id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2013-4019
|
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 7.1 before 7.1.1.12 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*"
] |
|
GHSA-2p7h-c2c4-7p56
|
PHP remote file inclusion vulnerability in admin/editor2/spaw_control.class.php in the Cjay Content 3 module for XOOPS allows remote attackers to execute arbitrary PHP code via a URL in the spaw_root parameter. NOTE: this may be a duplicate of CVE-2006-4656.
|
[] |
|
GHSA-8wgh-w2f4-v692
|
In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: fix a double-free in arfs_create_groupsWhen `in` allocated by kvzalloc fails, arfs_create_groups will free
ft->g and return an error. However, arfs_create_table, the only caller of
arfs_create_groups, will hold this error and call to
mlx5e_destroy_flow_table, in which the ft->g will be freed again.
|
[] |
|
CVE-2023-20773
|
In vow, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07611449; Issue ID: ALPS07441735.
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] |
|
GHSA-hwp3-3266-mxg2
|
In dpe, there is a possible out of bounds write due to a missing valid range checking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262576; Issue ID: ALPS07262576.
|
[] |
|
CVE-2024-54512
|
The issue was addressed by removing the relevant flags. This issue is fixed in watchOS 11.2, iOS 18.2 and iPadOS 18.2. A system binary could be used to fingerprint a user's Apple Account.
|
[] |
|
CVE-2022-24891
|
Cross-site Scripting in org.owasp.esapi:esapi -- antisamy-esapi.xml configuration file
|
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
|
[
"cpe:2.3:a:owasp:enterprise_security_api:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] |
CVE-2024-38794
|
WordPress Custom Query Blocks plugin <= 5.2.0 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in MediaRon LLC Custom Query Blocks allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Custom Query Blocks: from n/a through 5.2.0.
|
[
"cpe:2.3:a:mediaron:custom_query_blocks:-:*:*:*:*:wordpress:*:*"
] |
CVE-2014-125054
|
koroket RedditOnRails Vote access control
|
A vulnerability classified as critical was found in koroket RedditOnRails. This vulnerability affects unknown code of the component Vote Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The patch is identified as 7f3c7407d95d532fcc342b00d68d0ea09ca71030. It is recommended to apply a patch to fix this issue. VDB-217594 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:reddit-on-rails_project:reddit-on-rails:*:*:*:*:*:ruby:*:*"
] |
GHSA-j8r5-239v-8hjw
|
A vulnerability in MikroTik Version 6.41.4 could allow an unauthenticated remote attacker to exhaust all available CPU and all available RAM by sending a crafted FTP request on port 21 that begins with many '\0' characters, preventing the affected router from accepting new FTP connections. The router will reboot after 10 minutes, logging a "router was rebooted without proper shutdown" message.
|
[] |
|
GHSA-hxpj-rc32-6768
|
PDF-XChange Editor Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21179.
|
[] |
|
GHSA-gw32-852p-5p3q
|
framework/modules/users/controllers/usersController.php in Exponent CMS v2.4.0patch1 does not properly restrict access to user records, which allows remote attackers to read address information, as demonstrated by an address/show/id/1 URI.
|
[] |
|
GHSA-8g65-fwj6-q5qg
|
The ft5x46 touchscreen driver for custom Linux kernels on the Xiaomi perseus-p-oss MIX 3 device through 2018-11-26 has an integer overflow and OOPS because of missing checks of the size argument in tpdbg_write in drivers/input/touchscreen/ft5x46/ft5x46_ts.c. This is exploitable for a device crash via a syscall by a crafted application on a rooted device.
|
[] |
|
GHSA-xh2p-5693-w8r8
|
Use after free in Performance Manager in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
|
[] |
|
CVE-2006-4238
|
SQL injection vulnerability in torrents.php in WebTorrent (WTcom) 0.2.4 and earlier allows remote attackers to execute arbitrary SQL commands via the cat parameter in category mode.
|
[
"cpe:2.3:a:wtcom:web_torrent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wtcom:web_torrent:0.1_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:wtcom:web_torrent:0.2.1_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:wtcom:web_torrent:0.2.2_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:wtcom:web_torrent:0.2.3_alpha:*:*:*:*:*:*:*",
"cpe:2.3:a:wtcom:web_torrent:0.2_alpha:*:*:*:*:*:*:*"
] |
|
CVE-2021-24286
|
Redirect 404 to Parent < 1.3.1 - Reflected Cross-Site Scripting (XSS)
|
The settings page of the Redirect 404 to parent WordPress plugin before 1.3.1 did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue
|
[
"cpe:2.3:a:mooveagency:redirect_404_to_parent:*:*:*:*:*:wordpress:*:*"
] |
CVE-2022-27497
|
Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.
|
[
"cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-30384
|
Junos OS: EX4300 Series: If a specific CLI command is issued PFE crashes will occur
|
An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on EX4300 Series allows a locally authenticated attacker with low privileges to cause a Denial-of-Service (Dos).
If a specific CLI command is issued, a PFE crash will occur. This will cause traffic forwarding to be interrupted until the system self-recovers.
This issue affects Junos OS:
All versions before 20.4R3-S10,
21.2 versions before 21.2R3-S7,
21.4 versions before 21.4R3-S6.
|
[] |
CVE-2023-29201
|
org.xwiki.commons:xwiki-commons-xml Cross-site Scripting vulnerability
|
XWiki Commons are technical libraries common to several other top level XWiki projects. The "restricted" mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1, only escaped `<script>` and `<style>`-tags but neither attributes that can be used to inject scripts nor other dangerous HTML tags like `<iframe>`. As a consequence, any code relying on this "restricted" mode for security is vulnerable to JavaScript injection ("cross-site scripting"/XSS). When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. This problem has been patched in XWiki 14.6 RC1 with the introduction of a filter with allowed HTML elements and attributes that is enabled in restricted mode. There are no known workarounds apart from upgrading to a version including the fix.
|
[
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*"
] |
CVE-2012-5512
|
Array index error in the HVMOP_set_mem_access handler in Xen 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) or obtain sensitive information via unspecified vectors.
|
[
"cpe:2.3:a:citrix:xenserver:4.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-2pj9-xmx5-6fv3
|
In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.
|
[] |
|
GHSA-h9h9-chxc-8v43
|
In get_sock_stat of xt_qtaguid.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-184018316References: Upstream kernel
|
[] |
|
CVE-2014-0061
|
The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.
|
[
"cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*"
] |
|
CVE-2019-18811
|
A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-pvc2-qp9x-6rgw
|
Cross-site scripting (XSS) vulnerability in archive.asp in SiteBeater News System 4.00 and earlier allows remote attackers to inject arbitrary web script or HTML via the sKeywords parameter.
|
[] |
|
GHSA-rgwr-hf3f-55jg
|
A system does not present an appropriate legal message or warning to a user who is accessing it.
|
[] |
|
GHSA-4h2c-7653-598f
|
HMailServer 5.3.x and prior: Memory Corruption which could cause DOS
|
[] |
|
CVE-2022-42069
|
Online Birth Certificate Management System version 1.0 suffers from a persistent Cross Site Scripting (XSS) vulnerability.
|
[
"cpe:2.3:a:online_birth_certificate_management_system_project:online_birth_certificate_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2025-2331
|
GiveWP – Donation Plugin and Fundraising Platform <= 3.22.1 - Authenticated (Subscriber+) Sensitive Information Exposure
|
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.22.1 via a misconfigured capability check in the 'permissionsCheck' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including reports detailing donors and donation amounts.
|
[] |
GHSA-p72q-v88c-rprq
|
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
|
[] |
|
GHSA-pr96-m2pj-3g36
|
Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger removal of an SVGFontFaceElement object, related to core/svg/SVGFontFaceElement.cpp.
|
[] |
|
CVE-2025-20651
|
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2062.
|
[] |
|
CVE-2022-26716
|
A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-2898
|
An exploitable vulnerability exists in the signature verification of the firmware update functionality of Circle with Disney. Specially crafted network packets can cause an unsigned firmware to be installed in the device resulting in arbitrary code execution. An attacker can send a series of packets to trigger this vulnerability.
|
[
"cpe:2.3:o:meetcircle:circle_with_disney_firmware:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:meetcircle:circle_with_disney:-:*:*:*:*:*:*:*"
] |
|
GHSA-mp49-872p-4w68
|
A File Deletion vulnerability exists in TinyShop 3.1.1 in the back_list parameter in controllers\admin.php, which could let a malicious user delete any file such as install.lock to reinstall cms.
|
[] |
|
CVE-2022-3307
|
Use after free in media in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-36514
|
An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. fill_buf may read from uninitialized memory locations.
|
[
"cpe:2.3:a:acc_reader_project:acc_reader:*:*:*:*:*:rust:*:*"
] |
|
GHSA-hxq4-9qpv-3w58
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Workbox Workbox Video from Vimeo & Youtube allows Reflected XSS. This issue affects Workbox Video from Vimeo & Youtube: from n/a through 3.2.2.
|
[] |
|
CVE-2007-1384
|
Directory traversal vulnerability in torrent.cpp in KTorrent before 2.1.2 allows remote attackers to overwrite arbitrary files via ".." sequences in a torrent filename.
|
[
"cpe:2.3:a:joris_guisson:ktorrent:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-21079
|
In rtt_unpack_xtlv_cbfn of dhd_rtt.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-254839721References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-74mh-x92q-wp74
|
An issue was discovered in GitLab Community and Enterprise Edition before 11.3.11, 11.4.x before 11.4.8, and 11.5.x before 11.5.1. There is an SSRF vulnerability in the Prometheus integration.
|
[] |
|
CVE-2008-0280
|
SQL injection vulnerability in index.php in MTCMS 2.0 and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via the (1) a or (2) cid parameter.
|
[
"cpe:2.3:a:mtcms:mtcms:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2004-1078
|
Stack-based buffer overflow in the client for Citrix Program Neighborhood Agent for Win32 8.00.24737 and earlier and Citrix MetaFrame Presentation Server client for WinCE before 8.33 allows remote attackers to execute arbitrary code via a long cached icon filename in the InName XML element.
|
[
"cpe:2.3:a:citrix:metaframe_client:8.0:*:win-ce:*:*:*:*:*",
"cpe:2.3:a:citrix:program_neighborhood_agent:8.0:*:win32:*:*:*:*:*"
] |
|
CVE-2020-16985
|
Azure Sphere Information Disclosure Vulnerability
|
Azure Sphere Information Disclosure Vulnerability
|
[
"cpe:2.3:a:microsoft:azure_sphere:*:*:*:*:*:*:*:*"
] |
CVE-2010-2470
|
Install/Filesystem.pm in Bugzilla 3.5.1 through 3.6.1 and 3.7 through 3.7.1, when use_suexec is enabled, uses world-readable permissions within (1) .bzr/ and (2) data/webdot/, which allows local users to obtain potentially sensitive data by reading files in these directories, a different vulnerability than CVE-2010-0180.
|
[
"cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*"
] |
|
CVE-2016-3249
|
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3252, CVE-2016-3254, and CVE-2016-3286.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] |
|
CVE-2023-32439
|
A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-q2c8-4vmf-78h5
|
webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in UIProcess/API/glib/WebKitFaviconDatabase.cpp in WebKit, as used in WebKitGTK+ through 2.21.3, mishandle an unset pageURL, leading to an application crash.
|
[] |
|
CVE-2013-2713
|
Cross-site request forgery (CSRF) vulnerability in users_maint.html in KrisonAV CMS before 3.0.2 allows remote attackers to hijack the authentication of administrators for requests that create user accounts via a crafted request.
|
[
"cpe:2.3:a:krisonav:krisonav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:1.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:1.1.35:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:2.0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:krisonav:krisonav:3.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-6673
|
Reflected XSS in National Keep's CyberMath
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in National Keep Cyber Security Services CyberMath allows Reflected XSS.This issue affects CyberMath: from v.1.4 before v.1.5.
|
[
"cpe:2.3:a:nationalkeep:cybermath:1.4:*:*:*:*:*:*:*"
] |
CVE-2024-23505
|
WordPress PDF Viewer & 3D PDF Flipbook – DearPDF Plugin <= 2.0.38 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DearHive PDF Viewer & 3D PDF Flipbook – DearPDF allows Stored XSS.This issue affects PDF Viewer & 3D PDF Flipbook – DearPDF: from n/a through 2.0.38.
|
[
"cpe:2.3:a:dearhive:dearpdf:*:*:*:*:*:wordpress:*:*"
] |
CVE-2019-7155
|
An issue was discovered in GitLab Community and Enterprise Edition 9.x, 10.x, and 11.x before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It has Incorrect Access Control. A user retains their role within a project in a private group after being removed from the group, if their privileges within the project are different from the group.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2022-37967
|
Windows Kerberos Elevation of Privilege Vulnerability
|
Windows Kerberos Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"
] |
GHSA-5cwp-c46g-8v55
|
Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
|
[] |
|
GHSA-fgm4-rp4m-mcwr
|
Cross Site Scripting vulnerability found in Sales Tracker Management System v.1.0 allows a remote attacker to gain privileges via the product list function in the Master.php file.
|
[] |
|
GHSA-v5qp-mx94-j49v
|
A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these features are enabled.
This issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.12-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
|
[] |
|
CVE-2020-15882
|
A CSRF issue in manager/delete_machine/{id} in MunkiReport before 5.6.3 allows attackers to delete arbitrary machines from the MunkiReport database.
|
[
"cpe:2.3:a:munkireport_project:munkireport:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-3060
|
V-webmail 1.5.0 allows remote attackers to obtain sensitive information via (1) malformed input in the login page (includes/local.hooks.php) and (2) an invalid session ID, which reveals the installation path in an error message.
|
[
"cpe:2.3:a:v-webmail:v-webmail:1.5.0:*:*:*:*:*:*:*"
] |
|
GHSA-qprx-6ggg-q37p
|
Merchandise Online Store v1.0 is vulnerable to SQL Injection via /vloggers_merch/classes/Master.php?f=delete_category.
|
[] |
|
GHSA-9gwq-6cwj-47h3
|
Integer overflow in TFLite array creation
|
ImpactAn attacker can craft a TFLite model that would cause an integer overflow [in `TfLiteIntArrayCreate`](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60):The [`TfLiteIntArrayGetSizeInBytes`](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L24-L33) returns an `int` instead of a `size_t`:An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype.PatchesWe have patched the issue in GitHub commit [a1e1511dde36b3f8aa27a6ec630838e7ea40e091](https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091).The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
|
[] |
GHSA-6fff-rx48-97mq
|
A vulnerability in the disaster recovery feature of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain unauthorized access to user credentials. This vulnerability exists because access to API endpoints is not properly restricted. An attacker could exploit this vulnerability by sending a request to an API endpoint. A successful exploit could allow the attacker to gain unauthorized access to administrative credentials that could be used in further attacks.
|
[] |
|
CVE-2018-11421
|
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. The protocol is vulnerable to remote unauthenticated disclosure of sensitive information, including the administrator's password. Under certain conditions, it's also possible to retrieve additional information, such as content of HTTP requests to the device, or the previously used password, due to memory leakages.
|
[
"cpe:2.3:o:moxa:oncell_g3150-hspa_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3150-hspa:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3150-hspa-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3150-hspa-t:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-0586
|
Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2013-7127
|
Apple Safari 6.0.5 on Mac OS X 10.7.5 and 10.8.5 stores cleartext credentials in LastSession.plist, which allows local users to obtain sensitive information by reading this file.
|
[
"cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*"
] |
|
GHSA-qrg6-f4g9-6p3f
|
In cell service, there is a missing permission check. This could lead to local denial of service in cell service with no additional execution privileges needed.
|
[] |
|
CVE-2024-24984
|
Improper input validation for some Intel(R) Wireless Bluetooth(R) products for Windows before version 23.40 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
|
[] |
|
CVE-2007-5124
|
The embedded Internet Explorer server control in AOL Instant Messenger (AIM) 6.5.3.12 and earlier allows remote attackers to execute arbitrary code via unspecified web script or HTML in an instant message, related to AIM's filtering of "specific tags and attributes" and the lack of Local Machine Zone lockdown. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-4901.
|
[
"cpe:2.3:a:aol:instant_messenger:*:*:*:*:*:*:*:*"
] |
|
GHSA-4jqg-874r-phg3
|
Unauthenticated Denial of Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.
|
[] |
|
GHSA-77m3-f4vw-cv9v
|
Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "MAX_DISPLAY_NEW_PRODUCTS_TITLE[1]" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser.
|
[] |
|
CVE-2017-6812
|
paintballrefjosh/MaNGOSWebV4 4.0.8 is vulnerable to a reflected XSS in inc/admin/template_files/admin.vote.php (id parameter).
|
[
"cpe:2.3:a:mangoswebv4_project:mangoswebv4:4.0.8:*:*:*:*:*:*:*"
] |
|
GHSA-wch4-vg96-7wgw
|
Sun StorEdge 6130 Array Controllers with firmware 06.12.10.11 and earlier allow remote attackers to cause a denial of service (controller reboot) via a flood of traffic on the LAN.
|
[] |
|
CVE-2017-17146
|
Huawei DP300 V500R002C00 have a buffer overflow vulnerability due to the lack of validation. An authenticated local attacker can craft specific XML files to the affected products and parse this file, which result in DoS attacks or remote code execution on the device.
|
[
"cpe:2.3:o:huawei:dp300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-6158
|
A race condition in Oilpan in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-15035
|
EmTec PyroBatchFTP before 3.18 allows remote servers to cause a denial of service (application crash).
|
[
"cpe:2.3:a:emtec:pyrobatchftp:*:*:*:*:*:*:*:*"
] |
|
GHSA-6267-hp2v-vqcw
|
Cross-Site Request Forgery (CSRF) vulnerability in Jayesh Parejiya Social Media Links allows Stored XSS. This issue affects Social Media Links: from n/a through 1.0.3.
|
[] |
|
GHSA-rrfh-8c6f-6grw
|
A vulnerability was found in saemorris TheRadSystem. It has been classified as problematic. Affected is an unknown function of the file users.php. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. VDB-218454 is the identifier assigned to this vulnerability.
|
[] |
|
CVE-2020-36625
|
destiny.gg chat main.go websocket.Upgrader cross-site request forgery
|
A vulnerability was found in destiny.gg chat. It has been rated as problematic. This issue affects the function websocket.Upgrader of the file main.go. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The name of the patch is bebd256fc3063111fb4503ca25e005ebf6e73780. It is recommended to apply a patch to fix this issue. The identifier VDB-216521 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[
"cpe:2.3:a:destiny:chat:-:*:*:*:*:*:*:*"
] |
CVE-2025-32659
|
WordPress FraudLabs Pro for WooCommerce plugin <= 2.22.7 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in fraudlabspro FraudLabs Pro for WooCommerce allows Stored XSS. This issue affects FraudLabs Pro for WooCommerce: from n/a through 2.22.7.
|
[] |
GHSA-vcfr-6j8g-wxh8
|
The Microsoft Windows graphics component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8675.
|
[] |
|
CVE-2017-8772
|
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root") and can: 1. Read the entire file system; 2. Write to the file system; or 3. Execute any code that attacker desires (malicious or not).
|
[
"cpe:2.3:o:twsz:wifi_repeater_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:twsz:wifi_repeater:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-56240
|
WordPress Pronamic Google Maps plugin <= 2.3.2 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pronamic Pronamic Google Maps allows Stored XSS.This issue affects Pronamic Google Maps: from n/a through 2.3.2.
|
[] |
CVE-2023-45931
|
Mesa 23.0.4 was discovered to contain a NULL pointer dereference in check_xshm() for the has_error state. NOTE: this is disputed because there is no scenario in which the vulnerability was demonstrated.
|
[
"cpe:2.3:a:mesa3d:mesa:23.0.4:*:*:*:*:*:*:*"
] |
|
GHSA-48cp-9vmv-3948
|
Directory traversal vulnerability in the nBill (com_netinvoice) component before 2.0.9 standard edition, 2.0.10 lite edition, and 1.2_10 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in unspecified vectors related to (1) administrator/components/com_nbill/admin.nbill.php, (2) components/com_nbill/nbill.php, (3) administrator/components/com_netinvoice/admin.netinvoice.php, or (4) components/com_netinvoice/netinvoice.php, as exploited in the wild in November 2010.
|
[] |
|
CVE-2023-29056
|
A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute not defined.
|
[
"cpe:2.3:o:lenovo:thinkagile_hx5530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx_enclosure_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx_enclosure:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1021_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1021:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1331_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1520-r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1520-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1521-r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1521-r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2320-e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx2320-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx2321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:2.93_afbt30p:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx2330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2331_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx2331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2720-e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx2720-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3376:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3520-g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3520-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3521-g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3521-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3720_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3721_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3721:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx5520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx5520-c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5520-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx5521_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx5521-c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5521-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx5531_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7521_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7820_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7821_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7821:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx1020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx1020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3330-f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3330-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3330-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3330-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3331-f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3331-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3331-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3331-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3530_f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3530_f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3530-h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3530-h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3531_h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3531_h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3531-f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3531-f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx1021_on_se350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx1021_on_se350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx_1se_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_1se:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx_2u4n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_2u4n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx_4u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_4u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx1320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx1320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx2320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx2320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx2330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3520-g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3520-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3530-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3720_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx5520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx5520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx5530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7320_n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7320_n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7520_n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7520_n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7820_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkedge_se450__firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkedge_se450_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p920_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd630_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd630_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd650_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd650-n_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd650-n_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_se350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_se350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sn550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sn550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sn550_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sn550_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sn850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sn850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr158_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr158:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr250_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr250_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr258_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr258:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr258_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr258_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr630_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr630_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr645_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr645_v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr645_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr650_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr665_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr665_v3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr665_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr670_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr850_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr850p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr850p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr860_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr860:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr860_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr950_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st250_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st250_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st258_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st258:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st258_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st258_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st550_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st650_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st658_v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st658_v2:-:*:*:*:*:*:*:*"
] |
|
CVE-2009-1600
|
Apple Safari executes DOM calls in response to a javascript: URI in the target attribute of a submit element within a form contained in an inline PDF file, which might allow remote attackers to bypass intended Adobe Acrobat JavaScript restrictions on accessing the document object, as demonstrated by a web site that permits PDF uploads by untrusted users, and therefore has a shared document.domain between the web site and this javascript: URI. NOTE: the researcher reports that Adobe's position is "a PDF file is active content."
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-35768
|
Windows Kernel Elevation of Privilege Vulnerability
|
Windows Kernel Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
GHSA-mq2g-g8r2-m98v
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fures XTRA Settings allows Reflected XSS. This issue affects XTRA Settings: from n/a through 2.1.8.
|
[] |
|
CVE-2021-45837
|
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending a specifically crafted input to /tos/index.php?app/del.
|
[
"cpe:2.3:o:terra-master:tos:4.2.15-2107141517:*:*:*:*:*:*:*",
"cpe:2.3:h:terra-master:f2-210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:terra-master:f4-210:-:*:*:*:*:*:*:*"
] |
|
GHSA-h2wx-vrp7-wvmw
|
In the Linux kernel, the following vulnerability has been resolved:smb: client: fix UAF in smb2_reconnect_server()The UAF bug is due to smb2_reconnect_server() accessing a session that
is already being teared down by another thread that is executing
__cifs_put_smb_ses(). This can happen when (a) the client has
connection to the server but no session or (b) another thread ends up
setting @ses->ses_status again to something different than
SES_EXITING.To fix this, we need to make sure to unconditionally set
@ses->ses_status to SES_EXITING and prevent any other threads from
setting a new status while we're still tearing it down.The following can be reproduced by adding some delay to right after
the ipc is freed in __cifs_put_smb_ses() - which will give
smb2_reconnect_server() worker a chance to run and then accessing
@ses->ipc:kinit ...
mount.cifs //srv/share /mnt/1 -o sec=krb5,nohandlecache,echo_interval=10
[disconnect srv]
ls /mnt/1 &>/dev/null
sleep 30
kdestroy
[reconnect srv]
sleep 10
umount /mnt/1
...
CIFS: VFS: Verify user has a krb5 ticket and keyutils is installed
CIFS: VFS: \\srv Send error in SessSetup = -126
CIFS: VFS: Verify user has a krb5 ticket and keyutils is installed
CIFS: VFS: \\srv Send error in SessSetup = -126
general protection fault, probably for non-canonical address
0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc2 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39
04/01/2014
Workqueue: cifsiod smb2_reconnect_server [cifs]
RIP: 0010:__list_del_entry_valid_or_report+0x33/0xf0
Code: 4f 08 48 85 d2 74 42 48 85 c9 74 59 48 b8 00 01 00 00 00 00 ad
de 48 39 c2 74 61 48 b8 22 01 00 00 00 00 74 69 <48> 8b 01 48 39 f8 75
7b 48 8b 72 08 48 39 c6 0f 85 88 00 00 00 b8
RSP: 0018:ffffc900001bfd70 EFLAGS: 00010a83
RAX: dead000000000122 RBX: ffff88810da53838 RCX: 6b6b6b6b6b6b6b6b
RDX: 6b6b6b6b6b6b6b6b RSI: ffffffffc02f6878 RDI: ffff88810da53800
RBP: ffff88810da53800 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88810c064000
R13: 0000000000000001 R14: ffff88810c064000 R15: ffff8881039cc000
FS: 0000000000000000(0000) GS:ffff888157c00000(0000)
knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe3728b1000 CR3: 000000010caa4000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
<TASK>
? die_addr+0x36/0x90
? exc_general_protection+0x1c1/0x3f0
? asm_exc_general_protection+0x26/0x30
? __list_del_entry_valid_or_report+0x33/0xf0
__cifs_put_smb_ses+0x1ae/0x500 [cifs]
smb2_reconnect_server+0x4ed/0x710 [cifs]
process_one_work+0x205/0x6b0
worker_thread+0x191/0x360
? __pfx_worker_thread+0x10/0x10
kthread+0xe2/0x110
? __pfx_kthread+0x10/0x10
ret_from_fork+0x34/0x50
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30
</TASK>
|
[] |
|
GHSA-h3w5-fw47-vrgr
|
Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information.
|
[] |
|
GHSA-v49w-8pf7-cffv
|
Reflected cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote unauthenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
|
[] |
|
GHSA-x44w-4pwf-wpx2
|
Cross-Site Request Forgery (CSRF) vulnerability in Uncodethemes Ultra Demo Importer allows Upload a Web Shell to a Web Server. This issue affects Ultra Demo Importer: from n/a through 1.0.5.
|
[] |
|
GHSA-r9v7-jgpj-m4mq
|
libpurple in Pidgin before 2.2.1 does not properly handle MSN nudge messages from users who are not on the receiver's buddy list, which allows remote attackers to cause a denial of service (crash) via a nudge message that triggers an access of "an invalid memory location."
|
[] |
|
CVE-2019-1480
|
An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory, aka 'Windows Media Player Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1481.
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*"
] |
|
GHSA-25w3-4m45-vw83
|
Cybozu Office 9.0.0 to 10.4.0 allows remote authenticated attackers to bypass access restriction to view unauthorized project information via the Project function.
|
[] |
|
GHSA-m9x6-hmmv-9j9x
|
Missing Authorization vulnerability in MultiVendorX WC Marketplace allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WC Marketplace: from n/a through 4.0.23.
|
[] |
|
GHSA-9qww-jrc3-jf78
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] |
|
CVE-2025-0282
|
A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.
|
[] |
|
GHSA-8vq3-x8qc-6gpc
|
RIOT through 2019.07 contains a memory leak in the TCP implementation (gnrc_tcp), allowing an attacker to consume all memory available for network packets and thus effectively stopping all network threads from working. This is related to _receive in sys/net/gnrc/transport_layer/tcp/gnrc_tcp_eventloop.c upon receiving an ACK before a SYN.
|
[] |
|
GHSA-rj6g-gj4c-2vf5
|
Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Workspace app for Windows
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.