id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-wxgf-7f8j-hr6j
|
In the Linux kernel, the following vulnerability has been resolved:capabilities: fix potential memleak on error path from vfs_getxattr_alloc()In cap_inode_getsecurity(), we will use vfs_getxattr_alloc() to
complete the memory allocation of tmpbuf, if we have completed
the memory allocation of tmpbuf, but failed to call handler->get(...),
there will be a memleak in below logic:|-- ret = (int)vfs_getxattr_alloc(mnt_userns, ...)
| /* ^^^ alloc for tmpbuf */
|-- value = krealloc(*xattr_value, error + 1, flags)
| /* ^^^ alloc memory */
|-- error = handler->get(handler, ...)
| /* error! */
|-- *xattr_value = value
| /* xattr_value is &tmpbuf (memory leak!) */So we will try to free(tmpbuf) after vfs_getxattr_alloc() fails to fix it.[PM: subject line and backtrace tweaks]
|
[] |
|
CVE-2017-14695
|
Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.
|
[
"cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2017.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2017.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2017.7.1:*:*:*:*:*:*:*"
] |
|
CVE-2023-32507
|
WordPress Woo Custom Emails plugin <= 2.2 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in wp3sixty Woo Custom Emails allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Woo Custom Emails: from n/a through 2.2.
|
[] |
CVE-2023-45689
|
Arbitrary file read via path traversal in Titan MFT and Titan SFTP servers
|
Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Windows and Linux allows an authenticated attacker with administrative privileges to read any file on the filesystem via path traversal
|
[
"cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:windows:*:*"
] |
GHSA-fjj9-88r7-m7jg
|
Ikarus Virus Utilities T3.1.1.45.0 and possibly T3.1.1.34.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
|
[] |
|
GHSA-p95j-mgmf-79p3
|
Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Viszt Péter's Integration for Szamlazz.hu & WooCommerce plugin <= 5.6.3.2 and Csomagpontok és szállítási címkék WooCommerce-hez plugin <= 1.9.0.2 on WordPress.
|
[] |
|
CVE-2022-20766
|
Cisco ATA 190 Series Analog Telephone Adapter firmware Cisco Discovery Protocol Denial of Service Vulnerability
|
A vulnerability in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Adaptive Telephone Adapter firmware could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to an out-of-bounds read when processing Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol packets to an affected device. A successful exploit could allow the attacker to cause a service restart.Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[
"cpe:2.3:o:cisco:ata_190_firmware:*:*:*:*:*:*:*:*"
] |
CVE-2019-15246
|
Cisco SPA100 Series Analog Telephone Adapters Remote Code Execution Vulnerabilities
|
Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default.
|
[
"cpe:2.3:o:cisco:spa112_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr3:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa112_firmware:1.4.1:sr4:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa112:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr3:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa122_firmware:1.4.1:sr4:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa122:-:*:*:*:*:*:*:*"
] |
GHSA-8jjw-549q-phxx
|
Cross-site scripting (XSS) vulnerability in index.cfm in Hot Banana Web Content Management Suite 5.3 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter.
|
[] |
|
CVE-2021-43171
|
Improper verification of applications' cryptographic signatures in the /e/OS app store client App Lounge before 0.19q allows attackers in control of the application server to install malicious applications on user's systems by altering the server's API response.
|
[
"cpe:2.3:a:e.foundation:app_lounge:*:*:*:*:*:android:*:*"
] |
|
GHSA-8494-46x8-7v5x
|
SQL injection vulnerability in index.php in WebPortal CMS 0.6.0 and earlier allows remote attackers to execute arbitrary SQL commands via the m parameter.
|
[] |
|
CVE-2016-2437
|
The NVIDIA video driver in Android before 2016-05-01 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 27436822.
|
[
"cpe:2.3:h:google:nexus_9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-22513
|
WordPress Simple Locator Plugin <= 2.0.4 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Simple Locator allows Reflected XSS. This issue affects Simple Locator: from n/a through 2.0.4.
|
[] |
GHSA-7x3h-4w94-p57x
|
Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[] |
|
CVE-2020-23376
|
NoneCMS v1.3 has a CSRF vulnerability in public/index.php/admin/nav/add.html, as demonstrated by adding a navigation column which can be injected with arbitrary web script or HTML via the name parameter to launch a stored XSS attack.
|
[
"cpe:2.3:a:5none:nonecms:1.3.0:*:*:*:*:*:*:*"
] |
|
GHSA-vggp-p864-ph99
|
LLVM 15.0.0 has a NULL pointer dereference in the parseOneMetadata() function via a crafted pdflatex.fmt file (or perhaps a crafted .o file) to llvm-lto. NOTE: this is disputed because the relationship between pdflatex.fmt and any LLVM language front end is not explained, and because a crash of the llvm-lto application should be categorized as a usability problem.
|
[] |
|
GHSA-mj42-ghgw-62jq
|
Unspecified vulnerability in the Device Manager daemon (utdevmgrd) in Sun Ray Server Software 2.0, 3.0, 3.1, and 3.1.1 allows remote attackers to create or delete arbitrary directories via unspecified vectors.
|
[] |
|
CVE-2006-0778
|
Multiple SQL injection vulnerabilities in XMB Forums 1.9.3 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) $u2u_select array parameter to u2u.inc.php and (2) $val variable (fidpw0 cookie value) in today.php.
|
[
"cpe:2.3:a:xmb_forum:xmb:*:*:*:*:*:*:*:*"
] |
|
GHSA-6mp5-cc46-728g
|
Unspecified vulnerability in the Siebel Core - EAI component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect availability via unknown vectors related to Integration Business Services.
|
[] |
|
CVE-2017-18785
|
Certain NETGEAR devices are affected by XSS. This affects D3600 before 1.0.0.67, D6000 before 1.0.0.67, D6100 before 1.0.0.56, D6200 before 1.1.00.24, D6220 before 1.0.0.32, D6400 before 1.0.0.66, D7000 before 1.0.1.52, D7000v2 before 1.0.0.44, D7800 before 1.0.1.30, D8500 before 1.0.3.35, DGN2200v4 before 1.0.0.96, DGN2200Bv4 before 1.0.0.96, EX2700 before 1.0.1.28, EX6100v2 before 1.0.1.54, EX6150v2 before 1.0.1.54, EX6200v2 before 1.0.1.52, EX6400 before 1.0.1.72, EX7300 before 1.0.1.72, EX8000 before 1.0.0.102, JNR1010v2 before 1.1.0.44, JWNR2010v5 before 1.1.0.44, PR2000 before 1.0.0.20, R6020 before 1.0.0.26, R6080 before 1.0.0.26, R6100 before 1.0.1.20, R6250 before 1.0.4.16, R6300v2 before 1.0.4.18, R6400 before 1.0.1.32, R6400v2 before 1.0.2.46, R6700 before 1.0.1.36, R6800 before 1.2.0.12, R6900v2 before 1.2.0.12, R6700v2 before 1.2.0.12, R6900 before 1.0.1.34, R6900P before 1.3.0.8, R7000 before 1.0.9.18, R7000P before 1.3.0.8, R7100LG before 1.0.0.34, R7300DST before 1.0.0.58, R7500 before 1.0.0.118, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R7900 before 1.0.2.4, R7900P before 1.1.5.14, R8000 before 1.0.4.4, R8000P before 1.1.5.14, R8500 before 1.0.2.110, R8300 before 1.0.2.110, R9000 before 1.0.2.52, WN2000RPTv3 before 1.0.1.8, WN3000RPv3 before 1.0.2.50, WN3100RPv2 before 1.0.0.42, WNDR3400v3 before 1.0.1.16, WNDR3700v4 before 1.0.2.94, WNDR4300 before 1.0.2.96, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, WNR1000v4 before 1.1.0.44, WNR2000v5 before 1.0.0.62, WNR2020 before 1.1.0.44, WNR2050 before 1.1.0.44, and WNR3500Lv2 before 1.2.0.46.
|
[
"cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgn2200:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgn2200b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgn2200b:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex2700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6100:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6150:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6200:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jwnr2010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jwnr2010:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:pr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:pr2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn2000rpt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn2000rpt:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn3000rp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn3000rp:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn3100rp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn3100rp:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr3500l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr3500l:v2:*:*:*:*:*:*:*"
] |
|
GHSA-6v2q-4ppv-m93r
|
Grandstream GWN7000 before 1.0.6.32 and GWN7610 before 1.0.8.18 devices allow remote authenticated users to discover passwords via a /ubus/uci.apply config request.
|
[] |
|
GHSA-5c3w-52hp-vj96
|
The installation of Tarantella Enterprise 3 allows local users to overwrite arbitrary files via a symlink attack on the "spinning" temporary file.
|
[] |
|
GHSA-r9vv-6834-c7fq
|
Win32k Elevation of Privilege Vulnerability
|
[] |
|
CVE-2025-21459
|
Buffer Over-read in WLAN Host Communication
|
Transient DOS while parsing per STA profile in ML IE.
|
[] |
GHSA-r64m-qchj-hrjp
|
Webcache Poisoning in shopware/platform and shopware/core
|
ImpactWebcache Poisoning via X-Forwarded-Prefix and sub-requestPatchesWe recommend updating to the current version 6.4.6.1. You can get the update to 6.4.6.1 regularly via the Auto-Updater or directly via the download overview.https://www.shopware.com/en/download/#shopware-6Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
|
[] |
GHSA-gfjc-g9v8-g8g7
|
The Microsoft (1) JScript 5.8 and 9 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
|
[] |
|
CVE-2020-21268
|
Cross Site Scripting vulnerability in EasySoft ZenTao v.11.6.4 allows a remote attacker to execute arbitrary code via the lastComment parameter.
|
[
"cpe:2.3:a:easycorp:zentao:11.6.4:*:*:*:*:*:*:*"
] |
|
CVE-2019-20539
|
An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) (Broadcom chipsets) software. An out-of-bounds Read in the Wi-Fi vendor command leads to an information leak. The Samsung ID is SVE-2019-14869 (November 2019).
|
[
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-4295
|
ONC code-validator-api XML CodeValidatorApiConfiguration.java vocabularyValidationConfigurations xml external entity reference
|
A vulnerability classified as problematic was found in ONC code-validator-api up to 1.0.30. This vulnerability affects the function vocabularyValidationConfigurations of the file src/main/java/org/sitenv/vocabularies/configuration/CodeValidatorApiConfiguration.java of the component XML Handler. The manipulation leads to xml external entity reference. Upgrading to version 1.0.31 is able to address this issue. The name of the patch is fbd8ea121755a2d3d116b13f235bc8b61d8449af. It is recommended to upgrade the affected component. VDB-217018 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:healthit:code-validator-api:*:*:*:*:*:*:*:*"
] |
GHSA-hhc8-hr95-v86v
|
Invision Power Board 2.1.4 allows remote attackers to hijack sessions and possibly gain administrative privileges by obtaining the session ID from the s parameter, then replaying it in another request.
|
[] |
|
GHSA-29pf-2r42-58qj
|
Cross-Site Request Forgery (CSRF) vulnerability in David Marcucci Password Protect Plugin for WordPress allows Stored XSS.This issue affects Password Protect Plugin for WordPress: from n/a through 0.8.1.0.
|
[] |
|
CVE-2024-24452
|
An invalid memory access when handling the ProtocolIE_ID field of E-RAB Release Indication messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload.
|
[
"cpe:2.3:a:athonet:vepc_mmc:11.4.0:*:*:*:*:*:*:*"
] |
|
GHSA-cp96-jpmq-xrr2
|
On a compromised node, the virt-handler service account can be used to modify all node specs
|
ImpactIf a malicious user has taken over a Kubernetes node where virt-handler (the KubeVirt node-daemon) is running, the virt-handler service account can be used to modify all node specs.This can be misused to lure-in system-level-privileged components (which can for instance read all secrets on the cluster, or can exec into pods on other nodes). This way a compromised node can be used to elevate privileges beyond the node until potentially having full privileged access to the whole cluster.The simplest way to exploit this, once a user could compromise a specific node, is to set with the virt-handler service account all other nodes to unschedulable and simply wait until system-critical components with high privileges appear on its node.Since this requires a node to be compromised first, the severity of this finding is considered Medium.PatchesNot yet available.WorkaroundsGatekeeper users can add a webhook which will block the `virt-handler` service account to modify the spec of a node.An example policy, preventing virt-handler from changing the node spec may look like this:and applying this template to node modifications.CreditsSpecial thanks to the discoverers of this issue:Nanzi Yang ([email protected])
Xin Guo ([email protected])
Jietao Xiao ([email protected])
Wenbo Shen ([email protected])
Jinku Li ([email protected])Referenceshttps://github.com/kubevirt/kubevirt/issues/9109
|
[] |
GHSA-44r3-5r2m-3rw8
|
On Juniper Networks Junos OS devices configured with DHCPv6 relay enabled, receipt of a specific DHCPv6 packet might crash the jdhcpd daemon. The jdhcpd daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd, leading to an extended Denial of Service (DoS) condition. Only DHCPv6 packet can trigger this issue. DHCPv4 packet cannot trigger this issue. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S9; 17.4 versions prior to 17.4R2-S11, 17.4R3-S2, 17.4R3-S3; 18.1 versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S5; 18.3 versions prior to 18.3R2-S4, 18.3R3-S3; 18.4 versions prior to 18.4R2-S5, 18.4R3-S4; 19.1 versions prior to 19.1R2-S2, 19.1R3-S2; 19.2 versions prior to 19.2R1-S5, 19.2R2-S1, 19.2R3; 19.3 versions prior to 19.3R2-S4, 19.3R2-S4, 19.3R3; 19.4 versions prior to 19.4R1-S3, 19.4R2-S1, 19.4R3; 20.1 versions prior to 20.1R1-S3, 20.1R2.
|
[] |
|
CVE-2008-6608
|
Multiple SQL injection vulnerabilities in DevelopItEasy Events Calendar 1.2 allow remote attackers to execute arbitrary SQL commands via (1) the user_name parameter (aka user field) to admin/index.php, (2) the user_pass parameter (aka pass field) to admin/index.php, or (3) the id parameter to calendar_details.php. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:developiteasy:events_calendar:1.2:*:*:*:*:*:*:*"
] |
|
CVE-2016-4200
|
Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-25124
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_subnet and the remote_mask variables.
|
[
"cpe:2.3:h:milesight:ur32l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:milesight:ur32l_firmware:32.3.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-gq4f-x93r-43mj
|
FluxBB 1.5.11 is affected by cross-site scripting (XSS in the Blog Content component. This vulnerability can allow an attacker to inject the XSS payload in "Blog Content" and each time any user will visit the blog, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload.
|
[] |
|
CVE-2021-28611
|
Adobe After Effects Out-of-bounds Read vulnerability
|
Adobe After Effects version 18.2 (and earlier) is affected by an Our-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information and cause a denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2021-32725
|
Default share permissions not respected for federated reshares
|
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, default share permissions were not being respected for federated reshares of files and folders. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
|
[
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*"
] |
CVE-2010-1354
|
Directory traversal vulnerability in the VJDEO (com_vjdeo) component 1.0 and 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:ternaria:com_vjdeo:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ternaria:com_vjdeo:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-38597
|
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, Safari 16.6. Processing web content may lead to arbitrary code execution.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2004-2100
|
GeoHttpServer, when configured to authenticate users, allows remote attackers to bypass authentication and access unauthorized files via a URL that contains %0a%0a (encoded newlines).
|
[
"cpe:2.3:a:geovision:geohttpserver:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-0109
|
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0075.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] |
|
CVE-2025-31198
|
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A path handling issue was addressed with improved validation.
|
[] |
|
GHSA-hp8p-42mw-fvq9
|
In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.
|
[] |
|
CVE-2022-32792
|
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-3112
|
Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.
|
[
"cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*"
] |
|
CVE-2018-6851
|
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x80206040. By crafting an input buffer we can control the execution path to the point where the constant DWORD 0 will be written to a user-controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM.
|
[
"cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:6.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:7.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:5.60.3:vs-nfd:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:6.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:6.00.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:7.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.90.1:ts:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.90.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.95.1:ts:*:*:*:*:*:*"
] |
|
GHSA-43pw-jffv-mcr7
|
IBM Cognos Controller 10.4.0, 10.4.1, and 10.4.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 190838.
|
[] |
|
CVE-2006-2706
|
Secure Elements Class 5 AVR server (aka C5 EVM) before 2.8.1 allows remote attackers to cause a denial of service via forged "session start" messages that cause AVR to connect to arbitrary hosts.
|
[
"cpe:2.3:a:secure_elements:class_5_enterprise_vulnerability_management:*:*:*:*:*:*:*:*"
] |
|
GHSA-6jwm-qq9q-pq2f
|
The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘icon’ parameter in all versions up to, and including, 3.4.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
CVE-2014-4203
|
Unspecified vulnerability in the Hyperion Enterprise Performance Management Architect component in Oracle Hyperion 11.1.2.2 and 11.1.2.3 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Property Editing.
|
[
"cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*"
] |
|
CVE-2022-25244
|
Vault Enterprise clusters using the tokenization transform feature can expose the tokenization key through the tokenization key configuration endpoint to authorized operators with `read` permissions on this endpoint. Fixed in Vault Enterprise 1.9.4, 1.8.9 and 1.7.10.
|
[
"cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2021-34697
|
Cisco IOS XE Software Protection Against Distributed Denial of Service Attacks Feature Vulnerability
|
A vulnerability in the Protection Against Distributed Denial of Service Attacks feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct denial of service (DoS) attacks to or through the affected device. This vulnerability is due to incorrect programming of the half-opened connections limit, TCP SYN flood limit, or TCP SYN cookie features when the features are configured in vulnerable releases of Cisco IOS XE Software. An attacker could exploit this vulnerability by attempting to flood traffic to or through the affected device. A successful exploit could allow the attacker to initiate a DoS attack to or through an affected device.
|
[
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*"
] |
GHSA-w6f4-9255-g83f
|
Huawei S12700 V200R007C00, V200R008C00, S5700 V200R007C00, S7700 V200R002C00, V200R005C00, V200R006C00, V200R007C00, V200R008C00, S9700 V200R007C00 have an input validation vulnerability. Due to the lack of input validation, an attacker may craft a malformed packet and send it to the device using VRP, causing the device to display additional memory data and possibly leading to sensitive information leakage.
|
[] |
|
GHSA-wchf-965x-6qj3
|
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.5 allows remote attackers to inject arbitrary web script "into another site's context" via a "timing issue" involving the (1) addEventListener or (2) setTimeout function, probably by setting events that activate after the context has changed.
|
[] |
|
CVE-2024-44095
|
In ppmp_protect_mfcfw_buf of code/drm_fw.c, there is a possible corrupt memory due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-4301
|
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 176609.
|
[
"cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack4:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] |
|
GHSA-xmc3-8wf5-r59w
|
Memory corruption in Boot while running a ListVars test in UEFI Menu during boot.
|
[] |
|
GHSA-32cw-4h2j-22vc
|
Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.
|
[] |
|
CVE-2020-12300
|
Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:o:intel:s2600cw2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600cw2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600cw2s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600cw2s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600cwt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600cwt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600cwts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600cwts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600cw2r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600cw2r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600cw2sr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600cw2sr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600cwtr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600cwtr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600cwtsr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600cwtsr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600kp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600kp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600kpf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600kpf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600kpr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600kpr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600kpfr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600kpfr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600kptr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600kptr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600tp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600tp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600tpf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600tpf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600tpfr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600tpfr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600tpnr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600tpnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600tpr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600tpr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600wt2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wt2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600wtt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wtt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600wttr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wttr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600wt2r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wt2r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:s2600wtts1r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wtts1r:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-7364
|
All versions up to ZXINOS-RESV1.01.43 of the ZTE ZXIN10 product European region are impacted by improper access control vulnerability. Due to improper access control to devcomm process, an unauthorized remote attacker can exploit this vulnerability to execute arbitrary code with root privileges.
|
[
"cpe:2.3:a:zte:zxin10:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-5438
|
Unspecified vulnerability in a certain ActiveX control in Reconfig.DLL in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 might allow local users to cause a denial of service to the Virtual Disk Mount Service (vmount2.exe), related to the ConnectPopulatedDiskEx function.
|
[
"cpe:2.3:a:vmware:ace:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:ace:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_player:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_server:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_server:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_server:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_server:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_server:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_server:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vmware_workstation:6.0.5:*:*:*:*:*:*:*"
] |
|
CVE-2019-19602
|
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
] |
|
CVE-2014-3020
|
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.
|
[
"cpe:2.3:a:ibm:embedded_websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_integrated_portal:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_integrated_portal:2.2:*:*:*:*:*:*:*"
] |
|
CVE-2016-8722
|
An exploitable Information Disclosure vulnerability exists in the Web Application functionality of Moxa AWK-3131A Series Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client. Retrieving a specific URL without authentication can reveal sensitive information to an attacker.
|
[
"cpe:2.3:o:moxa:awk-3131a_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:awk-3131a:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-24698
|
Zoom Clients - Improper Authentication
|
Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.
|
[
"cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*",
"cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*"
] |
GHSA-4427-7f3w-mqv6
|
OpenStack Keystone V3 /credentials endpoint policy logic allows to change credentials owner or target project ID
|
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
|
[] |
GHSA-77hw-h7rw-p297
|
The Rezgo Online Booking WordPress plugin before 4.1.8 does not sanitise and escape some parameters before outputting them back in a page, leading to a Reflected Cross-Site Scripting, which can be exploited either via a LFI in an AJAX action, or direct call to the affected file
|
[] |
|
CVE-2018-9952
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA Button elements. When setting the formattedValue attribute, the process does not properly validate the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5527.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] |
|
GHSA-4r7g-h9xg-7p27
|
Heap-based buffer overflow in the progressive PNG Image loader (decoders/pngloader.cpp) in KHTML in KDE 4.0.x up to 4.0.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted image.
|
[] |
|
GHSA-jx8h-rc52-2jx8
|
The Ultimate Addons for WPBakery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ult_team shortcode in all versions up to, and including, 3.19.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
GHSA-5qj9-gxv6-5gjr
|
Multiple cross-site scripting (XSS) vulnerabilities in Kmita Gallery allow remote attackers to inject arbitrary web script or HTML via the (1) begin parameter to index.php and the (2) searchtext parameter to search.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] |
|
CVE-2025-26646
|
.NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability
|
External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.
|
[] |
GHSA-37gm-gwpm-x7vh
|
Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to view arbitrary files that contain the "{" character via script containing the cssText property of the stylesheet object, aka "Local Information Disclosure through HTML Object" vulnerability.
|
[] |
|
GHSA-xvxr-fcpp-g423
|
The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets.
|
[] |
|
CVE-2023-0695
|
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a specific link. Note that getting the JavaScript to execute still requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database.
|
[
"cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2022-44760
|
HCL Leap is affected by an unrestricted upload of file with dangerous type vulnerability
|
Unsafe default file type filter policy in HCL
Leap allows execution of unsafe JavaScript in deployed applications.
|
[] |
CVE-2022-37840
|
In TOTOLINK A860R V4.1.2cu.5182_B20201027, the main function in downloadfile.cgi has a buffer overflow vulnerability.
|
[
"cpe:2.3:o:totolink:a860r_firmware:4.1.2cu.5182_b20201027:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a860r:-:*:*:*:*:*:*:*"
] |
|
GHSA-v34h-4f6h-chj2
|
An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. A remote attacker may be able to leak memory.
|
[] |
|
GHSA-rcxc-3w2m-mp8h
|
Unsafe deserialisation in the PKI implementation scheme of NVFlare
|
ImpactNVFLARE contains a vulnerability in its PKI implementation module, where The CA credentials are transported via pickle and no safe deserialization. The deserialization of Untrusted Data may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.
All versions before 2.1.2 are affected.CVSS Score = 9.8
[AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fnvd.nist.gov%2Fvuln-metrics%2Fcvss%2Fv3-calculator%3Fvector%3DAV%3AN%2FAC%3AL%2FPR%3AN%2FUI%3AN%2FS%3AU%2FC%3AH%2FI%3AH%2FA%3AH&data=05%7C01%7Cchesterc%40nvidia.com%7Ce9600bde16854b0b380008da4fc544f7%7C43083d15727340c1b7db39efd9ccc17a%7C0%7C0%7C637910005925574215%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5kBrXEmAbqp8R31JCH%2FG95MUly72UPVihnBwiRFmvBY%3D&reserved=0)PatchesThe patch will be included in nvflare==2.1.2WorkaroundsReplace pickle serialization with JSON and change the code accordinglyAdditional information
Issue Found by: Oliver Sellwood (@Nintorac)
|
[] |
GHSA-fgpw-h2j4-3v24
|
Improper Neutralization of Formula Elements in a CSV File vulnerability in Solwin Infotech User Blocker.This issue affects User Blocker: from n/a through 1.5.5.
|
[] |
|
GHSA-qcgg-gqwj-p974
|
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via vectors related to IPS transfer module, a different vulnerability than CVE-2014-4284.
|
[] |
|
GHSA-w43r-pcrq-vv2g
|
The (1) slsmgr and (2) slsadmin programs in Sun Solaris PC NetLink 2.0 create temporary files insecurely, which allows local users to gain privileges.
|
[] |
|
GHSA-7vh7-gr54-cx75
|
Protection mechanism failure in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 28.3 may allow an unauthenticated user to potentially enable denial of service via network access.
|
[] |
|
CVE-2000-0138
|
A system has a distributed denial of service (DDOS) attack master, agent, or zombie installed, such as (1) Trinoo, (2) Tribe Flood Network (TFN), (3) Tribe Flood Network 2000 (TFN2K), (4) stacheldraht, (5) mstream, or (6) shaft.
|
[] |
|
GHSA-578w-3cjw-832g
|
A NULL pointer dereference flaw was found in the Linux kernel’s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.
|
[] |
|
CVE-2014-4579
|
Cross-site scripting (XSS) vulnerability in js/test.php in the Appointments Scheduler plugin 1.5 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the lang parameter.
|
[
"cpe:2.3:a:wp_appointments_schedules_project:wp_appointments_schedules:*:-:-:*:-:wordpress:*:*"
] |
|
CVE-2025-20032
|
Improper input validation for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow a privileged user to potentially enable denial of service via local access.
|
[] |
|
GHSA-4c77-wcw2-9gh7
|
A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots.
|
[] |
|
CVE-2021-33056
|
Belledonne Belle-sip before 4.5.20, as used in Linphone and other products, can crash via an invalid From header in a SIP message.
|
[
"cpe:2.3:a:linphone:belle-sip:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-13568
|
CImg through 2.6.7 has a heap-based buffer overflow in _load_bmp in CImg.h because of erroneous memory allocation for a malformed BMP image.
|
[
"cpe:2.3:a:cimg:cimg:*:*:*:*:*:*:*:*"
] |
|
GHSA-mfvj-29wx-4v2c
|
The browser engine in Mozilla Firefox 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the TraceRecorder::snapshot function in js/src/jstracer.cpp, and unspecified other vectors.
|
[] |
|
CVE-2022-30624
|
Chcnav - P5E GNSS Authentication bypass admin password reset
|
Browsing the admin.html page allows the user to reset the admin password. Also appears in the JS code for the password.
|
[
"cpe:2.3:o:chcnav:p5e_gnss_firmware:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:chcnav:p5e_gnss_firmware:4.2:*:*:*:*:*:*:*",
"cpe:2.3:h:chcnav:p5e_gnss:-:*:*:*:*:*:*:*"
] |
CVE-2017-20097
|
WP-Filebase Download Manager Plugin cross site scriting
|
A vulnerability was found in WP-Filebase Download Manager Plugin 3.4.4. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely.
|
[
"cpe:2.3:a:wp-filebase_download_manager_project:wp-filebase_download_manager:3.4.4:*:*:*:*:wordpress:*:*"
] |
GHSA-jj4r-pv4x-x3jw
|
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Remote Administration Daemon). The supported version that is affected is 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] |
|
CVE-2020-21174
|
File Upload vulenrability in liufee CMS v.2.0.7.1 allows a remote attacker to execute arbitrary code via the image suffix function.
|
[
"cpe:2.3:a:feehi:feehicms:2.0.7.1:*:*:*:*:*:*:*"
] |
|
CVE-2023-0198
|
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where improper restriction of operations within the bounds of a memory buffer can lead to denial of service, information disclosure, and data tampering.
|
[
"cpe:2.3:a:nvidia:virtual_gpu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*"
] |
|
GHSA-7xjp-f5xm-j9vm
|
The Mister org.mistergroup.shouldianswer application 1.4.264 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the org.mistergroup.shouldianswer.ui.default_dialer.DefaultDialerActivity component.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.