Code Execution on macOS | Improper Control of Generation of Code ('Code Injection') in Electron Fuses in Logitech Options Plus version 1.60.496306 on macOS allows attackers to execute arbitrary code via insecure Electron Fuses configuration. | [
"cpe:2.3:a:logitech:options_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:logitech:logi_options\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] |
GHSA-w7vp-fx35-p349 | Adobe Bridge version 11.0 (and earlier) is affected by an out-of-bounds write vulnerability when parsing TTF files that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
GHSA-6h5w-jv7j-9v38 | Cross-site scripting (XSS) vulnerability in viewCart.asp in CartWIZ allows remote attackers to inject arbitrary web script or HTML via the message parameter. | [] |
|
CVE-2006-6078 | PHP remote file inclusion vulnerability in common.inc.php in a-ConMan 3.2 beta allows remote attackers to execute arbitrary PHP code via a URL in the cm_basedir parameter. | [
"cpe:2.3:a:a-conman:a-conman:3.2_beta:*:*:*:*:*:*:*"
] |
|
CVE-2014-2722 | In FortiBalancer 400, 1000, 2000 and 3000, a platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect. | [
"cpe:2.3:o:fortinet:fortibalancer_400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortibalancer_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortibalancer_1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortibalancer_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortibalancer_2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortibalancer_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortibalancer_3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fortinet:fortibalancer_3000:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-6969 | VMware Tools (10.x and prior before 10.3.0) contains an out-of-bounds read vulnerability in HGFS. Successful exploitation of this issue may lead to information disclosure or may allow attackers to escalate their privileges on the guest VMs. In order to be able to exploit this issue, file sharing must be enabled. | [
"cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:*"
] |
|
GHSA-x3g5-323w-687m | Cross-site scripting (XSS) vulnerability in Calcium 3.10.1 allows remote attackers to inject arbitrary web script or HTML via the EventText parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
GHSA-x33h-vmcc-qx88 | Double Free in VLC versions <= 3.0.6 leads to a crash. | [] |
|
CVE-2025-0833 | Stored Cross-site Scripting (XSS) vulnerability affecting Route Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2024x | A stored Cross-site Scripting (XSS) vulnerability affecting Route Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session. | [] |
CVE-2005-2085 | Buffer overflow in Inframail Advantage Server Edition 6.0 through 6.7 allows remote attackers to cause a denial of service (process crash) via a long (1) SMTP FROM field or possibly (2) FTP NLST command. | [
"cpe:2.3:a:infradig_systems:inframail_advantage:server_6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:infradig_systems:inframail_advantage:server_6.7:*:*:*:*:*:*:*"
] |
|
CVE-2017-7316 | An issue was discovered on Humax Digital HG100R 2.0.6 devices. There is XSS on the 404 page. | [
"cpe:2.3:o:humaxdigital:hg100r_firmware:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:h:humaxdigital:hg100r:-:*:*:*:*:*:*:*"
] |
|
GHSA-rvwp-x3pv-c87j | CarbonFTP v1.4 uses insecure proprietary password encryption with a hard-coded weak encryption key. The key for local FTP server passwords is hard-coded in the binary. | [] |
|
GHSA-497c-86pp-222m | During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | [] |
|
GHSA-4f8x-8m63-7qx4 | In lwis_top_register_io of lwis_device_top.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205995178References: N/A | [] |
|
CVE-2025-26776 | WordPress Chaty Pro Plugin <= 3.3.3 - Arbitrary File Upload vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in NotFound Chaty Pro allows Upload a Web Shell to a Web Server. This issue affects Chaty Pro: from n/a through 3.3.3. | [] |
Subsets and Splits