id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2011-2461
|
Cross-site scripting (XSS) vulnerability in the Adobe Flex SDK 3.x and 4.x before 4.6 allows remote attackers to inject arbitrary web script or HTML via vectors related to the loading of modules from different domains.
|
[
"cpe:2.3:a:adobe:flex_sdk:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:3.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flex_sdk:4.5.1:*:*:*:*:*:*:*"
] |
|
CVE-2019-8458
|
Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
|
[
"cpe:2.3:a:checkpoint:endpoint_security_clients:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:checkpoint:remote_access_clients:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:checkpoint:capsule_docs:*:*:*:*:*:*:*:*"
] |
|
GHSA-m2fc-p56h-223h
|
WQuinn QuotaAdvisor 4.1 does not properly record file sizes if they are stored in alternative data streams, which allows users to bypass quota restrictions.
|
[] |
|
GHSA-w93m-vpf6-mmmj
|
Western Bridge Cobub Razor 0.8.0 has a file upload vulnerability via the web/assets/swf/uploadify.php URI, as demonstrated by a .php file with the image/jpeg content type.
|
[] |
|
GHSA-g58f-pj48-2p3r
|
Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection.
|
[] |
|
CVE-2017-0623
|
An elevation of privilege vulnerability in the HTC bootloader could enable a local malicious application to execute arbitrary code within the context of the bootloader. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-32512358.
|
[
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
] |
|
GHSA-g5p4-4prv-87hc
|
Huawei EC156, EC176, and EC177 USB Modem products with software before UTPS-V200R003B015D02SP07C1014 (23.015.02.07.1014) and before V200R003B015D02SP08C1014 (23.015.02.08.1014) use a weak ACL for the "Mobile Partner" directory, which allows remote attackers to gain SYSTEM privileges by compromising a low privilege account and modifying Mobile Partner.exe.
|
[] |
|
GHSA-gfj2-m63m-4q89
|
The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the feedzy dashboard in all versions up to, and including, 4.4.1. This makes it possible for authenticated attackers, with contributor access or higher, to create, edit or delete feed categories created by them.
|
[] |
|
GHSA-9wvm-c92g-hvqg
|
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to reassign drivers for any printer.
|
[] |
|
GHSA-f44q-634c-jvwv
|
libp2p DoS vulnerability from lack of resource management
|
ImpactVersions older than `v0.38.0` of js-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of js-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack.Patches (What to do as a js-libp2p consumer:)Update your js-libp2p dependency to `v0.38.0` or greater.WorkaroundsThere are no workarounds, and so we recommend to upgrade your js-libp2p version.
Some range of attacks can be mitigated using OS tools (like manually blocking malicious peers using iptables or ufw ) or making use of a load balancer in front of libp2p nodes.
You can also use the [allow deny list in js-libp2p](https://docs.libp2p.io/concepts/security/dos-mitigation/#deny-specific-peers-or-create-an-allow-list-of-trusted-peers) to deny specific peers.However these require direct action & responsibility on your part and are no substitutes for upgrading js-libp2p. Therefore, we highly recommend upgrading your js-libp2p version for the way it enables tighter scoped limits and provides visibility into and easier reasoning about js-libp2p resource utilization.ReferencesDoS Mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/.Documentation on how to configure limits to prevent excessive resource consumption: https://github.com/libp2p/js-libp2p/blob/master/doc/LIMITS.mdDocumentation on how to configure metrics: https://github.com/libp2p/js-libp2p/blob/master/doc/METRICS.mdPlease see the related disclosure for go-libp2p: https://github.com/libp2p/go-libp2p/security/advisories/GHSA-j7qp-mfxf-8xjw and rust-libp2p: https://github.com/libp2p/rust-libp2p/security/advisories/GHSA-jvgw-gccv-q5p8For more informationIf you have any questions or comments about this advisory, please email us at [[email protected]](mailto:[email protected]).
|
[] |
CVE-2012-2877
|
The extension system in Google Chrome before 22.0.1229.79 does not properly handle modal dialogs, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.62:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.63:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.64:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.67:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:22.0.1229.76:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"
] |
|
GHSA-qq26-cc34-x2q4
|
Dell EMC Isilon versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, versions 7.2.1.x, and version 7.1.1.11 is affected by a cross-site scripting vulnerability in the Antivirus Page within the OneFS web administration interface. A malicious administrator may potentially inject arbitrary HTML or JavaScript code in the user's browser session in the context of the OneFS website.
|
[] |
|
GHSA-9qvp-w68q-7r55
|
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
|
[] |
|
GHSA-q868-qjg7-cjw8
|
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products Portal 9.1 and PeopleTools 8.52 allows remote attackers to affect integrity via vectors related to PIA Core Technology.
|
[] |
|
GHSA-pxx5-vxcm-5v5q
|
The ScanSafe module in Cisco IOS 15.3(3)M allows remote attackers to cause a denial of service (device reload) via HTTPS packets that require tower processing, aka Bug ID CSCum97038.
|
[] |
|
CVE-2024-7945
|
itsourcecode Laravel Property Management System Notes Page create cross site scripting
|
A vulnerability was found in itsourcecode Laravel Property Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/notes/create of the component Notes Page. The manipulation of the argument Note text leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:itsourcecode:laravel_property_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adonesevangelista:laravel_property_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-cqmh-9h94-59vr
|
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to improper neutralization of special elements in output, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.
|
[] |
|
GHSA-7rr9-w99c-9r9h
|
Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Security. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that CanonicalizerBase.java in the XML canonicalizer allows untrusted code to access mutable byte arrays.
|
[] |
|
GHSA-xxp7-423f-hcp4
|
ChakraCore RCE Vulnerability
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8465, CVE-2018-8466.
|
[] |
CVE-2024-38972
|
A cross-site scripting (XSS) vulnerability in netbox v4.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter at /dcim/power-ports/add/.
|
[
"cpe:2.3:a:netbox:netbox:4.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-ppq4-pxjf-2xx4
|
Heap-based buffer overflow in the php_quot_print_encode function in ext/standard/quot_print.c in PHP before 5.3.26 and 5.4.x before 5.4.16 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted argument to the quoted_printable_encode function.
|
[] |
|
GHSA-9hw8-279p-g3rh
|
SQL injection vulnerability in duyuruoku.asp in Hunkaray Okul Portali 1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter, a different vector than CVE-2007-3080.
|
[] |
|
GHSA-j37g-ggjf-325g
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in reDim GmbH CookieHint WP allows Stored XSS. This issue affects CookieHint WP: from n/a through 1.0.0.
|
[] |
|
CVE-2021-38207
|
drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-fxwm-r967-j2fq
|
An issue was discovered in SchoolCMS 2.3.1. There is an XSS vulnerability via index.php?a=Index&c=Channel&m=Home&id=[XSS].
|
[] |
|
GHSA-r445-r4r9-q329
|
Usedesk before 1.7.57 allows chat template injection.
|
[] |
|
CVE-2018-13412
|
An issue was discovered in the Self Service Portal in Zoho ManageEngine Desktop Central before 10.0.282. A clickable company logo in a window running as SYSTEM can be abused to escalate privileges. In cloud, the issue is fixed in 10.0.470 agent version.
|
[
"cpe:2.3:a:zohocorp:manageengine_desktop_central:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-7003
|
Multiple SQL injection vulnerabilities in login.php in The Rat CMS Alpha 2 allow remote attackers to execute arbitrary SQL commands via the (1) user_id and (2) password parameter.
|
[
"cpe:2.3:a:the-rat-cms:the-rat-cms:alpha2:*:*:*:*:*:*:*"
] |
|
GHSA-82v4-fg2r-jwvh
|
In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008268.
|
[] |
|
CVE-2006-1634
|
Cross-site scripting (XSS) vulnerability in index.php in LucidCMS 2.0.0 RC4 allows remote attackers to inject arbitrary web script or HTML via the command parameter.
|
[
"cpe:2.3:a:lucidcms:lucidcms:2.0.0_rc4:*:*:*:*:*:*:*"
] |
|
CVE-2024-39928
|
Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability
|
In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils.
Users are recommended to upgrade to version 1.6.0, which fixes this issue.
|
[
"cpe:2.3:a:apache_software_foundation:apache_linkis_spark_engineconn:*:*:*:*:*:*:*:*"
] |
GHSA-9w89-223r-7hm3
|
Incorrect access control in Aternity agent in Riverbed Aternity before 12.1.4.27 allows for local privilege escalation. There is an insufficiently protected handle to the A180AG.exe SYSTEM process with PROCESS_ALL_ACCESS rights.
|
[] |
|
CVE-2012-4883
|
Multiple untrusted search path vulnerabilities in 3DVIA Composer V6R2012 HF1 Build 6.8.1.1652 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) ibfs32.dll file in the current working directory, as demonstrated by a directory that contains a .smg file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:3ds:3dvia_composer:6.8.1.1652:*:*:*:*:*:*:*"
] |
|
CVE-2022-4139
|
An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*"
] |
|
GHSA-vjcq-9wcj-6rq5
|
The kernfs_xread function in kernfs in NetBSD 1.6 through 2.1, and OpenBSD 3.8, does not properly validate file offsets against negative 32-bit values that occur as a result of truncation, which allows local users to read arbitrary kernel memory and gain privileges via the lseek system call.
|
[] |
|
CVE-2023-2530
|
A privilege escalation allowing remote code execution was discovered in the orchestration service.
|
[
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2023.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2023.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-6338
|
third-party PEAR Archive_Tar library updates
|
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details
|
[
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
CVE-2024-48540
|
Incorrect access control in XIAO HE Smart 4.3.1 allows attackers to access sensitive information by analyzing the code and data within the APK file.
|
[
"cpe:2.3:o:shenzhen_xiaohe_lejia_technology_co:xiaohesmart_firmware:4.3.1:*:*:*:*:*:*:*"
] |
|
GHSA-w7xx-5rj3-rrrc
|
A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data.
|
[] |
|
GHSA-mh89-qc88-2rhh
|
Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the saveitem parameter at lan2lan.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[] |
|
CVE-2020-25211
|
In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
] |
|
GHSA-gjmc-7r6g-xcjq
|
Buffer overflow in the get_file_list_stdin function in jpegtoavi 1.5 allows remote attackers to execute arbitrary code via a crafted set of JPEG files and filenames.
|
[] |
|
CVE-2020-0456
|
There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-170378843
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-r76r-59x7-cv24
|
Foxit PDF Reader and Editor before 11.2.1 and PhantomPDF before 10.1.7 allow a NULL pointer dereference during PDF parsing because the pointer is used without proper validation.
|
[] |
|
CVE-2022-21480
|
Vulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: User Interface). Supported versions that are affected are 6.4.3 and 6.5.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Transportation Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Transportation Management accessible data as well as unauthorized read access to a subset of Oracle Transportation Management accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:transportation_management:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:transportation_management:6.5.1:*:*:*:*:*:*:*"
] |
|
GHSA-96c6-p7fm-48ww
|
SQL injection vulnerability in the admin login panel for Ocean12 Mailing List Manager 1.06 allows remote attackers to execute arbitrary SQL commands via the Admin_id parameter.
|
[] |
|
CVE-2025-4049
|
Hardcoded SQLite password in FARA
|
Use of hard-coded, the same among all vulnerable installations SQLite credentials vulnerability in SIGNUM-NET FARA allows to read and manipulate local-stored database.This issue affects FARA: through 5.0.80.34.
|
[] |
CVE-2009-4963
|
Cross-site scripting (XSS) vulnerability in the Commerce extension before 0.9.9 for TYPO3 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:typo3:commerce_extension:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:commerce_extension:0.8.32:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:commerce_extension:0.8.35:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:commerce_extension:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:commerce_extension:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:commerce_extension:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:commerce_extension:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-24075
|
Microsoft Excel Remote Code Execution Vulnerability
|
Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
|
[] |
CVE-2011-4967
|
tog-Pegasus has a package hash collision DoS vulnerability
|
[
"cpe:2.3:a:openpegasus:tog-pegasus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-7p8m-6xxh-cwjp
|
The WStr::assign function in kso.dll in Kingsoft WPS Office 10.1.0.7106 and 10.2.0.5978 does not validate the size of the source memory block before an _copy call, which allows remote attackers to cause a denial of service (access violation and application crash) via a crafted (a) web page, (b) office document, or (c) .rtf file.
|
[] |
|
GHSA-rjr6-c78c-px55
|
A server side injection vulnerability exists which could allow an authenticated administrative user to achieve Remote Code Execution in ClearPass. Resolution: Fixed in 6.7.13, 6.8.4, 6.9.0 and higher.
|
[] |
|
CVE-2017-14298
|
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x00000000000038e8."
|
[
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] |
|
CVE-2021-0305
|
In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-154015447
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-3rm3-2566-pgwv
|
A denial of service exists in gitlab <v12.3.2, <v12.2.6, and <v12.1.10 that would let an attacker bypass input validation in markdown fields take down the affected page.
|
[] |
|
GHSA-8vfc-6r4c-h3xg
|
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.2, 6.3, 6.3.1, and 6.3.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Data, Domain & Function Security.
|
[] |
|
CVE-2010-4624
|
MyBB (aka MyBulletinBoard) before 1.4.12 allows remote authenticated users to bypass intended restrictions on the number of [img] MyCodes by editing a post after it has been created.
|
[
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.04:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.10:*:*:*:*:*:*:*"
] |
|
GHSA-j4pj-4grx-6wvq
|
The PlayScape (aka playscape.mominis.gameconsole.com) application 9.3.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] |
|
CVE-2007-5712
|
The internationalization (i18n) framework in Django 0.91, 0.95, 0.95.1, and 0.96, and as used in other products such as PyLucid, when the USE_I18N option and the i18n component are enabled, allows remote attackers to cause a denial of service (memory consumption) via many HTTP requests with large Accept-Language headers.
|
[
"cpe:2.3:a:django_project:django:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:django_project:django:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:django_project:django:0.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:django_project:django:0.96:*:*:*:*:*:*:*"
] |
|
CVE-2024-44815
|
Vulnerability in Hathway Skyworth Router CM5100 v.4.1.1.24 allows a physically proximate attacker to obtain user credentials via SPI flash Firmware W25Q64JV.
|
[
"cpe:2.3:o:skyworthdigital:cm5100_firmware:4.1.1.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hathway:skyworth_cm5100-511_firmware:4.1.1.24:*:*:*:*:*:*:*",
"cpe:2.3:h:hathway:skyworth_cm5100-511:-:*:*:*:*:*:*:*"
] |
|
GHSA-5jg7-j4xc-267p
|
In Helix Core versions prior to 2024.2, an unauthenticated remote Denial of Service (DoS) via the auto-generation function was identified. Reported by Karol Więsek.
|
[] |
|
CVE-2023-46225
|
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS) or code execution.
|
[
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2012-2429
|
The server in xArrow before 3.4.1 performs an invalid read operation, which allows remote attackers to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:xarrow:xarrow:*:*:*:*:*:*:*:*"
] |
|
GHSA-29ph-8jj3-f6p6
|
An issue was discovered in Samsung Mobile Chipset and Baseband Modem Chipset for Exynos 850, Exynos 980, Exynos 1080, Exynos 1280, Exynos 2200, Exynos Modem 5123, Exynos Modem 5300, Exynos Auto T5123, and Exynos W920. A heap-based buffer overflow in the 5G MM message codec can occur due to insufficient parameter validation when decoding operator-defined access category definitions.
|
[] |
|
GHSA-6fmj-cv39-m2r9
|
admin.php in Arz Development The Gemini Portal 4.7 and earlier allows remote attackers to bypass authentication and gain administrator privileges by setting the user cookie to "admin" and setting the name parameter to "users."
|
[] |
|
GHSA-3wm9-x999-hch2
|
PHP remote file inclusion vulnerability in al_initialize.php for AutoLinks Pro 2.1 allows remote attackers to execute arbitrary PHP code via an "ftp://" URL in the alpath parameter, which bypasses the incomplete blacklist that only checks for "http" and "https" URLs.
|
[] |
|
CVE-2021-27139
|
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to extract information from the device without authentication by disabling JavaScript and visiting /info.asp.
|
[
"cpe:2.3:o:fiberhome:hg6245d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fiberhome:hg6245d:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-11839
|
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to take control of an affected system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873.
|
[
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] |
|
GHSA-pf3c-vwf3-mg42
|
An exploitable sql injection vulnerability exists in the email parameter functionality of OS4Ed openSIS 7.3. The email parameter in the page EmailCheck.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
|
[] |
|
CVE-2014-3350
|
Cisco Intelligent Automation for Cloud (aka Cisco Cloud Portal) does not properly implement URL redirection, which allows remote authenticated users to obtain sensitive information via a crafted URL, aka Bug ID CSCuh84870.
|
[
"cpe:2.3:a:cisco:cloud_portal:-:*:*:*:*:*:*:*"
] |
|
GHSA-g2f9-237v-8mgp
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LambertGroup Sticky Radio Player allows SQL Injection. This issue affects Sticky Radio Player: from n/a through 3.4.
|
[] |
|
CVE-2017-2608
|
Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383).
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*"
] |
|
GHSA-2ch4-vpw2-3h66
|
Dell PowerScale OneFS versions 8.2.x - 9.3.0.x contains a denial-of-service vulnerability in SmartConnect. An unprivileged network attacker could potentially exploit this vulnerability, leading to denial-of-service. (of course this is temporary and will need to be adapted/reviewed as we determine the CWE with Srisimha Tummala 's help)
|
[] |
|
GHSA-49qx-p7j9-rjh6
|
Reflected XSS in wordpress plugin page-layout-builder v1.9.3
|
[] |
|
CVE-2022-42799
|
The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-4442
|
Stack-based buffer overflow in the logging function in the Unreal engine, possibly 2003 and 2004, as used in the internal web server, allows remote attackers to cause a denial of service (application crash) via a request for a long .gif filename in the images/ directory, related to conversion from Unicode to ASCII.
|
[
"cpe:2.3:a:epic_games:unreal_engine:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:epic_games:unreal_engine:2004:*:*:*:*:*:*:*"
] |
|
GHSA-m823-4q9p-vch7
|
Cross-Site Request Forgery (CSRF) vulnerability in Palasthotel (in person: Edward Bock) Use Memcached plugin <= 1.0.4 versions.
|
[] |
|
CVE-2022-1577
|
Database Backup for WordPress < 2.5.2 - Arbitrary Schedule Settings Update via CSRF
|
The Database Backup for WordPress plugin before 2.5.2 does not have CSRF check in place when updating the schedule backup settings, which could allow an attacker to make a logged in admin change them via a CSRF attack. This could lead to cases where attackers can send backup notification emails to themselves, which contain more details. Or disable the automatic backup schedule
|
[
"cpe:2.3:a:deliciousbrains:database_backup:*:*:*:*:*:wordpress:*:*"
] |
CVE-2010-3010
|
Cross-site scripting (XSS) vulnerability on the HP 3Com OfficeConnect Gigabit VPN Firewall 3CREVF100-73 with firmware before 1.0.13 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: a separate XSS issue for HP System Management Homepage (SMH) was originally assigned CVE-2010-3010 due to a CNA error, but CVE-2010-3012 is the appropriate identifier for the SMH issue.
|
[
"cpe:2.3:o:hp:3com_officeconnect_gigabit_vpn_firewall_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:3com_officeconnect_gigabit_vpn_firewall_software:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:3crevf100-73:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-4310
|
IBM Security Guardium Big Data Intelligence 4.0 (SonarG) uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 161036.
|
[
"cpe:2.3:a:ibm:security_guardium_big_data_intelligence:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-4647
|
IBM Sterling File Gateway 2.2.0.0 through 2.2.6.5 and 6.0.0.0 through 6.0.3.2 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.
|
[
"cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-18777
|
Certain NETGEAR devices are affected by administrative password disclosure. This affects D6220 before V1.0.0.28, D6400 before V1.0.0.60, D8500 before V1.0.3.29, DGN2200v4 before 1.0.0.82, DGN2200Bv4 before 1.0.0.82, R6300v2 before 1.0.4.8, R6400 before 1.0.1.20, R6700 before 1.0.1.20, R6900 before 1.0.1.20, R7000 before 1.0.7.10, R7100LG before V1.0.0.32, R7300DST before 1.0.0.52, R7900 before 1.0.1.16, R8000 before 1.0.3.36, R8300 before 1.0.2.94, R8500 before 1.0.2.94, WNDR3400v3 before 1.0.1.12, and WNR3500Lv2 before 1.2.0.40.
|
[
"cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgn2200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgn2200:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dgn2200b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dgn2200b:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3400:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr3500l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr3500l:v2:*:*:*:*:*:*:*"
] |
|
GHSA-vgw3-33x7-h3gh
|
Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of13::HelloElemVersionBitmap::unpack.This issue affects libfluid: 0.1.0.
|
[] |
|
CVE-2024-13176
|
Timing side-channel in ECDSA signature computation
|
Issue summary: A timing side-channel which could potentially allow recovering
the private key exists in the ECDSA signature computation.
Impact summary: A timing side-channel in ECDSA signature computations
could allow recovering the private key by an attacker. However, measuring
the timing would require either local access to the signing application or
a very fast network connection with low latency.
There is a timing signal of around 300 nanoseconds when the top word of
the inverted ECDSA nonce value is zero. This can happen with significant
probability only for some of the supported elliptic curves. In particular
the NIST P-521 curve is affected. To be able to measure this leak, the attacker
process must either be located in the same physical computer or must
have a very fast network connection with low latency. For that reason
the severity of this vulnerability is Low.
The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.
|
[] |
GHSA-2gmp-hjmm-v2wx
|
Incorrect Access Control issue discoverd in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to write arbitrary files via improper sanitation on the source for COPY and MOVE operations.
|
[] |
|
CVE-2017-16926
|
Ohcount 3.0.0 is prone to a command injection via specially crafted filenames containing shell metacharacters, which can be exploited by an attacker (providing a source tree for Ohcount processing) to execute arbitrary code as the user running Ohcount.
|
[
"cpe:2.3:a:ohcount_project:ohcount:3.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-c5gh-2ch3-8fjw
|
In nfc_ncif_proc_t3t_polling_ntf of nfc_ncif.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141547128
|
[] |
|
GHSA-jgfq-3rxx-m3mq
|
An issue was discovered in the web application in Cherwell Service Management (CSM) 10.2.3. XSS can occur via a payload in the SAMLResponse parameter of the HTTP request body.
|
[] |
|
GHSA-27r3-85x4-pfqv
|
The contains an IDOR vulnerability that allows a user to comment on a private post by manipulating the ID included in the request
|
[] |
|
GHSA-9w5w-83r2-23xw
|
Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands.
|
[] |
|
GHSA-hqwv-qhhm-qq2g
|
Insufficient Granularity of Access Control in GitHub repository fossbilling/fossbilling prior to 0.5.0.
|
[] |
|
CVE-2007-5838
|
Aclient in Symantec Altiris Deployment Solution 6.x before 6.8.380.0 allows local users to gain local System privileges via the "Enable key-based authentication to Deployment server" browser option, a different issue than CVE-2007-4380.
|
[
"cpe:2.3:a:symantec:altiris_deployment_solution:6:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8:sp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:altiris_deployment_solution:6.8:sp2:*:*:*:*:*:*"
] |
|
CVE-2025-52714
|
WordPress Traveler < 3.2.2 - SQL Injection Vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shinetheme Traveler allows SQL Injection. This issue affects Traveler: from n/a through n/a.
|
[] |
GHSA-r68c-fgxv-3ppx
|
Redatam7 (formerly Redatam WebServer) allows remote attackers to discover the installation path via an invalid LFN parameter to the /redbin/rpwebutilities.exe/text URI.
|
[] |
|
CVE-2021-26620
|
IPTIME NAS2dual improper authentication vulnerability
|
An improper authentication vulnerability leading to information leakage was discovered in iptime NAS2dual. Remote attackers are able to steal important information in the server by exploiting vulnerabilities such as insufficient authentication when accessing the shared folder and changing user’s passwords.
|
[
"cpe:2.3:o:iptime:nas101_firmware:*:*:*:*:*:windows:*:*",
"cpe:2.3:h:iptime:nas101:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iptime:nas1dual_firmware:*:*:*:*:*:windows:*:*",
"cpe:2.3:h:iptime:nas1dual:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iptime:nas2dual_firmware:*:*:*:*:*:windows:*:*",
"cpe:2.3:h:iptime:nas2dual:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iptime:nas3_firmware:*:*:*:*:*:windows:*:*",
"cpe:2.3:h:iptime:nas3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iptime:nas4_firmware:*:*:*:*:*:windows:*:*",
"cpe:2.3:h:iptime:nas4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iptime:nas4dual_firmware:*:*:*:*:*:windows:*:*",
"cpe:2.3:h:iptime:nas4dual:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iptime:nas-i_firmware:*:*:*:*:*:windows:*:*",
"cpe:2.3:h:iptime:nas-i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iptime:nas-ii_firmware:*:*:*:*:*:windows:*:*",
"cpe:2.3:h:iptime:nas-ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:iptime:nas-iie_firmware:*:*:*:*:*:windows:*:*",
"cpe:2.3:h:iptime:nas-iie:-:*:*:*:*:*:*:*"
] |
GHSA-44m2-j498-j5h8
|
Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect confidentiality and integrity, related to libsasl.
|
[] |
|
GHSA-3q2q-8m5p-gc7q
|
The 'name' parameter of the process_registration.php resourcedoes not validate the characters received and theyare sent unfiltered to the database.
|
[] |
|
CVE-2018-17926
|
The product M2M ETHERNET (FW Versions 2.22 and prior, ETH-FW Versions 1.01 and prior) is vulnerable in that an attacker can upload a malicious language file by bypassing the user authentication mechanism.
|
[
"cpe:2.3:o:abb:eth-fw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:fw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:m2m_ethernet:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-27176
|
Incomplete filtering of special elements vulnerability exists in RevoWorks SCVX using 'File Sanitization Library' 1.043 and prior versions, RevoWorks Browser 2.2.67 and prior versions (when using 'File Sanitization Option'), and RevoWorks Desktop 2.1.84 and prior versions (when using 'File Sanitization Option'), which may allow an attacker to execute a malicious macro by having a user to download, import, and open a specially crafted file in the local environment.
|
[
"cpe:2.3:a:jscom:revoworks_browser:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jscom:revoworks_desktop:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jscom:revoworks_scvx:*:*:*:*:*:*:*:*"
] |
|
GHSA-h8f5-36j5-929q
|
HP OpenMail can be misconfigured to allow users to run arbitrary commands using malicious print requests.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.