id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
CVE-2011-2461
Cross-site scripting (XSS) vulnerability in the Adobe Flex SDK 3.x and 4.x before 4.6 allows remote attackers to inject arbitrary web script or HTML via vectors related to the loading of modules from different domains.
[ "cpe:2.3:a:adobe:flex_sdk:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:3.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:3.5a:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flex_sdk:4.5.1:*:*:*:*:*:*:*" ]
CVE-2019-8458
Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
[ "cpe:2.3:a:checkpoint:endpoint_security_clients:*:*:*:*:*:windows:*:*", "cpe:2.3:a:checkpoint:remote_access_clients:*:*:*:*:*:windows:*:*", "cpe:2.3:a:checkpoint:capsule_docs:*:*:*:*:*:*:*:*" ]
GHSA-m2fc-p56h-223h
WQuinn QuotaAdvisor 4.1 does not properly record file sizes if they are stored in alternative data streams, which allows users to bypass quota restrictions.
[]
GHSA-w93m-vpf6-mmmj
Western Bridge Cobub Razor 0.8.0 has a file upload vulnerability via the web/assets/swf/uploadify.php URI, as demonstrated by a .php file with the image/jpeg content type.
[]
GHSA-g58f-pj48-2p3r
Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection.
[]
CVE-2017-0623
An elevation of privilege vulnerability in the HTC bootloader could enable a local malicious application to execute arbitrary code within the context of the bootloader. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-32512358.
[ "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*" ]
GHSA-g5p4-4prv-87hc
Huawei EC156, EC176, and EC177 USB Modem products with software before UTPS-V200R003B015D02SP07C1014 (23.015.02.07.1014) and before V200R003B015D02SP08C1014 (23.015.02.08.1014) use a weak ACL for the "Mobile Partner" directory, which allows remote attackers to gain SYSTEM privileges by compromising a low privilege account and modifying Mobile Partner.exe.
[]
GHSA-gfj2-m63m-4q89
The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the feedzy dashboard in all versions up to, and including, 4.4.1. This makes it possible for authenticated attackers, with contributor access or higher, to create, edit or delete feed categories created by them.
[]
GHSA-9wvm-c92g-hvqg
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer.
[]
GHSA-f44q-634c-jvwv
libp2p DoS vulnerability from lack of resource management
ImpactVersions older than `v0.38.0` of js-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of js-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.Patches (What to do as a js-libp2p consumer:)Update your js-libp2p dependency to `v0.38.0` or greater.WorkaroundsThere are no workarounds, and so we recommend to upgrade your js-libp2p version. Some range of attacks can be mitigated using OS tools (like manually blocking malicious peers using iptables or ufw ) or making use of a load balancer in front of libp2p nodes. You can also use the [allow deny list in js-libp2p](https://docs.libp2p.io/concepts/security/dos-mitigation/#deny-specific-peers-or-create-an-allow-list-of-trusted-peers) to deny specific peers.However these require direct action & responsibility on your part and are no substitutes for upgrading js-libp2p. Therefore, we highly recommend upgrading your js-libp2p version for the way it enables tighter scoped limits and provides visibility into and easier reasoning about js-libp2p resource utilization.ReferencesDoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/.Documentation on how to configure limits to prevent excessive resource consumption: https://github.com/libp2p/js-libp2p/blob/master/doc/LIMITS.mdDocumentation on how to configure metrics: https://github.com/libp2p/js-libp2p/blob/master/doc/METRICS.mdPlease see the related disclosure for go-libp2p: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw and rust-libp2p: https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8For more informationIf you have any questions or comments about this advisory, please email us at [[email protected]](mailto:[email protected]).
[]
CVE-2012-2877
The extension system in Google Chrome before 22.0.1229.79 does not properly handle modal dialogs, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.76:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" ]
GHSA-qq26-cc34-x2q4
Dell EMC Isilon versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, versions 7.2.1.x, and version 7.1.1.11 is affected by a cross-site scripting vulnerability in the Antivirus Page within the OneFS web administration interface. A malicious administrator may potentially inject arbitrary HTML or JavaScript code in the user's browser session in the context of the OneFS website.
[]
GHSA-9qvp-w68q-7r55
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
[]
GHSA-q868-qjg7-cjw8
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products Portal 9.1 and PeopleTools 8.52 allows remote attackers to affect integrity via vectors related to PIA Core Technology.
[]
GHSA-pxx5-vxcm-5v5q
The ScanSafe module in Cisco IOS 15.3(3)M allows remote attackers to cause a denial of service (device reload) via HTTPS packets that require tower processing, aka Bug ID CSCum97038.
[]
CVE-2024-7945
itsourcecode Laravel Property Management System Notes Page create cross site scripting
A vulnerability was found in itsourcecode Laravel Property Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/notes/create of the component Notes Page. The manipulation of the argument Note text leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:itsourcecode:laravel_property_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adonesevangelista:laravel_property_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-cqmh-9h94-59vr
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to improper neutralization of special elements in output, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.
[]
GHSA-7rr9-w99c-9r9h
Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Security. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that CanonicalizerBase.java in the XML canonicalizer allows untrusted code to access mutable byte arrays.
[]
GHSA-xxp7-423f-hcp4
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8465, CVE-2018-8466.
[]
CVE-2024-38972
A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-ports/add/.
[ "cpe:2.3:a:netbox:netbox:4.0.3:*:*:*:*:*:*:*" ]
GHSA-ppq4-pxjf-2xx4
Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function.
[]
GHSA-9hw8-279p-g3rh
SQL injection vulnerability in duyuruoku.asp in Hunkaray Okul Portali 1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2007-3080.
[]
GHSA-j37g-ggjf-325g
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in reDim GmbH CookieHint WP allows Stored XSS. This issue affects CookieHint WP: from n/a through 1.0.0.
[]
CVE-2021-38207
drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-fxwm-r967-j2fq
An issue was discovered in SchoolCMS 2.3.1. There is an XSS vulnerability via index.php?a=Index&c=Channel&m=Home&id=[XSS].
[]
GHSA-r445-r4r9-q329
Usedesk before 1.7.57 allows chat template injection.
[]
CVE-2018-13412
An issue was discovered in the Self Service Portal in Zoho ManageEngine Desktop Central before 10.0.282. A clickable company logo in a window running as SYSTEM can be abused to escalate privileges. In cloud, the issue is fixed in 10.0.470 agent version.
[ "cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:*" ]
CVE-2008-7003
Multiple SQL injection vulnerabilities in login.php in The Rat CMS Alpha 2 allow remote attackers to execute arbitrary SQL commands via the (1) user_id and (2) password parameter.
[ "cpe:2.3:a:the-rat-cms:the-rat-cms:alpha2:*:*:*:*:*:*:*" ]
GHSA-82v4-fg2r-jwvh
In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008268.
[]
CVE-2006-1634
Cross-site scripting (XSS) vulnerability in index.php in LucidCMS 2.0.0 RC4 allows remote attackers to inject arbitrary web script or HTML via the command parameter.
[ "cpe:2.3:a:lucidcms:lucidcms:2.0.0_rc4:*:*:*:*:*:*:*" ]
CVE-2024-39928
Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability
In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils. Users are recommended to upgrade to version 1.6.0, which fixes this issue.
[ "cpe:2.3:a:apache_software_foundation:apache_linkis_spark_engineconn:*:*:*:*:*:*:*:*" ]
GHSA-9w89-223r-7hm3
Incorrect access control in Aternity agent in Riverbed Aternity before 12.1.4.27 allows for local privilege escalation. There is an insufficiently protected handle to the A180AG.exe SYSTEM process with PROCESS_ALL_ACCESS rights.
[]
CVE-2012-4883
Multiple untrusted search path vulnerabilities in 3DVIA Composer V6R2012 HF1 Build 6.8.1.1652 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) ibfs32.dll file in the current working directory, as demonstrated by a directory that contains a .smg file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:3ds:3dvia_composer:6.8.1.1652:*:*:*:*:*:*:*" ]
CVE-2022-4139
An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*" ]
GHSA-vjcq-9wcj-6rq5
The kernfs_xread function in kernfs in NetBSD 1.6 through 2.1, and OpenBSD 3.8, does not properly validate file offsets against negative 32-bit values that occur as a result of truncation, which allows local users to read arbitrary kernel memory and gain privileges via the lseek system call.
[]
CVE-2023-2530
A privilege escalation allowing remote code execution was discovered in the orchestration service.
[ "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2023.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2023.1.0:*:*:*:*:*:*:*" ]
CVE-2019-6338
third-party PEAR Archive_Tar library updates
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details
[ "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2024-48540
Incorrect access control in XIAO HE Smart 4.3.1 allows attackers to access sensitive information by analyzing the code and data within the APK file.
[ "cpe:2.3:o:shenzhen_xiaohe_lejia_technology_co:xiaohesmart_firmware:4.3.1:*:*:*:*:*:*:*" ]
GHSA-w7xx-5rj3-rrrc
A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data.
[]
GHSA-mh89-qc88-2rhh
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the saveitem parameter at lan2lan.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[]
CVE-2020-25211
In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
GHSA-gjmc-7r6g-xcjq
Buffer overflow in the get_file_list_stdin function in jpegtoavi 1.5 allows remote attackers to execute arbitrary code via a crafted set of JPEG files and filenames.
[]
CVE-2020-0456
There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-170378843
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
GHSA-r76r-59x7-cv24
Foxit PDF Reader and Editor before 11.2.1 and PhantomPDF before 10.1.7 allow a NULL pointer dereference during PDF parsing because the pointer is used without proper validation.
[]
CVE-2022-21480
Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: User Interface). Supported versions that are affected are 6.4.3 and 6.5.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Transportation Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Transportation Management accessible data as well as unauthorized read access to a subset of Oracle Transportation Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:transportation_management:6.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:transportation_management:6.5.1:*:*:*:*:*:*:*" ]
GHSA-96c6-p7fm-48ww
SQL injection vulnerability in the admin login panel for Ocean12 Mailing List Manager 1.06 allows remote attackers to execute arbitrary SQL commands via the Admin_id parameter.
[]
CVE-2025-4049
Hardcoded SQLite password in FARA
Use of hard-coded, the same among all vulnerable installations SQLite credentials vulnerability in SIGNUM-NET FARA allows to read and manipulate local-stored database.This issue affects FARA: through 5.0.80.34.
[]
CVE-2009-4963
Cross-site scripting (XSS) vulnerability in the Commerce extension before 0.9.9 for TYPO3 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:typo3:commerce_extension:*:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:commerce_extension:0.8.32:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:commerce_extension:0.8.35:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:commerce_extension:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:commerce_extension:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:commerce_extension:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:commerce_extension:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
CVE-2025-24075
Microsoft Excel Remote Code Execution Vulnerability
Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
[]
CVE-2011-4967
tog-Pegasus has a package hash collision DoS vulnerability
[ "cpe:2.3:a:openpegasus:tog-pegasus:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ]
GHSA-7p8m-6xxh-cwjp
The WStr::assign function in kso.dll in Kingsoft WPS Office 10.1.0.7106 and 10.2.0.5978 does not validate the size of the source memory block before an _copy call, which allows remote attackers to cause a denial of service (access violation and application crash) via a crafted (a) web page, (b) office document, or (c) .rtf file.
[]
GHSA-rjr6-c78c-px55
A server side injection vulnerability exists which could allow an authenticated administrative user to achieve Remote Code Execution in ClearPass. Resolution: Fixed in 6.7.13, 6.8.4, 6.9.0 and higher.
[]
CVE-2017-14298
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x00000000000038e8."
[ "cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*" ]
CVE-2021-0305
In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-154015447
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
GHSA-3rm3-2566-pgwv
A denial of service exists in gitlab <v12.3.2, <v12.2.6, and <v12.1.10 that would let an attacker bypass input validation in markdown fields take down the affected page.
[]
GHSA-8vfc-6r4c-h3xg
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.2, 6.3, 6.3.1, and 6.3.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Data, Domain & Function Security.
[]
CVE-2010-4624
MyBB (aka MyBulletinBoard) before 1.4.12 allows remote authenticated users to bypass intended restrictions on the number of [img] MyCodes by editing a post after it has been created.
[ "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.02:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.03:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.04:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:mybb:mybb:1.4.10:*:*:*:*:*:*:*" ]
GHSA-j4pj-4grx-6wvq
The PlayScape (aka playscape.mominis.gameconsole.com) application 9.3.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
CVE-2007-5712
The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers.
[ "cpe:2.3:a:django_project:django:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:django_project:django:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:django_project:django:0.95.1:*:*:*:*:*:*:*", "cpe:2.3:a:django_project:django:0.96:*:*:*:*:*:*:*" ]
CVE-2024-44815
Vulnerability in Hathway Skyworth Router CM5100 v.4.1.1.24 allows a physically proximate attacker to obtain user credentials via SPI flash Firmware W25Q64JV.
[ "cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*", "cpe:2.3:o:hathway:skyworth_cm5100-511_firmware:4.1.1.24:*:*:*:*:*:*:*", "cpe:2.3:h:hathway:skyworth_cm5100-511:-:*:*:*:*:*:*:*" ]
GHSA-5jg7-j4xc-267p
In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the auto-generation function was identified. Reported by Karol Więsek.
[]
CVE-2023-46225
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.
[ "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2012-2429
The server in xArrow before 3.4.1 performs an invalid read operation, which allows remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:xarrow:xarrow:*:*:*:*:*:*:*:*" ]
GHSA-29ph-8jj3-f6p6
An issue was discovered in Samsung Mobile Chipset and Baseband Modem Chipset for Exynos 850, Exynos 980, Exynos 1080, Exynos 1280, Exynos 2200, Exynos Modem 5123, Exynos Modem 5300, Exynos Auto T5123, and Exynos W920. A heap-based buffer overflow in the 5G MM message codec can occur due to insufficient parameter validation when decoding operator-defined access category definitions.
[]
GHSA-6fmj-cv39-m2r9
admin.php in Arz Development The Gemini Portal 4.7 and earlier allows remote attackers to bypass authentication and gain administrator privileges by setting the user cookie to "admin" and setting the name parameter to "users."
[]
GHSA-3wm9-x999-hch2
PHP remote file inclusion vulnerability in al_initialize.php for AutoLinks Pro 2.1 allows remote attackers to execute arbitrary PHP code via an "ftp://" URL in the alpath parameter, which bypasses the incomplete blacklist that only checks for "http" and "https" URLs.
[]
CVE-2021-27139
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to extract information from the device without authentication by disabling JavaScript and visiting /info.asp.
[ "cpe:2.3:o:fiberhome:hg6245d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:fiberhome:hg6245d:-:*:*:*:*:*:*:*" ]
CVE-2017-11839
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to take control of an affected system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
[ "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
GHSA-pf3c-vwf3-mg42
An exploitable sql injection vulnerability exists in the email parameter functionality of OS4Ed openSIS 7.3. The email parameter in the page EmailCheck.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[]
CVE-2014-3350
Cisco Intelligent Automation for Cloud (aka Cisco Cloud Portal) does not properly implement URL redirection, which allows remote authenticated users to obtain sensitive information via a crafted URL, aka Bug ID CSCuh84870.
[ "cpe:2.3:a:cisco:cloud_portal:-:*:*:*:*:*:*:*" ]
GHSA-g2f9-237v-8mgp
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LambertGroup Sticky Radio Player allows SQL Injection. This issue affects Sticky Radio Player: from n/a through 3.4.
[]
CVE-2017-2608
Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383).
[ "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*" ]
GHSA-2ch4-vpw2-3h66
Dell PowerScale OneFS versions 8.2.x - 9.3.0.x contains a denial-of-service vulnerability in SmartConnect. An unprivileged network attacker could potentially exploit this vulnerability, leading to denial-of-service. (of course this is temporary and will need to be adapted/reviewed as we determine the CWE with Srisimha Tummala 's help)
[]
GHSA-49qx-p7j9-rjh6
Reflected XSS in wordpress plugin page-layout-builder v1.9.3
[]
CVE-2022-42799
The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
CVE-2007-4442
Stack-based buffer overflow in the logging function in the Unreal engine, possibly 2003 and 2004, as used in the internal web server, allows remote attackers to cause a denial of service (application crash) via a request for a long .gif filename in the images/ directory, related to conversion from Unicode to ASCII.
[ "cpe:2.3:a:epic_games:unreal_engine:2003:*:*:*:*:*:*:*", "cpe:2.3:a:epic_games:unreal_engine:2004:*:*:*:*:*:*:*" ]
GHSA-m823-4q9p-vch7
Cross-Site Request Forgery (CSRF) vulnerability in Palasthotel (in person: Edward Bock) Use Memcached plugin <= 1.0.4 versions.
[]
CVE-2022-1577
Database Backup for WordPress < 2.5.2 - Arbitrary Schedule Settings Update via CSRF
The Database Backup for WordPress plugin before 2.5.2 does not have CSRF check in place when updating the schedule backup settings, which could allow an attacker to make a logged in admin change them via a CSRF attack. This could lead to cases where attackers can send backup notification emails to themselves, which contain more details. Or disable the automatic backup schedule
[ "cpe:2.3:a:deliciousbrains:database_backup:*:*:*:*:*:wordpress:*:*" ]
CVE-2010-3010
Cross-site scripting (XSS) vulnerability on the HP 3Com OfficeConnect Gigabit VPN Firewall 3CREVF100-73 with firmware before 1.0.13 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: a separate XSS issue for HP System Management Homepage (SMH) was originally assigned CVE-2010-3010 due to a CNA error, but CVE-2010-3012 is the appropriate identifier for the SMH issue.
[ "cpe:2.3:o:hp:3com_officeconnect_gigabit_vpn_firewall_software:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:3com_officeconnect_gigabit_vpn_firewall_software:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:hp:3crevf100-73:*:*:*:*:*:*:*:*" ]
CVE-2019-4310
IBM Security Guardium Big Data Intelligence 4.0 (SonarG) uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 161036.
[ "cpe:2.3:a:ibm:security_guardium_big_data_intelligence:4.0:*:*:*:*:*:*:*" ]
CVE-2020-4647
IBM Sterling File Gateway 2.2.0.0 through 2.2.6.5 and 6.0.0.0 through 6.0.3.2 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.
[ "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*" ]
CVE-2017-18777
Certain NETGEAR devices are affected by administrative password disclosure. This affects D6220 before V1.0.0.28, D6400 before V1.0.0.60, D8500 before V1.0.3.29, DGN2200v4 before 1.0.0.82, DGN2200Bv4 before 1.0.0.82, R6300v2 before 1.0.4.8, R6400 before 1.0.1.20, R6700 before 1.0.1.20, R6900 before 1.0.1.20, R7000 before 1.0.7.10, R7100LG before V1.0.0.32, R7300DST before 1.0.0.52, R7900 before 1.0.1.16, R8000 before 1.0.3.36, R8300 before 1.0.2.94, R8500 before 1.0.2.94, WNDR3400v3 before 1.0.1.12, and WNR3500Lv2 before 1.2.0.40.
[ "cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:dgn2200:v4:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:dgn2200b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:dgn2200b:v4:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr3500l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr3500l:v2:*:*:*:*:*:*:*" ]
GHSA-vgw3-33x7-h3gh
Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of13::HelloElemVersionBitmap::unpack.This issue affects libfluid: 0.1.0.
[]
CVE-2024-13176
Timing side-channel in ECDSA signature computation
Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by an attacker. However, measuring the timing would require either local access to the signing application or a very fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. For that reason the severity of this vulnerability is Low. The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.
[]
GHSA-2gmp-hjmm-v2wx
Incorrect Access Control issue discoverd in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to write arbitrary files via improper sanitation on the source for COPY and MOVE operations.
[]
CVE-2017-16926
Ohcount 3.0.0 is prone to a command injection via specially crafted filenames containing shell metacharacters, which can be exploited by an attacker (providing a source tree for Ohcount processing) to execute arbitrary code as the user running Ohcount.
[ "cpe:2.3:a:ohcount_project:ohcount:3.0.0:*:*:*:*:*:*:*" ]
GHSA-c5gh-2ch3-8fjw
In nfc_ncif_proc_t3t_polling_ntf of nfc_ncif.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141547128
[]
GHSA-jgfq-3rxx-m3mq
An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. XSS can occur via a payload in the SAMLResponse parameter of the HTTP request body.
[]
GHSA-27r3-85x4-pfqv
The contains an IDOR vulnerability that allows a user to comment on a private post by manipulating the ID included in the request
[]
GHSA-9w5w-83r2-23xw
Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands.
[]
GHSA-hqwv-qhhm-qq2g
Insufficient Granularity of Access Control in GitHub repository fossbilling/fossbilling prior to 0.5.0.
[]
CVE-2007-5838
Aclient in Symantec Altiris Deployment Solution 6.x before 6.8.380.0 allows local users to gain local System privileges via the "Enable key-based authentication to Deployment server" browser option, a different issue than CVE-2007-4380.
[ "cpe:2.3:a:symantec:altiris_deployment_solution:6:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:altiris_deployment_solution:6.8:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:altiris_deployment_solution:6.8:sp1:*:*:*:*:*:*", "cpe:2.3:a:symantec:altiris_deployment_solution:6.8:sp2:*:*:*:*:*:*" ]
CVE-2025-52714
WordPress Traveler < 3.2.2 - SQL Injection Vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shinetheme Traveler allows SQL Injection. This issue affects Traveler: from n/a through n/a.
[]
GHSA-r68c-fgxv-3ppx
Redatam7 (formerly Redatam WebServer) allows remote attackers to discover the installation path via an invalid LFN parameter to the /redbin/rpwebutilities.exe/text URI.
[]
CVE-2021-26620
IPTIME NAS2dual improper authentication vulnerability
An improper authentication vulnerability leading to information leakage was discovered in iptime NAS2dual. Remote attackers are able to steal important information in the server by exploiting vulnerabilities such as insufficient authentication when accessing the shared folder and changing user’s passwords.
[ "cpe:2.3:o:iptime:nas101_firmware:*:*:*:*:*:windows:*:*", "cpe:2.3:h:iptime:nas101:-:*:*:*:*:*:*:*", "cpe:2.3:o:iptime:nas1dual_firmware:*:*:*:*:*:windows:*:*", "cpe:2.3:h:iptime:nas1dual:-:*:*:*:*:*:*:*", "cpe:2.3:o:iptime:nas2dual_firmware:*:*:*:*:*:windows:*:*", "cpe:2.3:h:iptime:nas2dual:-:*:*:*:*:*:*:*", "cpe:2.3:o:iptime:nas3_firmware:*:*:*:*:*:windows:*:*", "cpe:2.3:h:iptime:nas3:-:*:*:*:*:*:*:*", "cpe:2.3:o:iptime:nas4_firmware:*:*:*:*:*:windows:*:*", "cpe:2.3:h:iptime:nas4:-:*:*:*:*:*:*:*", "cpe:2.3:o:iptime:nas4dual_firmware:*:*:*:*:*:windows:*:*", "cpe:2.3:h:iptime:nas4dual:-:*:*:*:*:*:*:*", "cpe:2.3:o:iptime:nas-i_firmware:*:*:*:*:*:windows:*:*", "cpe:2.3:h:iptime:nas-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:iptime:nas-ii_firmware:*:*:*:*:*:windows:*:*", "cpe:2.3:h:iptime:nas-ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:iptime:nas-iie_firmware:*:*:*:*:*:windows:*:*", "cpe:2.3:h:iptime:nas-iie:-:*:*:*:*:*:*:*" ]
GHSA-44m2-j498-j5h8
Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect confidentiality and integrity, related to libsasl.
[]
GHSA-3q2q-8m5p-gc7q
The 'name' parameter of the process_registration.php resourcedoes not validate the characters received and theyare sent unfiltered to the database.
[]
CVE-2018-17926
The product M2M ETHERNET (FW Versions 2.22 and prior, ETH-FW Versions 1.01 and prior) is vulnerable in that an attacker can upload a malicious language file by bypassing the user authentication mechanism.
[ "cpe:2.3:o:abb:eth-fw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:abb:fw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:abb:m2m_ethernet:-:*:*:*:*:*:*:*" ]
CVE-2022-27176
Incomplete filtering of special elements vulnerability exists in RevoWorks SCVX using 'File Sanitization Library' 1.043 and prior versions, RevoWorks Browser 2.2.67 and prior versions (when using 'File Sanitization Option'), and RevoWorks Desktop 2.1.84 and prior versions (when using 'File Sanitization Option'), which may allow an attacker to execute a malicious macro by having a user to download, import, and open a specially crafted file in the local environment.
[ "cpe:2.3:a:jscom:revoworks_browser:*:*:*:*:*:*:*:*", "cpe:2.3:a:jscom:revoworks_desktop:*:*:*:*:*:*:*:*", "cpe:2.3:a:jscom:revoworks_scvx:*:*:*:*:*:*:*:*" ]
GHSA-h8f5-36j5-929q
HP OpenMail can be misconfigured to allow users to run arbitrary commands using malicious print requests.
[]