id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-49wh-pf3r-rqvx
|
Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.
|
[] |
|
GHSA-669w-wwp7-2p8m
|
Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the page parameter of the fromDhcpListClient function.
|
[] |
|
GHSA-3rgg-5jjq-pv68
|
Missing Authorization vulnerability in istmoplugins GetBookingsWP allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects GetBookingsWP: from n/a through 1.1.27.
|
[] |
|
CVE-2020-1438
|
An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1428.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-q594-7xf7-r573
|
Cayman 3220-H DSL Router 1.0 allows remote attacker to cause a denial of service (crash) via a series of SYN or TCP connect requests.
|
[] |
|
CVE-2020-7252
|
Unquoted service executable path
|
Unquoted service executable path in DXL Broker in McAfee Data eXchange Layer (DXL) Framework 6.0.0 and earlier allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files.
|
[
"cpe:2.3:a:mcafee:data_exchange_layer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-q65m-pv3f-wr5r
|
XSS in Bleach when noscript and raw tag whitelisted
|
ImpactA [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with `noscript` and a raw tag (see below) in the allowed/whitelisted tags option.Patchesv3.1.1Workaroundsmodify `bleach.clean` calls to not whitelist `noscript` and one or more of the following raw tags:A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk.Referenceshttps://bugzilla.mozilla.org/show_bug.cgi?id=1615315https://cure53.de/fp170.pdfhttps://nvd.nist.gov/vuln/detail/CVE-2020-6802https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleachCreditsReported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at CheckmarxFor more informationIf you have any questions or comments about this advisory:Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues)Email us at [[email protected]](mailto:[email protected])
|
[] |
CVE-2024-10270
|
Org.keycloak:keycloak-services: keycloak denial of service
|
A vulnerability was found in the Keycloak-services package. If untrusted data is passed to the SearchQueryUtils method, it could lead to a denial of service (DoS) scenario by exhausting system resources due to a Regex complexity.
|
[
"cpe:/a:redhat:build_keycloak:24::el9",
"cpe:/a:redhat:build_keycloak:24",
"cpe:/a:redhat:build_keycloak:26.0::el9",
"cpe:/a:redhat:build_keycloak:26",
"cpe:/a:redhat:jboss_enterprise_application_platform:8",
"cpe:/a:redhat:jbosseapxp",
"cpe:/a:redhat:red_hat_single_sign_on:7"
] |
GHSA-hhj6-ph7m-947v
|
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2019-0672, CVE-2019-0674, CVE-2019-0675.
|
[] |
|
GHSA-9pwr-594w-vfp8
|
EMC RSA Identity Governance and Lifecycle versions 7.0.1, 7.0.2 (all patch levels); RSA Via Lifecycle and Governance version 7.0 (all patch levels); and RSA Identity Management and Governance (IMG) version 6.9.1 (all patch levels) have Reflected Cross Site Scripting vulnerabilities that could potentially be exploited by malicious users to compromise an affected system.
|
[] |
|
CVE-2008-5761
|
Multiple cross-site scripting (XSS) vulnerabilities in FlatnuX CMS (aka Flatnuke3) 2008-12-11 allow remote attackers to inject arbitrary web script or HTML via (1) the mod parameter to the default URI; (2) the foto parameter to photo.php in the 05_Foto module; or (3) the name parameter in an insertrecord action to index.php in the 08_Files module, as demonstrated by injection within a SRC attribute of an IFRAME element.
|
[
"cpe:2.3:a:flatnux:flatnux:2008-12-11:*:*:*:*:*:*:*"
] |
|
CVE-2018-7803
|
A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex TriStation Emulator V1.2.0, which could cause the emulator to crash when sending a specially crafted packet. The emulator is used infrequently for application logic testing. It is susceptible to an attack only while running in off-line mode. This vulnerability does not exist in Triconex hardware products and therefore has no effect on the operating safety functions in a plant.
|
[
"cpe:2.3:a:schneider-electric:triconex_tristation_emulator:1.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-43766
|
Odyssey passes to server unencrypted bytes from man-in-the-middle When Odyssey is configured to use certificate Common Name for client authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption. This is similar to CVE-2021-23214 for PostgreSQL.
|
[
"cpe:2.3:a:odyssey_project:odyssey:1.1:*:*:*:*:*:*:*"
] |
|
CVE-2012-3180
|
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-1853
|
Zemana AntiLogger v2.74.204.664 - Arbitrary Process Termination
|
Zemana AntiLogger v2.74.204.664 is vulnerable to an Arbitrary Process Termination vulnerability by triggering the 0x80002048 IOCTL code of the zam64.sys and zamguard64.sys drivers.
|
[] |
CVE-2022-2675
|
Unitree Go 1 "Robot Dog" Unauthenticated Remote Power Down
|
Using off-the-shelf commodity hardware, the Unitree Go 1 robotics platform version H0.1.7 and H0.1.9 (using firmware version 0.1.35) can be powered down by an attacker within normal RF range without authentication. Other versions may be affected, such as the A1.
|
[
"cpe:2.3:o:unitree:go_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:unitree:go_1:h0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:unitree:go_1:h0.1.9:*:*:*:*:*:*:*"
] |
CVE-2020-35897
|
An issue was discovered in the atom crate before 0.3.6 for Rust. An unsafe Send implementation allows a cross-thread data race.
|
[
"cpe:2.3:a:atom_project:atom:*:*:*:*:*:rust:*:*"
] |
|
CVE-2023-51616
|
D-Link DIR-X3260 prog.cgi SetSysEmailSettings Stack-Based Buffer Overflow Remote Code Execution Vulnerability
|
D-Link DIR-X3260 prog.cgi SetSysEmailSettings Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-X3260 routers. Authentication is required to exploit this vulnerability.
The specific flaw exists within the prog.cgi binary, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of a user-supplied string before copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21593.
|
[
"cpe:2.3:o:d-link:dir-x3260_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-x3260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-x3260:-:*:*:*:*:*:*:*"
] |
CVE-2025-32119
|
WordPress CardGate Payments for WooCommerce plugin <= 3.2.1 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CardGate CardGate Payments for WooCommerce allows Blind SQL Injection. This issue affects CardGate Payments for WooCommerce: from n/a through 3.2.1.
|
[] |
GHSA-xhjj-jg7j-pqrx
|
Sign extension error in the ReadDIBImage function in ImageMagick before 6.3.5-9 allows context-dependent attackers to execute arbitrary code via a crafted width value in an image file, which triggers an integer overflow and a heap-based buffer overflow.
|
[] |
|
CVE-2006-2876
|
Cross-site scripting (XSS) vulnerability in cat.php in PHP Pro Publish 2.0 allows remote attackers to inject arbitrary web script or HTML via the catname parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:deltascripts:php_pro_publish:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-2396
|
Netgear SRX5308 Web Management Interface cross site scripting
|
A vulnerability classified as problematic was found in Netgear SRX5308 up to 4.3.5-3. This vulnerability affects unknown code of the component Web Management Interface. The manipulation of the argument USERDBUsers.Password leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227674 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*"
] |
GHSA-c8qq-qq98-vh37
|
The Meks Easy Social Share WordPress plugin before 1.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[] |
|
CVE-2015-6948
|
Heap-based buffer overflow in the Microsoft Word document conversion feature in Corel WordPerfect allows remote attackers to execute arbitrary code via a crafted document.
|
[
"cpe:2.3:a:corel:wordperfect:*:*:*:*:*:*:*:*"
] |
|
GHSA-4pj4-x8fv-v6vm
|
ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary files securely, which has unspecified impact related to "several temp file vulnerabilities" in (1) tcp/tcp_connect.c, (2) server/eventscript.c, (3) tools/ctdb_diagnostics, (4) config/gdb_backtrace, and (5) include/ctdb_private.h.
|
[] |
|
GHSA-vwxv-qqrg-44rx
|
Cross-site scripting (XSS) vulnerability in SimpBook 1.0, with html_enable on (the default), allows remote attackers to inject arbitrary web script or HTML via the message field.
|
[] |
|
GHSA-4xf3-mc75-p55w
|
A vulnerability, which was classified as critical, has been found in SourceCodester Guest Management System. This issue affects some unknown processing of the file /guestmanagement/front.php. The manipulation of the argument rid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206489 was assigned to this vulnerability.
|
[] |
|
GHSA-gf4v-c89c-j9v4
|
AN-HTTPd provides example CGI scripts test.bat, input.bat, input2.bat, and envout.bat, which allow remote attackers to execute commands via shell metacharacters.
|
[] |
|
GHSA-mp36-c9p8-hm2m
|
Tenda AC10 V1.0 V15.03.06.23 is vulnerable to Buffer Overflow in form_fast_setting_wifi_set via the parameter ssid.
|
[] |
|
GHSA-fg4f-r3w9-j9pg
|
WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded private keys for the SSH daemon. The fingerprint of the SSH host key from the corresponding SSH daemon matches the embedded private key.
|
[] |
|
GHSA-fgw4-v983-mgp8
|
`gh attestation verify` returns incorrect exit code during verification if no attestations are present
|
SummaryA bug in GitHub's Artifact Attestation CLI tool, `gh attestation verify`, may return an incorrect zero exit status when no matching attestations are found for the specified `--predicate-type <value>` or the default `https://slsa.dev/provenance/v1` if not specified. This issue only arises if an artifact has an attestation with a predicate type different from the one provided in the command. As a result, users relying solely on these exit codes may mistakenly believe the attestation has been verified, despite the absence of an attestation with the specified predicate type and the tool printing a verification failure.Users are advised to update `gh` to version `v2.67.0` as soon as possible.Initial report: https://github.com/cli/cli/issues/10418
Fix: https://github.com/cli/cli/pull/10421DetailsThe gh attestation verify command fetches, loads, and attempts to verify attestations associated with a given artifact for a specified predicate type. If an attestation is found, but the predicate type does not match the one specified in the `gh attestation verify` command, the verification fails, but the program exits early.Due to a re-used uninitialized error variable, when no matching attestations are found, the relevant function returns `nil` instead of an error, causing the program to exit with a status code of `0`, which incorrectly suggests successful verification.PoCRun `gh attestation verify` with local attestations using the `--bundle` flag and specify a predicate type with `--predicate-type` that you know will not match any of the attestations the command will attempt to verify. Confirm that the command exits with a zero status code.ImpactUsers who rely exclusively on the exit status code of `gh attestation verify` may incorrectly verify an attestation when the attestation's predicate type does not match the specified predicate type in the command.
|
[] |
CVE-2025-30295
|
Adobe Framemaker | Heap-based Buffer Overflow (CWE-122)
|
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] |
CVE-2016-3364
|
Microsoft Visio 2016 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:visio:2016:*:*:*:*:*:*:*"
] |
|
CVE-2017-15565
|
In Poppler 0.59.0, a NULL Pointer Dereference exists in the GfxImageColorMap::getGrayLine() function in GfxState.cc via a crafted PDF document.
|
[
"cpe:2.3:a:freedesktop:poppler:0.59.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-gjc5-j4vh-86qg
|
IBM i2 Enterprise Insight Analysis 2.1.7 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 141340.
|
[] |
|
GHSA-7q24-f637-m9v4
|
A vulnerable design in fingerprint matching algorithm prior to SMR Mar-2022 Release 1 allows physical attackers to perform brute force attack on screen lock password.
|
[] |
|
GHSA-gx9f-qvh7-6mrg
|
Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) functionality of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device and cause the LLDP service to restart. These vulnerabilities are due to missing length validation of certain LLDP packet header fields. An attacker could exploit these vulnerabilities by sending a malicious LLDP packet to an affected device. A successful exploit could allow the attacker to execute code on the affected device and cause LLDP to restart unexpectedly, resulting in a denial of service (DoS) condition.
|
[] |
|
CVE-2007-4811
|
Multiple cross-site scripting (XSS) vulnerabilities in Netjuke 1.0-rc2 allow remote attackers to inject arbitrary web script or HTML via (1) the val parameter to alphabet.php in an alpha.albums action, or the PATH_INFO to (2) random.php or (3) admin/hidden.php.
|
[
"cpe:2.3:a:netjuke:netjuke:1.0_rc2:*:*:*:*:*:*:*"
] |
|
GHSA-vhwf-5h9h-9397
|
onefilecms.php in OneFileCMS through 2017-10-08 might allow attackers to read arbitrary files via the i and f parameters, as demonstrated by ?i=etc/&f=passwd&p=raw_view for the /etc/passwd file.
|
[] |
|
GHSA-g65j-cq3m-xvhw
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay 23.0.10.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of tiscript. When processing the System.Exec method the application does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7234.
|
[] |
|
GHSA-mp9q-wwp6-2x73
|
In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted audio file.
|
[] |
|
CVE-2020-10210
|
Because of hard-coded SSH keys for the root user in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series, Kami7B, an attacker may remotely log in through SSH.
|
[
"cpe:2.3:o:amino:ak45x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:ak45x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:ak5xx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:ak5xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:ak65x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:ak65x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:aria6xx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:aria6xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:aria7xx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:aria7xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amino:kami7b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amino:kami7b:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-41799
|
Improper access control vulnerability in GROWI prior to v5.1.4 (v5 series) and versions prior to v4.5.25 (v4 series) allows a remote authenticated attacker to bypass access restriction and download the markdown data from the pages set to private by the other users.
|
[
"cpe:2.3:a:weseek:growi:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-40218
|
WordPress TH Advance Product Search plugin <= 1.1.4 - Unauthenticated Plugin Settings Change vulnerability
|
Missing Authorization vulnerability in ThemeHunk Advance WordPress Search Plugin.This issue affects Advance WordPress Search Plugin: from n/a through 1.1.4.
|
[
"cpe:2.3:a:themehunk:advanced_wordpress_search:-:*:*:*:*:*:*:*"
] |
CVE-2019-11560
|
A buffer overflow vulnerability in the streaming server provided by hisilicon in HI3516 models allows an unauthenticated attacker to remotely run arbitrary code by sending a special RTSP over HTTP packet. The vulnerability was found in many cameras using hisilicon's hardware and software, as demonstrated by TENVIS cameras 1.3.3.3, 1.2.7.2, 1.2.1.4, 7.1.20.1.2, and 13.1.1.1.7.2; FDT FD7902 11.3.14.1.3 and 10.3.14.1.3; FOSCAM cameras 3.2.1.1.1_0815 and 3.2.2.2.1_0815; and Dericam cameras V11.3.8.1.12.
|
[
"cpe:2.3:o:hisilicon:hi3516_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hisilicon:hi3516:-:*:*:*:*:*:*:*"
] |
|
GHSA-w6rh-226p-qgc7
|
The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
[] |
|
GHSA-xm5c-9c54-9j37
|
An issue was discovered in certain Apple products. macOS Server before 5.3 is affected. The issue involves the "Wiki Server" component. It allows remote attackers to enumerate user accounts via unspecified vectors.
|
[] |
|
GHSA-v3hx-qxqq-j8jp
|
In gsc_gsa_rescue of gsc_gsa.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] |
|
CVE-2016-10257
|
The Symantec Advanced Secure Gateway (ASG) 6.6, ASG 6.7 (prior to 6.7.2.1), ProxySG 6.5 (prior to 6.5.10.6), ProxySG 6.6, and ProxySG 6.7 (prior to 6.7.2.1) management console is susceptible to a reflected XSS vulnerability. A remote attacker can use a crafted management console URL in a phishing attack to inject arbitrary JavaScript code into the management console web client application. This is a separate vulnerability from CVE-2016-10256.
|
[
"cpe:2.3:a:broadcom:advanced_secure_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:advanced_secure_gateway:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:symantec_proxysg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:symantec_proxysg:6.6:*:*:*:*:*:*:*"
] |
|
CVE-2007-5016
|
SQL injection vulnerability in userreviews.php in OneCMS 2.4 allows remote attackers to execute arbitrary SQL commands via the abc parameter.
|
[
"cpe:2.3:a:insane_visions:onecms:2.4:*:*:*:*:*:*:*"
] |
|
GHSA-4rcc-hgj8-2rw6
|
An improper access control vulnerability in the Azure Managed Instance for Apache Cassandra allows an authenticated attacker to elevate privileges over a network.
|
[] |
|
GHSA-4r2w-rq9g-2cgf
|
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects GS728TPPv2 before 6.0.0.48, GS728TPv2 before 6.0.0.48, GS750E before 1.0.1.4, GS752TPP before 6.0.0.48, and GS752TPv2 before 6.0.0.48.
|
[] |
|
GHSA-957h-97m4-9p53
|
The Improved Include Page WordPress plugin through 1.2 allows passing shortcode attributes with post_type & post_status which can be used to retrieve arbitrary content. This way, users with a role as low as Contributor can gain access to content they are not supposed to.
|
[] |
|
GHSA-x2hv-7c8r-gxrh
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the AddWatermark command of the communication API. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9942.
|
[] |
|
CVE-2021-0185
|
Improper input validation in the firmware for some Intel(R) Server Board M10JNP Family before version 7.216 may allow a privileged user to potentially enable an escalation of privilege via local access.
|
[
"cpe:2.3:o:intel:m10jnp2sb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:m10jnp2sb:-:*:*:*:*:*:*:*"
] |
|
GHSA-764p-23v8-xg3p
|
hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.
|
[] |
|
GHSA-v7x8-gqgc-pmm6
|
NetScreen ScreenOS 2.8 through 4.0, when forwarding H.323 or Netmeeting traffic, allows remote attackers to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage removal and do not time out for 36 hours.
|
[] |
|
CVE-2005-0974
|
Unknown vulnerability in the nfs_mount call in Mac OS X 10.3.9 and earlier allows local users to gain privileges via crafted arguments.
|
[
"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*"
] |
|
CVE-2016-7834
|
SONY SNC-CH115, SNC-CH120, SNC-CH160, SNC-CH220, SNC-CH260, SNC-DH120, SNC-DH120T, SNC-DH160, SNC-DH220, SNC-DH220T, SNC-DH260, SNC-EB520, SNC-EM520, SNC-EM521, SNC-ZB550, SNC-ZM550, SNC-ZM551, SNC-EP550, SNC-EP580, SNC-ER550, SNC-ER550C, SNC-ER580, SNC-ER585, SNC-ER585H, SNC-ZP550, SNC-ZR550, SNC-EP520, SNC-EP521, SNC-ER520, SNC-ER521, SNC-ER521C network cameras with firmware before Ver.1.86.00 and SONY SNC-CX600, SNC-CX600W, SNC-EB600, SNC-EB600B, SNC-EB602R, SNC-EB630, SNC-EB630B, SNC-EB632R, SNC-EM600, SNC-EM601, SNC-EM602R, SNC-EM602RC, SNC-EM630, SNC-EM631, SNC-EM632R, SNC-EM632RC, SNC-VB600, SNC-VB600B, SNC-VB600B5, SNC-VB630, SNC-VB6305, SNC-VB6307, SNC-VB632D, SNC-VB635, SNC-VM600, SNC-VM600B, SNC-VM600B5, SNC-VM601, SNC-VM601B, SNC-VM602R, SNC-VM630, SNC-VM6305, SNC-VM6307, SNC-VM631, SNC-VM632R, SNC-WR600, SNC-WR602, SNC-WR602C, SNC-WR630, SNC-WR632, SNC-WR632C, SNC-XM631, SNC-XM632, SNC-XM636, SNC-XM637, SNC-VB600L, SNC-VM600L, SNC-XM631L, SNC-WR602CL network cameras with firmware before Ver.2.7.2 are prone to sensitive information disclosure. This may allow an attacker on the same local network segment to login to the device with administrative privileges and perform operations on the device.
|
[
"cpe:2.3:o:sony:snc_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-cx600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-cx600w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-eb600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-eb600b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-eb602r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-eb630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-eb630b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-eb632r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-em600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-em601:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-em602r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-em602rc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-em630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-em631:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-em632r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-em632rc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vb600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vb600b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vb600b5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vb600l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vb630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vb6305:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vb6307:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vb632d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vb635:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm600b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm600b5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm600l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm601:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm601b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm602r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm6305:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm6307:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm631:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-vm632r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-wr600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-wr602:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-wr602c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-wr602cl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-wr630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-wr632:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-wr632c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-xm631:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-xm631l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-xm632:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-xm636:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-xm637:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-ch115:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-ch120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-ch160:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-ch220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-ch260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-dh120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-dh120t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-dh160:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-dh220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-dh220t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-dh260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-eb520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-em520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-em521:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-ep520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-ep521:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-ep550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-ep580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-er520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-er521:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-er521c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-er550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-er550c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-er580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-er585:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-er585h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-zb550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-zm550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-zm551:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-zp550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:snc-zr550:-:*:*:*:*:*:*:*"
] |
|
GHSA-c44g-v3fm-wqjp
|
In IOMMU, there is a possible information disclosure due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03692061; Issue ID: DTV03692061.
|
[] |
|
CVE-2006-2588
|
Russcom PHPImages allows remote attackers to upload files of arbitrary types by uploading a file with a .gif extension. NOTE: due to lack of specific information about attack vectors do not depend on the existence of another vulnerability, it is not clear whether this is a vulnerability.
|
[
"cpe:2.3:a:russcom_network:phpimages:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-32793
|
WordPress WooCommerce Pre-Orders Plugin <= 2.0.0 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WooCommerce WooCommerce Pre-Orders plugin <= 2.0.0 versions.
|
[
"cpe:2.3:a:woocommerce:woocommerce_pre-orders:*:*:*:*:*:wordpress:*:*"
] |
CVE-2022-2460
|
WPDating < 7.4.0 - Multiple Unauthenticated SQLi
|
The WPDating WordPress plugin before 7.4.0 does not properly escape user input before concatenating it to certain SQL queries, leading to multiple SQL injection vulnerabilities exploitable by unauthenticated users
|
[
"cpe:2.3:a:digital_product_labs:wpdating:*:*:*:*:*:wordpress:*:*"
] |
GHSA-gw27-h66h-phfx
|
Path Traversal vulnerability in TMRW-studio Katerio - Magazine allows PHP Local File Inclusion. This issue affects Katerio - Magazine: from n/a through 1.5.1.
|
[] |
|
CVE-1999-0115
|
AIX bugfiler program allows local users to gain root access.
|
[
"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*"
] |
|
GHSA-mq7q-g7rg-6h9c
|
HPE Systems Insight Manager (SIM) before 7.5.1 allows remote authenticated users to obtain sensitive information or modify data via unspecified vectors, a different vulnerability than CVE-2016-2017, CVE-2016-2019, CVE-2016-2020, CVE-2016-2021, and CVE-2016-2022.
|
[] |
|
GHSA-f38r-jrwh-28gc
|
Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'category' parameter of the category.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[] |
|
GHSA-w6v4-7gww-w8wm
|
Multiple SQL injection vulnerabilities in login.php in ApPHP PHP MicroCMS 1.0.1, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) user_name and (2) password variables, possibly related to include/classes/Login.php. NOTE: some of these details are obtained from third party information. NOTE: the password vector might not be vulnerable.
|
[] |
|
GHSA-fqgv-6p4g-cc4p
|
Unspecified vulnerability in the Industry Database (aka Branchendatenbank pro_industrydb) extension 1.0.0 and earlier for TYPO3 has unknown impact and attack vectors related to "Insufficient Verification of Data Authenticity."
|
[] |
|
GHSA-pp2f-3wrg-gx2g
|
IBM Sterling B2B Integrator 5.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume memory resources. IBM X-Force ID: 123663.
|
[] |
|
CVE-2022-27255
|
In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrites SDP data has a stack-based buffer overflow. This allows an attacker to remotely execute code without authentication via a crafted SIP packet that contains malicious SDP data.
|
[
"cpe:2.3:o:realtek:ecos_rsdk_firmware:1.5.7p1:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:ecos_rsdk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:realtek:ecos_msdk_firmware:4.9.4p1:*:*:*:*:*:*:*",
"cpe:2.3:h:realtek:ecos_msdk:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-10205
|
Session fixation vulnerability in Zoneminder 1.30 and earlier allows remote attackers to hijack web sessions via the ZMSESSID cookie.
|
[
"cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-25506
|
FreeTAKServer-UI v1.9.8 was discovered to contain a SQL injection vulnerability via the API endpoint /AuthenticateUser.
|
[
"cpe:2.3:a:freetakserver-ui_project:freetakserver-ui:1.9.8:*:*:*:*:*:*:*"
] |
|
CVE-2024-20736
|
ZDI-CAN-22822: Adobe Acrobat Pro DC AcroForm Out-Of-Bounds Read Information Disclosure Vulnerability
|
Acrobat Reader versions 20.005.30539, 23.008.20470 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] |
GHSA-834q-652j-m7j8
|
The High Availability (HA) subsystem in Cisco NX-OS on MDS 9000 devices allows remote attackers to cause a denial of service via crafted traffic, aka Bug ID CSCuo09129.
|
[] |
|
GHSA-rjfj-2398-v5jh
|
Unrestricted file upload vulnerability in upload.php in ContentNow CMS 1.4.1 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in upload/.
|
[] |
|
GHSA-hqm6-wfjh-9325
|
A Command Injection vulnerability in Edimax Wireless Router N300 Firmware BR-6428NS_v4 allows attacker to execute arbitrary code via the formAccept function in /bin/webs without any limitations.
|
[] |
|
GHSA-mch8-7v52-7hhx
|
PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 allows remote attackers to modify the flow of execution of ColdFusion code by using an HTTP GET request to set a ColdFusion variable.
|
[] |
|
CVE-2008-4458
|
SQL injection vulnerability in listings.php in E-Php B2B Trading Marketplace Script allows remote attackers to execute arbitrary SQL commands via the cid parameter in a product action.
|
[
"cpe:2.3:a:e-php_scripts:b2b_trading_marketplace_script:*:*:*:*:*:*:*:*"
] |
|
GHSA-8rp4-gqh3-jpxm
|
Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to obtain sensitive information via an HTTP session.
|
[] |
|
CVE-2020-21884
|
Unibox SMB 2.4 and UniBox Enterprise Series 2.4 and UniBox Campus Series 2.4 contain a cross-site request forgery (CSRF) vulnerability in /tools/network-trace, /list_users, /list_byod?usertype=raduser, /dhcp_leases, /go?rid=202 in which a specially crafted HTTP request may reconfigure the device.
|
[
"cpe:2.3:o:indionetworks:unibox_u50_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:indionetworks:unibox_u50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:indionetworks:unibox_u500_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:indionetworks:unibox_u500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:indionetworks:unibox_u1000_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:indionetworks:unibox_u1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:indionetworks:unibox_u2500_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:indionetworks:unibox_u2500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:indionetworks:unibox_u5000_firmware:2.4:*:*:*:*:*:*:*",
"cpe:2.3:h:indionetworks:unibox_u5000:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-26425
|
Uncontrolled search path element in the Intel(R) oneAPI Collective Communications Library (oneCCL) before version 2021.6 for Intel(R) oneAPI Base Toolkit may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:oneapi_collective_communications_library:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-20172
|
Cisco Identity Services Engine Arbitrary File Delete and File Read Vulnerabilities
|
Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to delete or read arbitrary files on the underlying operating system. To exploit these vulnerabilities, an attacker must have valid credentials on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
|
[
"cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:patch1:*:*:*:*:*:*"
] |
GHSA-hpmr-prr2-cqc4
|
Gitea Remote Code Execution
|
models/repo_mirror.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 mishandles mirror repo URL settings, leading to remote code execution.
|
[] |
CVE-2024-45205
|
An Improper Certificate Validation on the UniFi iOS App managing a standalone UniFi Access Point (not using UniFi Network Application) could allow a malicious actor with access to an adjacent network to take control of this UniFi Access Point.
Affected Products:
UniFi iOS App (Version 10.17.7 and earlier)
Mitigation:
UniFi iOS App (Version 10.18.0 or later).
|
[
"cpe:2.3:a:ui:unifi:*:*:*:*:*:ios:*:*"
] |
|
CVE-2025-23205
|
`frame-ancestors: self` grants all users access to formgrader in nbgrader
|
nbgrader is a system for assigning and grading notebooks. Enabling frame-ancestors: 'self' grants any JupyterHub user the ability to extract formgrader content by sending malicious links to users with access to formgrader, at least when using the default JupyterHub configuration of `enable_subdomains = False`. #1915 disables a protection which would allow user Alice to craft a page embedding formgrader in an IFrame. If Bob visits that page, his credentials will be sent and the formgrader page loaded. Because Alice's page is on the same Origin as the formgrader iframe, Javasript on Alice's page has _full access_ to the contents of the page served by formgrader using Bob's credentials. This issue has been addressed in release 0.9.5 and all users are advised to upgrade. Users unable to upgrade may disable `frame-ancestors: self`, or enable per-user and per-service subdomains with `JupyterHub.enable_subdomains = True` (then even if embedding in an IFrame is allowed, the host page does not have access to the contents of the frame).
|
[] |
GHSA-ggf4-7mhm-hwf4
|
The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to Information Exposure in versions up to, and including, 3.2.10. This can allow unauthenticated attackers to extract sensitive data including all registered user's username and email addresses which can be used to help perform future attacks.
|
[] |
|
CVE-2018-4373
|
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-9156
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 615/16/SD 415, SD 617, SD 800, SD 808, and SD 810, when making a high speed Dual Carrier Downlink Data call in a multicell environment, a buffer overflow may occur.
|
[
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*"
] |
|
GHSA-cx9h-wv2x-v9rg
|
A session fixation vulnerability in South River Technologies' Titan MFT and Titan SFTP servers on Linux and Windows allows an attacker to bypass the server's authentication if they can trick an administrator into authorizating a session id of their choosing
|
[] |
|
GHSA-hx2c-qfwc-wm58
|
Stack-based buffer overflow in modules/graphic/ssgraph/grsound.cpp in The Open Racing Car Simulator (TORCS) before 1.3.3 and Speed Dreams allows user-assisted remote attackers to execute arbitrary code via a long file name in an engine sample attribute in an xml configuration file.
|
[] |
|
GHSA-5f7m-mmpc-qhh4
|
mysql Node.JS Module Vulnerable to Remote Memory Exposure
|
Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure.Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password.Only `mysql` running on Node.js versions below 6.0.0 are affected due to a throw added in newer node.js versions.Proof of Concept:RecommendationUpdate to version 2.14.0 or later.
|
[] |
GHSA-v7f6-g4pv-2qgj
|
An attacker with an Administrator role in GitHub Enterprise Server could gain SSH root access via remote code execution. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.17, 3.9.12, 3.10.9, 3.11.7 and 3.12.1. This vulnerability was reported via the GitHub Bug Bounty program.
|
[] |
|
CVE-2011-1431
|
The STARTTLS implementation in qmail-smtpd.c in qmail-smtpd in the netqmail-1.06-tls patch for netqmail 1.06 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
|
[
"cpe:2.3:a:frederik_vermeulen:netqmail:1.06:*:*:*:*:*:*:*"
] |
|
GHSA-hmq5-375c-v782
|
Improper component protection vulnerability in Samsung Dialer prior to SMR May-2024 Release 1 allows local attackers to make a call without proper permission.
|
[] |
|
GHSA-x3f2-q3jq-26fv
|
In the Linux kernel, the following vulnerability has been resolved:KVM: VMX: Don't use vcpu->run->internal.ndata as an array index__vmx_handle_exit() uses vcpu->run->internal.ndata as an index for
an array access. Since vcpu->run is (can be) mapped to a user address
space with a writer permission, the 'ndata' could be updated by the
user process at anytime (the user process can set it to outside the
bounds of the array).
So, it is not safe that __vmx_handle_exit() uses the 'ndata' that way.
|
[] |
|
CVE-2025-32395
|
Vite has an `server.fs.deny` bypass with an invalid `request-target`
|
Vite is a frontend tooling framework for javascript. Prior to 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13, the contents of arbitrary files can be returned to the browser if the dev server is running on Node or Bun. HTTP 1.1 spec (RFC 9112) does not allow # in request-target. Although an attacker can send such a request. For those requests with an invalid request-line (it includes request-target), the spec recommends to reject them with 400 or 301. The same can be said for HTTP 2. On Node and Bun, those requests are not rejected internally and is passed to the user land. For those requests, the value of http.IncomingMessage.url contains #. Vite assumed req.url won't contain # when checking server.fs.deny, allowing those kinds of requests to bypass the check. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) and running the Vite dev server on runtimes that are not Deno (e.g. Node, Bun) are affected. This vulnerability is fixed in 6.2.6, 6.1.5, 6.0.15, 5.4.18, and 4.5.13.
|
[] |
CVE-2024-26067
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
CVE-2023-21146
|
there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239867994References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-5306
|
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 does not properly implement the HSTS protection mechanism, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for unintended HTTP traffic on port 8445.
|
[
"cpe:2.3:a:symantec:endpoint_protection_manager:*:mp4:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.