id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2024-5884 | Beauty <= 1.1.4 - Authenticated (Subscriber+) Stored Cross-Site Scripting via tpl_featured_cat_id Parameter | The Beauty theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘tpl_featured_cat_id’ parameter in all versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:allprices:beauty:*:*:*:*:*:wordpress:*:*"
] |
CVE-2018-17586 | The WP Fastest Cache plugin 0.8.8.5 for WordPress has XSS via the rules[0][content] parameter in a wpfc_save_timeout_pages action. | [
"cpe:2.3:a:wpfastestcache:wp_fastest_cache:0.8.8.5:*:*:*:*:wordpress:*:*"
] |
|
CVE-2007-4656 | backup-manager-upload in Backup Manager before 0.6.3 provides the FTP server hostname, username, and password as plaintext command line arguments during FTP uploads, which allows local users to obtain sensitive information by listing the process and its arguments, a different vulnerability than CVE-2007-2766. | [
"cpe:2.3:a:backup_manager:backup_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-3769 | PHP remote file inclusion vulnerability in admin/create_order_new.php in Freeway 1.4.1.171, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the include_page parameter. | [
"cpe:2.3:a:openfreeway:freeway:1.4.1.171:*:*:*:*:*:*:*"
] |
|
CVE-2013-2292 | bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes. | [
"cpe:2.3:a:bitcoin:bitcoin-qt:0.4:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.4.8:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.5.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.6.0.10:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin-qt:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.4.1:rc6:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.4.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.4.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.5.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.5.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoin_core:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoind:0.4.4:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoind:0.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoind:0.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoind:0.6.0.10:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoind:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoind:0.6.4:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoind:0.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoind:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bitcoin:bitcoind:0.7.2:*:*:*:*:*:*:*"
] |
|
GHSA-m52q-cq5w-w8r4 | Vulnerability in the /etc/suid_exec program in HP Apollo Domain/OS sr10.2 and sr10.3 beta, related to the Korn Shell (ksh). | [] |
|
CVE-2024-51007 | Netgear XR300 v1.0.3.78 was discovered to contain a stack overflow via the passphrase parameter at wireless.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | [
"cpe:2.3:o:netgear:xr300_firmware:1.0.3.78:*:*:*:*:*:*:*"
] |
|
CVE-2021-24473 | User Profile Picture < 2.6.0 - Arbitrary User Picture Change/Deletion via IDOR | The User Profile Picture WordPress plugin before 2.6.0 was affected by an IDOR issue, allowing users with the upload_image capability (by default author and above) to change and delete the profile pictures of other users (including those with higher roles). | [
"cpe:2.3:a:cozmoslabs:user_profile_picture:*:*:*:*:*:wordpress:*:*"
] |
GHSA-p23r-j983-4557 | Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot). | [] |
|
CVE-2018-11235 | In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
"cpe:2.3:a:git-scm:git:2.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitforwindows:git:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-46849 | WordPress Coming Soon Plugin <= 1.5.9 is vulnerable to SQL Injection | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Weblizar Coming Soon Page – Responsive Coming Soon & Maintenance Mode allows SQL Injection.This issue affects Coming Soon Page – Responsive Coming Soon & Maintenance Mode: from n/a through 1.5.9.
| [
"cpe:2.3:a:weblizar:responsive_coming_soon_\\&_maintenance_mode:*:*:*:*:*:wordpress:*:*"
] |
CVE-2006-4403 | The FTP server in Apple Mac OS X 10.4.8 and earlier, when FTP Access is enabled, will crash when a login failure occurs with a valid user name, which allows remote attackers to cause a denial of service (crash) and enumerate valid usernames. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-5341 | Deserialization of Untrusted Data Vulnerability Dell EMC Avamar Server versions 7.4.1, 7.5.0, 7.5.1, 18.2, 19.1 and 19.2 and Dell EMC Integrated Data Protection Appliance versions 2.0, 2.1, 2.2, 2.3, 2.4 and 2.4.1 contain a Deserialization of Untrusted Data Vulnerability. A remote unauthenticated attacker could exploit this vulnerability to send a serialized payload that would execute code on the system. | [
"cpe:2.3:a:dell:emc_avamar_server:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar_server:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar_server:7.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar_server:18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar_server:18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar_server:19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_avamar_server:19.2:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_integrated_data_protection_appliance_firmware:2.4.1:*:*:*:*:*:*:*"
] |
|
CVE-2020-29663 | Icinga 2 v2.8.0 through v2.11.7 and v2.12.2 has an issue where revoked certificates due for renewal will automatically be renewed, ignoring the CRL. This issue is fixed in Icinga 2 v2.11.8 and v2.12.3. | [
"cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*",
"cpe:2.3:a:icinga:icinga:2.12.2:*:*:*:*:*:*:*"
] |
|
CVE-2020-2739 | Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Advanced UI). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 7.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-3820 | Kibana versions after 6.1.0 and before 6.1.3 had a cross-site scripting (XSS) vulnerability in labs visualizations that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users. | [
"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*"
] |
|
GHSA-xpr2-mv3m-jxjg | The SIOCGIFCONF ioctl (ifconf function) in FreeBSD 4.x through 4.11 and 5.x through 5.4 does not properly clear a buffer before using it, which allows local users to obtain portions of sensitive kernel memory. | [] |
|
CVE-2020-9386 | In Mahara 18.10 before 18.10.5, 19.04 before 19.04.4, and 19.10 before 19.10.2, file metadata information is disclosed to group members in the Elasticsearch result list despite them not having access to that artefact anymore. | [
"cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-29927 | Versions of Sage 300 through 2022 implement role-based access controls that are only enforced client-side. Low-privileged Sage users, particularly those on a workstation setup in the "Windows Peer-to-Peer Network" or "Client Server Network" Sage 300 configurations, could recover the SQL connection strings being used by Sage 300 and interact directly with the underlying database(s) to create, update, and delete all company records, bypassing the program’s role-based access controls. | [
"cpe:2.3:a:sage:sage_300:*:*:*:*:*:*:*:*"
] |
|
GHSA-fjhf-r69q-mp58 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 9.7.0.29455. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of JPEG2000 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-9416. | [] |
|
GHSA-qxhc-qpv2-7r2r | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | [] |
|
CVE-2008-5071 | Multiple eval injection vulnerabilities in itpm_estimate.php in Yoxel 1.23beta and earlier allow remote authenticated users to execute arbitrary PHP code via the proj_id parameter. | [
"cpe:2.3:a:yoxel:yoxel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.06beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.07beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.08beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.09beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.10beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.11beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.12beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.13beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.14beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.15beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.16beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.17beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.18beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.19beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.20beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.21beta:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:yoxel:yoxel:1.22beta:*:*:*:*:*:*:*"
] |
|
GHSA-pjfm-8j94-x5vc | Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote attackers to execute arbitrary commands via a user name that contains format characters. | [] |
|
GHSA-7jxw-rmvp-2543 | An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite (SRS60) AC3000 V2.5.1.106, Outdoor Satellite (RBS50Y) V2.5.1.106, and Pro Tri-Band Business WiFi Router (SRR60) AC3000 V2.5.1.106. The administrative SOAP interface allows an unauthenticated remote write of arbitrary Wi-Fi configuration data such as authentication details (e.g., the Web-admin password), network settings, DNS settings, system administration interface configuration, etc. | [] |
|
GHSA-5vwr-m79p-pq9c | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
|
CVE-2024-10557 | code-projects Blood Bank Management System updateprofile.php cross-site request forgery | A vulnerability has been found in code-projects Blood Bank Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /file/updateprofile.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:code-projects:blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fabianros:blood_bank_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-7c9h-q97p-3hvv | The Gotham Cerberus service was found to have a stored cross-site scripting (XSS) vulnerability that could have allowed an attacker with access to Gotham to launch attacks against other users. This vulnerability is resolved in Cerberus 100.230704.0-27-g031dd58 . | [] |
|
CVE-2023-4050 | In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox < 116, Firefox ESR < 102.14, and Firefox ESR < 115.1. | [
"cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-9820 | The National Payments Corporation of India BHIM application 1.3 for Android uses a custom keypad for which the input element is available to the Accessibility service, which makes it easier for attackers to bypass authentication. | [
"cpe:2.3:a:npci:bharat_interface_for_money_\\(bhim\\):1.3:*:*:*:*:android:*:*"
] |
|
GHSA-cc39-h55x-vp6h | An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type. | [] |
|
CVE-2025-0342 | CampCodes Computer Laboratory Management System edit cross site scripting | A vulnerability, which was classified as problematic, was found in CampCodes Computer Laboratory Management System 1.0. This affects an unknown part of the file /class/edit/edit. The manipulation of the argument s_lname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [] |
CVE-2006-5666 | SQL injection vulnerability in includes/menu.inc.php in E-Annu 1.0 allows remote attackers to execute arbitrary SQL commands via the login parameter. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:asmir_alic:e_annu:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2010-0133 | Multiple stack-based buffer overflows in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allow remote attackers to execute arbitrary code via unspecified vectors related to "certain records." | [
"cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*"
] |
|
CVE-2018-17358 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file. | [
"cpe:2.3:a:gnu:binutils:2.31.1:*:*:*:*:*:*:*"
] |
|
CVE-2001-1375 | tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory. | [
"cpe:2.3:o:conectiva:linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-37215 | Larvata Digital Technology Co. Ltd. FLYGO - Use of Incorrectly-Resolved Name or Reference-4 | The employee management page of Flygo contains an Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attacker can manipulate the user data and then over-write another employee’s user data by specifying that employee’s ID in the API parameter. | [
"cpe:2.3:a:larvata:flygo:*:*:*:*:*:*:*:*"
] |
CVE-2018-11433 | The mobi_get_kf8boundary_seqnumber function in util.c in Libmobi 0.3 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted mobi file. | [
"cpe:2.3:a:libmobi_project:libmobi:0.3:*:*:*:*:*:*:*"
] |
|
GHSA-68mm-2jm6-7vqv | In rw_t3t_act_handle_fmt_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-120497437 | [] |
|
GHSA-fgmj-4xc2-m385 | EMC Documentum eRoom version 7.4.4, EMC Documentum eRoom version 7.4.4 SP1, EMC Documentum eRoom version prior to 7.4.5 P04, EMC Documentum eRoom version prior to 7.5.0 P01 includes an unverified password change vulnerability that could potentially be exploited by malicious users to compromise the affected system. | [] |
|
GHSA-3w4w-m332-9cfq | The Login by Auth0 plugin before 4.0.0 for WordPress allows stored XSS on multiple pages, a different issue than CVE-2020-5392. | [] |
|
GHSA-4398-q7v4-m5w6 | An arbitrary file upload vulnerability in DoraCMS v2.1.8 allow attackers to execute arbitrary code via uploading a crafted HTML or image file to the user avatar. | [] |
|
GHSA-xxhw-3mwj-8m78 | Directory traversal vulnerability in img.pl in Barracuda Spam Firewall running firmware 3.1.16 and 3.1.17 allows remote attackers to read arbitrary files via a .. (dot dot) in the f parameter. | [] |
|
GHSA-rgvv-2cqq-qhg4 | The addImage method for admin.class.php in Image Gallery Web Application 0.9.10 does not properly check filenames, which allows remote attackers to upload and execute arbitrary files. | [] |
|
CVE-2020-14055 | Monsta FTP 2.10.1 or below is prone to a stored cross-site scripting vulnerability in the language setting due to insufficient output encoding. | [
"cpe:2.3:a:monstaftp:monsta_ftp:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-28032 | AtomCMS 2.0 is vulnerable to SQL Injection via Atom.CMS_admin_ajax_pages.php | [
"cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-23835 | A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.34), Mendix Applications using Mendix 8 (All versions < V8.18.23), Mendix Applications using Mendix 9 (All versions < V9.22.0), Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.10), Mendix Applications using Mendix 9 (V9.18) (All versions < V9.18.4), Mendix Applications using Mendix 9 (V9.6) (All versions < V9.6.15). Some of the Mendix runtime API’s allow attackers to bypass XPath constraints and retrieve information using XPath queries that trigger errors. | [
"cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*"
] |
|
GHSA-v8f2-89xw-2297 | The password reset feature of Ai3 QbiBot lacks proper access control, allowing unauthenticated remote attackers to reset any user's password. | [] |
|
GHSA-rj23-gmr5-hvrf | A logic issue existed in the handling of call URLs. This issue was addressed with improved state management. This issue affected versions prior to iOS 11.4.1. | [] |
|
CVE-2017-2550 | Vulnerability in Easy Joomla Backup v3.2.4. The software creates a copy of the backup in the web root with an easily guessable filename. | [
"cpe:2.3:a:kubik-rubik:easy_joomla_backup:3.2.4:*:*:*:*:joomla\\!:*:*"
] |
|
CVE-2001-1395 | Unknown vulnerability in sockfilter for Linux kernel before 2.2.19 related to "boundary cases," with unknown impact. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-5324 | Jenkins before 1.638 and LTS before 1.625.2 allow remote attackers to obtain sensitive information via a direct request to queue/api. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:redhat:openshift:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*"
] |
|
GHSA-6j43-825c-cv2c | A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1338. | [] |
|
CVE-2022-0470 | Out of bounds memory access in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-11064 | Cross-Site Scripting in TYPO3 CMS | In TYPO3 CMS greater than or equal to 9.0.0 and less than 9.5.17 and greater than or equal to 10.0.0 and less than 10.4.2, it has been discovered that HTML placeholder attributes containing data of other database records are vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. This has been fixed in 9.5.17 and 10.4.2. | [
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] |
GHSA-43cc-x849-58fv | Unspecified vulnerability in the Oracle Endeca Information Discovery Studio component in Oracle Fusion Middleware 2.2.2, 2.3, 2.4, 3.0, and 3.1 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Integrator, a different vulnerability than CVE-2015-2603, CVE-2015-2604, CVE-2015-2605, CVE-2015-2606, and CVE-2015-4745. | [] |
|
CVE-2007-1961 | PHP remote file inclusion vulnerability in mutant_functions.php in the Mutant 0.9.2 portal for phpBB 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [
"cpe:2.3:a:phpbb:mutant:0.9.2:*:*:*:*:*:*:*"
] |
|
CVE-2021-45813 | SLICAN WebCTI 1.01 2015 is affected by a Cross Site Scripting (XSS) vulnerability. The attacker can steal the user's session by injecting malicious JavaScript codes which leads to Session Hijacking and cause user's credentials theft. | [
"cpe:2.3:a:slican:webcti:1.01_2015:*:*:*:*:*:*:*"
] |
|
GHSA-jh78-94vq-38q3 | Windows Accounts Picture Elevation of Privilege Vulnerability | [] |
|
GHSA-42fx-hhpm-53j2 | Buffer overflow in Sun AnswerBook2 1.4 through 1.4.3 allows remote attackers to execute arbitrary code via a long filename argument to the gettransbitmap CGI program. | [] |
|
CVE-2016-8569 | The git_oid_nfmt function in commit.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a cat-file command with a crafted object file. | [
"cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-20470 | IBM Cognos Analytics 11.1.7 and 11.2.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 196339. | [
"cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:fixpack3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-37178 | A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). An XML external entity injection vulnerability in the underlying XML parser could cause the affected application to disclose arbitrary files to remote attackers by loading a specially crafted xml file. | [
"cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*"
] |
|
GHSA-v44p-g5j5-r658 | In the Linux kernel, the following vulnerability has been resolved:iommu/vt-d: Use device rbtree in iopf reporting pathThe existing I/O page fault handler currently locates the PCI device by
calling pci_get_domain_bus_and_slot(). This function searches the list
of all PCI devices until the desired device is found. To improve lookup
efficiency, replace it with device_rbtree_find() to search the device
within the probed device rbtree.The I/O page fault is initiated by the device, which does not have any
synchronization mechanism with the software to ensure that the device
stays in the probed device tree. Theoretically, a device could be released
by the IOMMU subsystem after device_rbtree_find() and before
iopf_get_dev_fault_param(), which would cause a use-after-free problem.Add a mutex to synchronize the I/O page fault reporting path and the IOMMU
release device path. This lock doesn't introduce any performance overhead,
as the conflict between I/O page fault reporting and device releasing is
very rare. | [] |
|
CVE-2024-0221 | The Photo Gallery by 10Web – Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.8.19 via the rename_item function. This makes it possible for authenticated attackers to rename arbitrary files on the server. This can lead to site takeovers if the wp-config.php file of a site can be renamed. By default this can be exploited by administrators only. In the premium version of the plugin, administrators can give gallery management permissions to lower level users, which might make this exploitable by users as low as contributors. | [
"cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2011-1232 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] |
|
GHSA-323w-6p85-26fr | Duplicate Advisory: Plenti - Code Injection - Denial of Services | Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-mj4v-hp69-27x5. This link is maintained to preserve external references.Original DescriptionPlenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution. | [] |
GHSA-jf4m-m2gq-5qfc | Unspecified vulnerability in the WebLogic Server component in Oracle BEA Product Suite 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 has unknown impact and remote attack vectors. | [] |
|
CVE-2023-5400 | Server receiving a malformed message based on a using the specified key values can cause a heap overflow vulnerability which could lead to an attacker performing remote code execution or causing a failure.
See Honeywell Security Notification for recommendations on upgrading and versioning.
| [
"cpe:2.3:a:honeywell:experion_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-20604 | An issue was discovered on Samsung mobile devices with O(8.x) software. Attackers can disable Gallery permanently. The Samsung ID is SVE-2019-14031 (May 2019). | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-32508 | An issue was discovered on certain Nuki Home Solutions devices. By sending a malformed HTTP verb, it is possible to force a reboot of the device. This affects Nuki Bridge v1 before 1.22.0 and v2 before 2.13.2. | [
"cpe:2.3:a:nuki:bridge_v1:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nuki:bridge_v2:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-32198 | EmTec ZOC through 8.02.4 allows remote servers to cause a denial of service (Windows GUI hang) by telling the ZOC window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. In other words, it does not implement a usleep or similar delay upon processing a title change. | [
"cpe:2.3:a:emtec:zoc:*:*:*:*:*:*:*:*"
] |
|
CVE-2009-5097 | Palm Pre WebOS 1.1 and earlier processes JavaScript in email messages, which allows remote attackers to execute arbitrary JavaScript, as demonstrated by reading PalmDatabase.db3. | [
"cpe:2.3:o:hp:palm_pre_webos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:palm_pre_webos:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:palm_pre_webos:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:palm_pre_webos:1.0.4:*:*:*:*:*:*:*"
] |
|
GHSA-7375-9833-jjwc | Service workers could reveal script base URL due to dynamic `import()`. This vulnerability affects Firefox < 113. | [] |
|
CVE-2018-12208 | Buffer overflow in HECI subsystem in Intel(R) CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel(R) TXE version before 3.1.60 or 4.0.10, or Intel(R) Server Platform Services before version 5.00.04.012 may allow an unauthenticated user to potentially execute arbitrary code via physical access. | [
"cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-g9cm-cgc6-5pfc | Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'Attendance', 'attenddate', 'YearLevel', 'eventdate', 'events', 'Users' and 'YearLevel' parameters in '/report/index.php'. | [] |
|
GHSA-q9g5-98pm-w6q7 | Cobbler XSS Vulnerability | Cobbler version Verified as present in Cobbler versions 2.6.11+, but code inspection suggests at least 2.0.0+ or possibly even older versions may be vulnerable contains a Cross Site Scripting (XSS) vulnerability in cobbler-web that can result in Privilege escalation to admin.. This attack appear to be exploitable via "network connectivity". Sending unauthenticated JavaScript payload to the Cobbler XMLRPC API (/cobbler_api). | [] |
CVE-2023-41028 | Juplink RX4-1500 Stack-based Buffer Overflow Vulnerability | A stack-based buffer overflow exists in Juplink RX4-1500, a WiFi router, in versions 1.0.2 through 1.0.5. An authenticated attacker can exploit this vulnerability to achieve code execution as root.
| [
"cpe:2.3:h:juplink:rx4-1500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juplink:rx4-1500_firmware:*:*:*:*:*:*:*:*"
] |
CVE-2022-32640 | In meta wifi, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441652; Issue ID: ALPS07441652. | [
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-2078 | In libxaac there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-114749542 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-39994 | There is an arbitrary address access vulnerability with the product line test code.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-13863 | Stylish Google Sheet Reader < 4.1 - Reflected XSS | The Stylish Google Sheet Reader 4.0 WordPress plugin before 4.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | [] |
CVE-2021-38341 | WooCommerce Payment Gateway Per Category <= 2.0.10 Reflected Cross-Site Scripting | The WooCommerce Payment Gateway Per Category WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/includes/plugin_settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.10. | [
"cpe:2.3:a:dreamfoxmedia:woocommerce_payment_gateway_per_category:*:*:*:*:*:wordpress:*:*"
] |
CVE-2009-2582 | Stack-based buffer overflow in manager.exe in Akamai Download Manager (aka DLM or dlmanager) before 2.2.4.8 allows remote web servers to execute arbitrary code via a malformed HTTP response during a Redswoosh download, a different vulnerability than CVE-2007-1891 and CVE-2007-1892. | [
"cpe:2.3:a:akamai_technologies:download_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:akamai_technologies:download_manager:2.0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:akamai_technologies:download_manager:2.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:akamai_technologies:download_manager:2.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:akamai_technologies:download_manager:2.2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:akamai_technologies:download_manager:2.2.3.6:*:*:*:*:*:*:*"
] |
|
CVE-2015-5293 | Red Hat Enterprise Virtualization Manager 3.6 and earlier gives valid SLAAC IPv6 addresses to interfaces when "boot protocol" is set to None, which might allow remote attackers to communicate with a system designated to be unreachable. | [
"cpe:2.3:a:redhat:enterprise_virtualization_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-1658 | Cisco Unified Intelligence Center Cross-Site Request Forgery Vulnerability | A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device. The vulnerability is due to insufficient CSRF protections in the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious, customized link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device via a web browser and with the privileges of the user. | [
"cpe:2.3:o:cisco:unified_intelligence_center:11.6\\(1\\):*:*:*:*:*:*:*"
] |
GHSA-mjhp-68j4-wwx7 | A Improper Neutralization of Input During Web Page Generation vulnerability in open-build-service allows remote attackers to store arbitrary JS code to cause XSS. This issue affects: openSUSE open-build-service versions prior to 7cc32c8e2ff7290698e101d9a80a9dc29a5500fb. | [] |
|
CVE-2005-1697 | The RSS module in PostNuke 0.750 and 0.760RC2 and RC3 allows remote attackers to obtain sensitive information via a direct request to simple_smarty.php, which reveals the path in an error message. | [
"cpe:2.3:a:postnuke:postnuke:0.750:*:*:*:*:*:*:*",
"cpe:2.3:a:postnuke:postnuke:0.760:rc2:*:*:*:*:*:*",
"cpe:2.3:a:postnuke:postnuke:0.760:rc3:*:*:*:*:*:*"
] |
|
CVE-2021-35207 | An issue was discovered in Zimbra Collaboration Suite 8.8 before 8.8.15 Patch 23 and 9.0 before 9.0.0 Patch 16. An XSS vulnerability exists in the login component of Zimbra Web Client, in which an attacker can execute arbitrary JavaScript by adding executable JavaScript to the loginErrorCode parameter of the login url. | [
"cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*"
] |
|
GHSA-7496-fgv9-xw82 | Unencrypted ingress/health traffic when using Wireguard transparent encryption | ImpactFor Cilium users who are using CRDs to store Cilium state (the default configuration) and [Wireguard transparent encryption](https://docs.cilium.io/en/stable/security/network/encryption-wireguard/#encryption-wg), responses from pods to the Ingress and health endpoints are not encrypted. Traffic from the Ingress and health endpoints to pods is not affected by this issue. The health endpoint is only used for Cilium's internal health checks.PatchesThis issue affects Cilium v1.14 before v1.14.7.This issue has been patched in Cilium v1.14.7.WorkaroundsThere is no workaround to this issue - affected users are encouraged to upgrade.AcknowledgementsThe Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to @gandro for their work on triaging and remediating this issue.For more informationIf you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).If you think you have found a vulnerability affecting Cilium, we strongly encourage you to report it to our security mailing list at [[email protected]](mailto:[email protected]). This is a private mailing list where only members of the Cilium internal security team are subscribed to, and your report will be treated as top priority. | [] |
CVE-2022-30653 | Adobe InCopy Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Adobe InCopy versions 17.2 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2021-31315 | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the blit function of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker. | [
"cpe:2.3:a:telegram:telegram:*:*:*:*:*:android:*:*",
"cpe:2.3:a:telegram:telegram:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:telegram:telegram:*:*:*:*:*:macos:*:*"
] |
|
GHSA-8m9x-pxwq-j236 | Pillow command injection | Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.5.0 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. | [] |
GHSA-qfvv-vx7m-j2j3 | Multiple cross-site scripting (XSS) vulnerabilities in TUTOS 1.1 allow remote attackers to inject arbitrary web script or HTML via (1) the search field of the Address Module or (2) the t parameter to app_new.php. | [] |
|
GHSA-4rcq-jv2f-898j | Incorrect Provision of Specified Functionality in qutebrowser | DescriptionAfter a certificate error was overridden by the user, qutebrowser displays the URL as yellow (`colors.statusbar.url.warn.fg`). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (`colors.statusbar.url.success_https`). While the user already has seen a certificate error prompt at this point (or set `content.ssl_strict` to `false` which is not recommended), this could still provide a false sense of security.Affected versions and patchesAll versions of qutebrowser are believed to be affected, though versions before v0.11.x couldn't be tested.The issue is fixed in qutebrowser v1.11.1 (pending release) and v1.12.0 (unreleased). Backported patches for older versions are available, but no further releases are planned.MitigationIf you are unable to upgrade:Treat any host with a certificate exception as insecure, ignoring the URL colorOr set `content.ssl_strict` to `True` (instead of `'ask'`), preventing certificate exceptionsReferencesqutebrowser issue: https://github.com/qutebrowser/qutebrowser/issues/5403Fix (master branch): https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975Related issue for KDE Falkon: https://bugs.kde.org/show_bug.cgi?id=420902Related issue for eric6 Web Browser: https://tracker.die-offenbachs.homelinux.org/eric/issue328 (fixed in eric6 20.6) | [] |
CVE-2014-8013 | The TACACS+ command-authorization implementation in Cisco NX-OS allows local users to cause a denial of service (device reload) via a long CLI command, aka Bug ID CSCur54182. | [
"cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*"
] |
|
GHSA-4h4p-v3r6-7fj5 | Unknown vulnerability in The Ignition Project ignitionServer 0.1.2 through 0.3.1, with the linking service enabled, allows remote attackers to bypass authentication. | [] |
|
GHSA-492h-x276-h4v7 | HPE Systems Insight Manager (SIM) before 7.5.1 allows remote authenticated users to obtain sensitive information or modify data via unspecified vectors, a different vulnerability than CVE-2016-2017, CVE-2016-2019, CVE-2016-2020, CVE-2016-2022, and CVE-2016-2030. | [] |
|
GHSA-8c6p-v837-77f6 | Harbor fails to validate the user permissions when updating tag immutability policies | ImpactHarbor fails to validate the user permissions when updating tag immutability policies - API call:PUT /projects/{project_name_or_id}/immutabletagrules/{immutable_rule_id}By sending a request to update a tag immutability policy with an id that belongs to a
project that the currently authenticated user doesn’t have access to, the attacker could
modify tag immutability policies configured in other projects.PatchesThis and similar issues are fixed in Harbor v2.5.2 and later. Please upgrade as soon as possible.WorkaroundsThere are no workarounds available.For more informationIf you have any questions or comments about this advisory:Open an issue in [the Harbor GitHub repository](https://github.com/goharbor/harbor)CreditsThanks to [Gal Goldstein](https://www.linkedin.com/in/gal-goldshtein/) and [Daniel Abeles](https://www.linkedin.com/in/daniel-abeles/) from [Oxeye Security](https://www.oxeye.io/) for reporting this issue. | [] |
GHSA-7vph-mg46-qvjr | An integer overflow was discovered in the CoAP library in Arm Mbed OS 5.14.0. The function sn_coap_builder_calc_needed_packet_data_size_2() is used to calculate the required memory for the CoAP message from the sn_coap_hdr_s data structure. Both returned_byte_count and src_coap_msg_ptr->payload_len are of type uint16_t. When added together, the result returned_byte_count can wrap around the maximum uint16_t value. As a result, insufficient buffer space is allocated for the corresponding CoAP message. | [] |
|
GHSA-7428-xfvg-x3qj | Windows DNS Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24536, CVE-2022-26811, CVE-2022-26812, CVE-2022-26813, CVE-2022-26814, CVE-2022-26815, CVE-2022-26818, CVE-2022-26819, CVE-2022-26820, CVE-2022-26821, CVE-2022-26822, CVE-2022-26823, CVE-2022-26824, CVE-2022-26825, CVE-2022-26826, CVE-2022-26829. | [] |
Subsets and Splits