id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-7fqh-mgxh-pgrj | An improper authorization flaw was found in the Smart Class feature of Foreman. An attacker can use it to change configuration of any host registered in Red Hat Satellite, independent of the organization the host belongs to. This flaw affects all Red Hat Satellite 6 versions. | [] |
|
GHSA-gjrj-9rj4-pgwx | DoS Vulnerability from Upstream Actix Web Issues | ImpactThis vulnerability affects all users of the `perseus deploy` functionality who have not exported their sites to static files. If you are using the inbuilt Perseus server in production, there is a memory leak in Actix Web stemming from [this upstream issue](https://github.com/actix/actix-web/issues/1780) which can allow even a single user to cause the process to exhaust its memory on low-memory servers by continuously reloading the page. Note that this issue does not affect all Actix Web applications, but rather results from certain usage patterns which appear to be present in Perseus' server mechanics.PatchesThis vulnerability is addressed in all versions after Perseus `v0.3.0-beta.21`, which temporarily discontinues the use of `perseus-actix-web` (until the upstream bug is fixed) and switches to `perseus-warp` instead, which utilizes [Warp](https://github.com/seanmonstar/warp).Additionally, as of Perseus `v0.3.0-beta.22`, the Actix Web integration has been upgraded to use the latest unstable beta version of Actix Web, which appears to partially resolve this issue (the severity of the memory leak is reduced). However, due to the instability of this version, the default integration will remain Warp for now, and a warning will appear if you attempt to use the Actix Web integration.If the instability of the latest beta version of Actix Web is not a concern for you, you can use this integration by adding `-i actix-web` to `perseus serve` and the like. This will print a warning about instability, and will then operate with the beta version. Please report any failures in functionality that are not security-related to the Perseus team by [opening an issue on the repository](https://github.com/arctic-hen7/perseus/issues/new/choose).Note however that switching to the Warp integration requires no code changes whatsoever unless you've ejected, so there are very few disadvantages to this change.WorkaroundsDue to significant infrastructural changes within other Perseus packages that were needed to support Warp, this integration is not backward-compatible with any previous version of Perseus, meaning there are no easily feasible workarounds. If you're only in development though, this vulnerability is irrelevant until you push to production.CVE StatusDue to GitHub's requirements, a CVE can't be issued for this security advisory because the issue is technically one with Actix Web (though it's only in combination with certain mechanics in the Perseus server that this problem arises).ReferencesSee [this upstream issue](https://github.com/actix/actix-web/issues/1780) in Actix Web.For more informationIf you have any questions or comments about this advisory:Open an issue on this repositoryEmail me at [[email protected]](mailto:[email protected]) | [] |
GHSA-crqv-c72j-wp5v | SQL injection vulnerability in search.php in AtlantisFAQ Knowledge Base Software 2.03 and earlier allows remote attackers to execute arbitrary SQL commands via the searchStr parameter. | [] |
|
GHSA-hvgm-xqxx-g9pr | Multiple cross-site scripting (XSS) vulnerabilities in the Adminimize plugin before 1.7.22 for WordPress allow remote attackers to inject arbitrary web script or HTML via the page parameter to (1) inc-options/deinstall_options.php, (2) inc-options/theme_options.php, or (3) inc-options/im_export_options.php, or the (4) post or (5) post_ID parameters to adminimize.php, different vectors than CVE-2011-4926. | [] |
|
CVE-2020-7069 | Wrong ciphertext/tag in AES-CCM encryption for a 12 bytes IV | In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"
] |
GHSA-hv43-fjj6-p6qh | The uListing plugin for WordPress is vulnerable to generic SQL Injection via the ‘listing_id’ parameter in versions up to, and including, 1.6.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] |
|
CVE-2023-2724 | Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] |
|
CVE-2023-4141 | The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 7.9.8 via the '->cus2' parameter. This allows authenticated attackers with author-level permissions or above, if the administrator previously grants access in the plugin settings, to create a PHP file and execute code on the server. The author resolved this vulnerability by removing the ability for authors and editors to import files, please note that this means php file creation is still allowed for site administrators, use the plugin with caution. | [
"cpe:2.3:a:smackcoders:wp_ultimate_csv_importer:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-8xfp-rc9v-3qrx | Cross-site scripting (XSS) vulnerability in Chart in Synology Office before 3.1.4-2771 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2020-2701 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.36, prior to 6.0.16 and prior to 6.1.2. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
] |
|
GHSA-wm75-j4x9-j8hf | Siemens SIMATIC S7-300 CPU devices allow remote attackers to cause a denial of service (defect-mode transition) via crafted packets on (1) TCP port 102 or (2) Profibus. | [] |
|
GHSA-h74j-999g-2xqf | HCL AppScan Standard is vulnerable to XML External Entity Injection (XXE) attack when processing XML data | [] |
|
GHSA-jrwf-88rv-m9xr | Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function formSetIptv. | [] |
|
CVE-2019-9218 | An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It has Incorrect Access Control (issue 1 of 5). | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
GHSA-7397-v773-mg5p | Missing authentication for the remote configuration port 1236/tcp on the Cohu 3960HD allows an attacker to change configuration parameters such as IP address and username/password via specially crafted XML SOAP packets. | [] |
|
GHSA-cxr8-p3g6-983f | On BIG-IP 14.1.0-14.1.0.1, TMM may restart and produce a core file when validating SSL certificates in client SSL or server SSL profiles. | [] |
|
GHSA-x5rw-hv6h-jjmw | The simple-share-buttons-adder plugin before 6.0.0 for WordPress has XSS. | [] |
|
CVE-2022-28252 | Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability | Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] |
CVE-2024-4234 | WordPress Filterable Portfolio plugin <= 1.6.4 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sayful Islam Filterable Portfolio allows Stored XSS.This issue affects Filterable Portfolio: from n/a through 1.6.4.
| [] |
CVE-2024-2835 | OpenText ArcSight Enterprise Security Manager and ArcSight Platform Stored XSS | A Stored Cross-Site Scripting (XSS) vulnerability has been identified in OpenText ArcSight Enterprise Security Manager and ArcSight Platform. The vulnerability could be remotely exploited. | [] |
CVE-2024-52057 | Potential arbitrary SQL query execution in Queuing Service while parsing malicious remote commands or configuration files | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RTI Connext Professional (Queuing Service) allows SQL Injection.This issue affects Connext Professional: from 7.0.0 before 7.3.0, from 6.1.0 before 6.1.2.17, from 6.0.0 before 6.0.*, from 5.2.0 before 5.3.*. | [] |
CVE-2024-39312 | Botan has an Authorization Error due to Name Constraint Decoding Bug | Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. A bug in the parsing of name constraint extensions in X.509 certificates meant that if the extension included both permitted subtrees and excluded subtrees, only the permitted subtree would be checked. If a certificate included a name which was permitted by the permitted subtree but also excluded by excluded subtree, it would be accepted. Fixed in versions 3.5.0 and 2.19.5. | [
"cpe:2.3:a:randombit:botan:*:*:*:*:*:*:*:*"
] |
CVE-2015-9452 | The nex-forms-express-wp-form-builder plugin before 4.6.1 for WordPress has SQL injection via the wp-admin/admin.php?page=nex-forms-main nex_forms_Id parameter. | [
"cpe:2.3:a:nex-forms_-_ultimate_form_builder_project:nex-forms_-_ultimate_form_builder:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-vxj5-594h-676r | Unrestricted Upload of File with Dangerous Type vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to cause information disclosure, tampering, deletion or destruction via file upload/download. As a result, the attacker may be able to exploit this for further attacks. | [] |
|
GHSA-hhjc-g6qw-64jj | An Incorrect Permission Assignment for Critical Resource issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Multiple files and folders with ACLs that affect other users are allowed to be modified by non-administrator accounts. | [] |
|
GHSA-x7pw-4585-684g | An Information Disclosure vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.8 and 5.2 all versions allows SSL VPN web portal users to access internal FortiOS configuration information (eg:addresses) via specifically crafted URLs inside the SSL-VPN web portal. | [] |
|
GHSA-p6hw-f2g5-926g | Stack-based buffer overflow in the LRPC client in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges by operating an LRPC server that sends a crafted LPC port message, aka "LRPC Client Buffer Overrun Vulnerability." | [] |
|
CVE-2024-37542 | WordPress Gallery – Image and Video Gallery with Thumbnails plugin <= 2.0.3 - Broken Access Control vulnerability | Missing Authorization vulnerability in WpDevArt Responsive Image Gallery, Gallery Album.This issue affects Responsive Image Gallery, Gallery Album: from n/a through 2.0.3. | [
"cpe:2.3:a:wpdevart:gallery:*:*:*:*:*:wordpress:*:*"
] |
CVE-2020-25560 | In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server. We also observed the same is true if the JSESSIONID is completely removed. | [
"cpe:2.3:a:sapphireims:sapphireims:5.0:*:*:*:*:*:*:*"
] |
|
CVE-2025-24097 | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, tvOS 18.4, macOS Sequoia 15.4. An app may be able to read arbitrary file metadata. | [] |
|
GHSA-27qx-pwhc-4j5g | A Stored Cross-Site Scripting (XSS) vulnerability has been identified in OpenText ArcSight Enterprise Security Manager and ArcSight Platform. The vulnerability could be remotely exploited. | [] |
|
GHSA-49cv-78w8-66gc | An issue was discovered in certain Apple products. macOS before 10.12.6 is affected. The issue involves the "AppleGraphicsPowerManagement" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [] |
|
CVE-2017-10984 | An FR-GV-301 issue in FreeRADIUS 3.x before 3.0.15 allows "Write overflow in data2vp_wimax()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code. | [
"cpe:2.3:a:freeradius:freeradius:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:freeradius:freeradius:3.0.14:*:*:*:*:*:*:*"
] |
|
GHSA-8m82-p7m3-cc92 | A certificate validation issue existed when processing administrator added certificates. This issue was addressed with improved certificate validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. An attacker may have been able to impersonate a trusted website using shared key material for an administrator added certificate. | [] |
|
GHSA-8qpr-v8hf-4323 | An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function sixel_decode_raw_impl at fromsixel.c. | [] |
|
GHSA-7px8-9g52-58qr | In all Qualcomm products with Android releases from CAF using the Linux kernel, the GPS client may use an insecure cryptographic algorithm. | [] |
|
GHSA-w5gw-pcjw-h4h2 | An arbitrary file upload vulnerability at /zbzedit/php/zbz.php in zbzcms v1.0 allows attackers to execute arbitrary code via a crafted PHP file. | [] |
|
CVE-2020-14443 | A SQL injection vulnerability in accountancy/customer/card.php in Dolibarr 11.0.3 allows remote authenticated users to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:dolibarr:dolibarr:*:*:*:*:*:*:*:*"
] |
|
GHSA-4vr7-m8p8-434h | MediaWiki Cross-site Scripting (XSS) vulnerability | In MediaWiki before 1.31.9 and 1.32.x through 1.34.x before 1.34.3, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked. | [] |
GHSA-57jf-hj8w-7hr5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Link Nacional Invoice Payment for WooCommerce allows Reflected XSS.This issue affects Invoice Payment for WooCommerce: from n/a through 1.7.2. | [] |
|
CVE-2024-51877 | WordPress SV Forms plugin <= 2.0.05 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in straightvisions GmbH SV Forms allows DOM-Based XSS.This issue affects SV Forms: from n/a through 2.0.05. | [] |
CVE-2025-30429 | A path handling issue was addressed with improved validation. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox. | [] |
|
GHSA-8xwp-62fq-vgg9 | A vulnerability has been identified in SIMATIC Reader RF610R CMIIT (6GT2811-6BC10-2AA0) (All versions < V4.2), SIMATIC Reader RF610R ETSI (6GT2811-6BC10-0AA0) (All versions < V4.2), SIMATIC Reader RF610R FCC (6GT2811-6BC10-1AA0) (All versions < V4.2), SIMATIC Reader RF615R CMIIT (6GT2811-6CC10-2AA0) (All versions < V4.2), SIMATIC Reader RF615R ETSI (6GT2811-6CC10-0AA0) (All versions < V4.2), SIMATIC Reader RF615R FCC (6GT2811-6CC10-1AA0) (All versions < V4.2), SIMATIC Reader RF650R ARIB (6GT2811-6AB20-4AA0) (All versions < V4.2), SIMATIC Reader RF650R CMIIT (6GT2811-6AB20-2AA0) (All versions < V4.2), SIMATIC Reader RF650R ETSI (6GT2811-6AB20-0AA0) (All versions < V4.2), SIMATIC Reader RF650R FCC (6GT2811-6AB20-1AA0) (All versions < V4.2), SIMATIC Reader RF680R ARIB (6GT2811-6AA10-4AA0) (All versions < V4.2), SIMATIC Reader RF680R CMIIT (6GT2811-6AA10-2AA0) (All versions < V4.2), SIMATIC Reader RF680R ETSI (6GT2811-6AA10-0AA0) (All versions < V4.2), SIMATIC Reader RF680R FCC (6GT2811-6AA10-1AA0) (All versions < V4.2), SIMATIC Reader RF685R ARIB (6GT2811-6CA10-4AA0) (All versions < V4.2), SIMATIC Reader RF685R CMIIT (6GT2811-6CA10-2AA0) (All versions < V4.2), SIMATIC Reader RF685R ETSI (6GT2811-6CA10-0AA0) (All versions < V4.2), SIMATIC Reader RF685R FCC (6GT2811-6CA10-1AA0) (All versions < V4.2), SIMATIC RF1140R (6GT2831-6CB00) (All versions < V1.1), SIMATIC RF1170R (6GT2831-6BB00) (All versions < V1.1), SIMATIC RF166C (6GT2002-0EE20) (All versions < V2.2), SIMATIC RF185C (6GT2002-0JE10) (All versions < V2.2), SIMATIC RF186C (6GT2002-0JE20) (All versions < V2.2), SIMATIC RF186CI (6GT2002-0JE50) (All versions < V2.2), SIMATIC RF188C (6GT2002-0JE40) (All versions < V2.2), SIMATIC RF188CI (6GT2002-0JE60) (All versions < V2.2), SIMATIC RF360R (6GT2801-5BA30) (All versions < V2.2). The service log files of the affected application can be accessed without proper authentication. This could allow an unauthenticated attacker to get access to sensitive information. | [] |
|
CVE-2021-41578 | mySCADA myDESIGNER 8.20.0 and below allows Directory Traversal attacks when importing project files. If an attacker can trick a victim into importing a malicious mep file, then they gain the ability to write arbitrary files to OS locations where the user has permission. This would typically lead to code execution. | [
"cpe:2.3:a:myscada:mydesigner:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-4245 | Orca has arbitrary code execution due to insecure Python module load | [
"cpe:2.3:a:gnome:orca:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-x9mm-6gpf-f749 | Loop with Unreachable Exit Condition in Apache POI | HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file. | [] |
GHSA-wp3x-mhc9-hr54 | Bang Resto 1.0 was discovered to contain multiple SQL injection vulnerabilities via the btnMenuItemID, itemID, itemPrice, menuID, staffID, or itemqty parameter. | [] |
|
CVE-2010-0896 | Unspecified vulnerability in the Sun Convergence component in Oracle Sun Product Suite 1.0 allows remote attackers to affect confidentiality via unknown vectors related to Address Book and Mail Filter. | [
"cpe:2.3:a:oracle:sun_products_suite:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-6jx3-rqcx-g3ww | Downloads Resources over HTTP in air-sdk | Affected versions of `air-sdk` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `air-sdk`.RecommendationNo patch is currently available for this vulnerability, and the package hasn't seen an update since 2015.The best mitigation is currently to avoid using this package, using a different package if available.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] |
CVE-2021-20638 | LOGITEC LAN-W300N/PGRB allows an attacker with administrative privilege to execute arbitrary OS commands via unspecified vectors. | [
"cpe:2.3:o:logitech:lan-w300n\\/pgrb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:logitech:lan-w300n\\/pgrb:-:*:*:*:*:*:*:*"
] |
|
GHSA-xqg8-cv3h-xppv | SQL Injection in sequelize | Versions 2.0.0-rc-7 and earlier of `sequelize` are affected by a SQL injection vulnerability when user input is passed into the order parameter.Proof of ConceptRecommendationUpdate to version 2.0.0-rc8 or later | [] |
CVE-2021-22907 | An improper access control vulnerability exists in Citrix Workspace App for Windows potentially allows privilege escalation in CR versions prior to 2105 and 1912 LTSR prior to CU4. | [
"cpe:2.3:a:citrix:workspace:*:*:*:*:ltsr:windows:*:*",
"cpe:2.3:a:citrix:workspace:*:*:*:*:-:windows:*:*"
] |
|
GHSA-876x-3ww3-wx43 | Directory traversal vulnerability in wp-download.php in the WP Custom Pages module 0.5.0.1 for WordPress allows remote attackers to read arbitrary files via ..%2F (encoded dot dot) sequences in the url parameter. | [] |
|
CVE-2018-2608 | Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (subcomponent: Security). The supported version that is affected is 2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality Simphony. While the vulnerability is in Oracle Hospitality Simphony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality Simphony accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:hospitality_simphony:2.7:*:*:*:*:*:*:*"
] |
|
GHSA-87rf-xcxq-w82r | Emacs 21 allows user-assisted attackers to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation. | [] |
|
CVE-2017-11464 | A SIGFPE is raised in the function box_blur_line of rsvg-filter.c in GNOME librsvg 2.40.17 during an attempted parse of a crafted SVG file, because of incorrect protection against division by zero. | [
"cpe:2.3:a:gnome:librsvg:2.40.17:*:*:*:*:*:*:*"
] |
|
GHSA-4qcm-8vwx-5fcx | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound EmailPress allows Reflected XSS. This issue affects EmailPress: from n/a through 1.0. | [] |
|
CVE-2023-25647 | Permission and Access Control Vulnerability in Some ZTE Mobile Phones |
There is a permission and access control vulnerability in some ZTE mobile phones. Due to improper access control, applications in mobile phone could monitor the touch event.
| [
"cpe:2.3:o:zte:axon_30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:axon_30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:axon_40_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:axon_40_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:axon_40_ultra_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:axon_40_ultra:-:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:nubia_z50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:nubia_z50:-:*:*:*:*:*:*:*"
] |
CVE-2023-44770 | A Cross-Site Scripting (XSS) vulnerability in Zenario CMS v.9.4.59197 allows an attacker to execute arbitrary code via a crafted script to the Organizer - Spare alias. | [
"cpe:2.3:a:tribalsystems:zenario:9.4.59197:*:*:*:*:*:*:*"
] |
|
GHSA-9m6f-83hx-8wwr | A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Login System 1.0. Affected by this issue is some unknown functionality of the file add-user.php. The manipulation of the argument qr-code leads to cross site scripting. The attack may be launched remotely. VDB-252470 is the identifier assigned to this vulnerability. | [] |
|
GHSA-p7c9-q84g-w8qj | ntop running in web mode allows remote attackers to read arbitrary files via a .. (dot dot) attack. | [] |
|
CVE-2023-40852 | SQL Injection vulnerability in Phpgurukul User Registration & Login and User Management System With admin panel 3.0 allows attackers to obtain sensitive information via crafted string in the admin user name field on the admin log in page. | [
"cpe:2.3:a:user_registration_\\&_login_and_user_management_system_with_admin_panel_project:user_registration_\\&_login_and_user_management_system_with_admin_panel:3.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-20354 | The web application component of piSignage before 2.6.4 allows a remote attacker (authenticated as a low-privilege user) to download arbitrary files from the Raspberry Pi via api/settings/log?file=../ path traversal. In other words, this issue is in the player API for log download. | [
"cpe:2.3:a:pisignage:pisignage:*:*:*:*:*:*:*:*"
] |
|
GHSA-whcp-4cj3-66x2 | A vulnerability in the REST API and web UI of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to perform a command injection attack against an affected device.
This vulnerability is due to improper user authorization and insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted commands to an affected REST API endpoint or through the web UI. A successful exploit could allow the attacker to execute arbitrary commands on the CLI of a Cisco NDFC-managed device with network-admin privileges.
Note: This vulnerability does not affect Cisco NDFC when it is configured for storage area network (SAN) controller deployment. | [] |
|
CVE-2018-5099 | A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] |
|
CVE-2022-34251 | Adobe InCopy Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Adobe InCopy versions 17.2 (and earlier) and 16.4.1 (and earlier) are affected by an Out-Of-Bounds Write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2022-37704 | Amanda 3.5.1 allows privilege escalation from the regular user backup to root. The SUID binary located at /lib/amanda/rundump will execute /usr/sbin/dump as root with controlled arguments from the attacker which may lead to escalation of privileges, denial of service, and information disclosure. | [
"cpe:2.3:a:zmanda:amanda:3.5.1:*:*:*:*:*:*:*"
] |
|
GHSA-mfw6-89c3-f897 | A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the attacker to perform a MITM Attack if end users are convinced to connect to a malicious server. | [] |
|
CVE-2020-1397 | An information disclosure vulnerability exists in Windows when the Windows Imaging Component fails to properly handle objects in memory, aka 'Windows Imaging Component Information Disclosure Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-58qm-mv3r-rg7r | The Target First WordPress Plugin v2.0, also previously known as Watcheezy, suffers from a critical unauthenticated stored XSS vulnerability. An attacker could change the licence key value through a POST on any URL with the 'weeWzKey' parameter that will be save as the 'weeID option and is not sanitized. | [] |
|
GHSA-793h-885v-rxrh | The issue was addressed with improved input validation. This issue is fixed in Safari 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. A malicious website may be able to claim WebAuthn credentials from another website that shares a registrable suffix. | [] |
|
CVE-2003-0505 | Directory traversal vulnerability in Microsoft NetMeeting 3.01 2000 before SP4 allows remote attackers to read arbitrary files via "..\.." (dot dot) sequences in a file transfer request. | [
"cpe:2.3:a:microsoft:netmeeting:3.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-2v6g-j89f-4p2g | Cross-site scripting (XSS) vulnerability in services/obrowser/index.php in Horde 3.2 and Turba 2.2 allows remote attackers to inject arbitrary web script or HTML via the contact name. | [] |
|
GHSA-37x7-5c6x-7g37 | User Interface (UI) Misrepresentation of Critical Information vulnerability in Documenso allows Content Spoofing.Displayed version does not show the layer flattened version, once download, If printed (e.g. via Google Chrome -> Examine the print preview): Will render the vulnerability only, not all layers are flattened.This issue affects Documenso: through 1.8.0, >1.8.0 and Documenso SaaS (Hosted) as of 2024-12-05. | [] |
|
CVE-2024-12359 | code-projects Admin Dashboard vendor_management.php cross site scripting | A vulnerability was found in code-projects Admin Dashboard 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /vendor_management.php. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting product names. | [
"cpe:2.3:a:code-projects:admin_dashboard:*:*:*:*:*:*:*:*",
"cpe:2.3:a:code-projects:admin_dashboard:1.0:*:*:*:*:*:*:*"
] |
CVE-2008-2579 | Unspecified vulnerability in the WebLogic Server Plugins for Apache, Sun and IIS web servers component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 has unknown impact and remote attack vectors. | [
"cpe:2.3:a:oracle:weblogic_server:6.1:-:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:-:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:-:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp1:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp1:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp1:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp2:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp2:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp2:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp3:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp3:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp3:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp4:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp4:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp4:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp5:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp5:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp5:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp6:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp6:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp6:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp7:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp7:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:6.1:sp7:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:-:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:-:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:-:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp1:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp1:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp1:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp2:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp2:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp2:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp3:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp3:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp3:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp4:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp4:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp4:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp5:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp5:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp5:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp6:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp6:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp6:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp7:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp7:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:7.0:sp7:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:-:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:-:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:-:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp1:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp1:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp1:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp2:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp2:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp2:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp3:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp3:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp3:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp4:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp4:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp4:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp5:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp5:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp5:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp6:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp6:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:8.1:sp6:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.0:-:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.0:-:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.0:-:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.0:maintenance_pack3:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.0:maintenance_pack3:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.0:maintenance_pack3:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.1:-:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.1:-:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.1:-:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.1:maintenance_pack3:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.1:maintenance_pack3:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.1:maintenance_pack3:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:-:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:-:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:-:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack1:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack1:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack1:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack2:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack2:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack2:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack3:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack3:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:9.2:maintenance_pack3:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:10.0:-:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:10.0:-:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:10.0:-:*:*:*:sun:*:*",
"cpe:2.3:a:oracle:weblogic_server:10.0:maintenance_pack1:*:*:*:apache:*:*",
"cpe:2.3:a:oracle:weblogic_server:10.0:maintenance_pack1:*:*:*:internet_information_services:*:*",
"cpe:2.3:a:oracle:weblogic_server:10.0:maintenance_pack1:*:*:*:sun:*:*"
] |
|
GHSA-fhx3-mxf6-jxpv | ThreeTen Backport v1.6.8 was discovered to contain a NullPointerException via the component org.threeten.bp.LocalDate::compareTo(ChronoLocalDate). | [] |
|
CVE-2025-31863 | WordPress Agency Toolkit plugin <= 1.0.23 - Broken Access Control vulnerability | Missing Authorization vulnerability in inspry Agency Toolkit allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Agency Toolkit: from n/a through 1.0.23. | [] |
GHSA-f6j8-hr9j-495h | Cross-site scripting (XSS) vulnerability in admin/comments.php in Gelato CMS 0.95 allows remote attackers to inject arbitrary web script or HTML via the content parameter in a comment. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2021-30704 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6, Security Update 2021-003 Catalina, macOS Big Sur 11.4, watchOS 7.5. An application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-cx3w-xqmc-84g5 | Git LFS can execute a Git binary from the current directory on Windows | ImpactOn Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems.This is the result of an incomplete fix for CVE-2020-27955.This issue occurs because on Windows, [Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator](https://github.com/golang/go/issues/38736).PatchesThis version should be patched in v2.13.2, which will be released in coordination with this security advisory.WorkaroundsOther than avoiding untrusted repositories or using a different operating system, there is no workaround.References_Are there any links users can visit to find out more?_For more informationIf you have any questions or comments about this advisory:Start a discussion in [the Git LFS discussion page](https://github.com/git-lfs/git-lfs/discussions).If you cannot open a discussion, please email the core team using their usernames at `github.com`. | [] |
GHSA-v6vj-vcw7-qf3c | A CWE-428 Windows Unquoted Search Path vulnerability exists in EcoStruxure Building Operation Enterprise Server installer V1.9 - V3.1 and Enterprise Central installer V2.0 - V3.1 that could cause any local Windows user who has write permission on at least one of the subfolders of the Connect Agent service binary path, being able to gain the privilege of the user who started the service. By default, the Enterprise Server and Enterprise Central is always installed at a location requiring Administrator privileges so the vulnerability is only valid if the application has been installed on a non-secure location. | [] |
|
CVE-2024-30920 | Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to execute arbitrary code via the render-document.php component. | [
"cpe:2.3:a:derbynet:derbynet:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-13900 | Head, Footer and Post Injections <= 3.3.0 - Authenticated (Administrator+) PHP Code Injection in Multisite Environments | The Head, Footer and Post Injections plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 3.3.0. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject PHP Code in multisite environments. | [] |
CVE-2015-1627 | Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
CVE-2025-1372 | GNU elfutils eu-readelf readelf.c print_string_section buffer overflow | A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue. | [] |
GHSA-26mh-xhv7-944g | ais-ltd strategyen v0.4.0 was discovered to contain a prototype pollution via the function mergeObjects. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. | [] |
|
CVE-2021-43440 | Multiple Stored XSS Vulnerabilities in the Source Code of iOrder 1.0 allow remote attackers to execute arbitrary code via signup form in the Name and Phone number field. | [
"cpe:2.3:a:iorder_project:iorder:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-6mqr-jjm8-xg75 | Cross-site scripting (XSS) vulnerability in IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.2.1.0 through 7.2.1.6 and 7.2.2.0 through 7.2.2.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | [] |
|
GHSA-23r8-fhxm-33gj | A vulnerability in the IPv6 traffic processing of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an unexpected restart of the netstack process on an affected device. The vulnerability is due to improper validation of IPv6 traffic sent through an affected device. An attacker could exploit this vulnerability by sending a malformed IPv6 packet through an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition while the netstack process restarts. A sustained attack could lead to a reboot of the device. | [] |
|
CVE-2010-0907 | Unspecified vulnerability in Oracle Secure Backup 10.3.0.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-0898, CVE-2010-0899, CVE-2010-0904, and CVE-2010-0906. | [
"cpe:2.3:a:oracle:secure_backup:10.3.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2021-36195 | Multiple command injection vulnerabilities in the command line interpreter of FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, and 6.1.0 through 6.1.2 may allow an authenticated attacker to execute arbitrary commands on the underlying system shell via specially crafted command arguments. | [
"cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-26721 | drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address | In the Linux kernel, the following vulnerability has been resolved:
drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address
Commit bd077259d0a9 ("drm/i915/vdsc: Add function to read any PPS
register") defines a new macro to calculate the DSC PPS register
addresses with PPS number as an input. This macro correctly calculates
the addresses till PPS 11 since the addresses increment by 4. So in that
case the following macro works correctly to give correct register
address:
_MMIO(_DSCA_PPS_0 + (pps) * 4)
However after PPS 11, the register address for PPS 12 increments by 12
because of RC Buffer memory allocation in between. Because of this
discontinuity in the address space, the macro calculates wrong addresses
for PPS 12 - 16 resulting into incorrect DSC PPS parameter value
read/writes causing DSC corruption.
This fixes it by correcting this macro to add the offset of 12 for PPS
>=12.
v3: Add correct paranthesis for pps argument (Jani Nikula)
(cherry picked from commit 6074be620c31dc2ae11af96a1a5ea95580976fb5) | [] |
CVE-2008-1755 | Directory traversal vulnerability in the showSource function in showSource.php in World of Phaos 4.0.1 allows remote attackers to read arbitrary files via directory traversal sequences in the file parameter. | [
"cpe:2.3:a:zekewalker:world_of_phaos:4.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2023-20972 | In btm_vendor_specific_evt of btm_devctl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-255304665 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-25518 |
NVIDIA Jetson contains a vulnerability in CBoot, where the PCIe controller is initialized without IOMMU, which may allow an attacker with physical access to the target device to read and write to arbitrary memory. A successful exploit of this vulnerability may lead to code execution, denial of service, information disclosure, and loss of integrity.
| [
"cpe:2.3:h:nvidia:jetson_agx_xavier:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:*"
] |
|
CVE-2005-4021 | The installer for Gallery 2.0 before 2.0.2 stores the install log under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information. | [
"cpe:2.3:a:gallery_project:gallery:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_alpha1:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_alpha2:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_alpha3:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_alpha4:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:gallery_project:gallery:2.0_rc2:*:*:*:*:*:*:*"
] |
|
GHSA-qpxv-j26m-rr62 | A remote denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1. Android ID: A-35472997. | [] |
|
GHSA-wj6q-5jmp-g4rc | Multiple unspecified vulnerabilities in Midgard Components (MidCOM) Framework before 8.09.1 have unknown impact and attack vectors. | [] |
|
CVE-2006-0317 | Cross-site scripting (XSS) vulnerability in rkrt_stats.php in RedKernel Referrer Tracker 1.1.0-3 allows remote attackers to inject arbitrary web script or HTML via a query string value as a GET, which is stored in the $QUERY_STRING variable. NOTE: the provenance of this information is unknown; portions of the details are obtained from third party information. | [
"cpe:2.3:a:redkernel:referrer_tracker:1.1.0_3:*:*:*:*:*:*:*"
] |
Subsets and Splits