id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2005-1816
|
Invision Power Board (IPB) 1.0 through 2.0.4 allows non-root admins to add themselves or other users to the root admin group via the "Move users in this group to" screen.
|
[
"cpe:2.3:a:invision_power_services:invision_board:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.3.1_final:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:1.3_final:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0_alpha_3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0_pdr3:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0_pf1:*:*:*:*:*:*:*",
"cpe:2.3:a:invision_power_services:invision_board:2.0_pf2:*:*:*:*:*:*:*"
] |
|
GHSA-pjh7-qqhq-g74c
|
The issue was addressed with improved checks. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4, watchOS 9.5, tvOS 16.5. A person with physical access to a device may be able to view contact information from the lock screen
|
[] |
|
GHSA-67wf-x95f-gfcj
|
In JetBrains YouTrack before 2019.2.59309, SMTP/Jabber settings could be accessed using backups.
|
[] |
|
CVE-2014-4526
|
Multiple cross-site scripting (XSS) vulnerabilities in callback.php in the efence plugin 1.3.2 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) message, (2) zoneid, (3) pubKey, or (4) privKey parameter.
|
[
"cpe:2.3:a:efence_project:efence:*:-:-:*:-:wordpress:*:*"
] |
|
GHSA-6pf2-f62r-mjc2
|
The real3d-flipbook-lite plugin 1.0 for WordPress has XSS via the wp-content/plugins/real3d-flipbook/includes/flipbooks.php bookId parameter.
|
[] |
|
CVE-2017-16285
|
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_time, at 0x9d018e58, the value for the `offset` key is copied using `strcpy` to the buffer at `$sp+0x2d0`.This buffer is 100 bytes large, sending anything longer will cause a buffer overflow.
|
[
"cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-44522
|
A vulnerability has been identified in SiPass integrated V2.76 (All versions), SiPass integrated V2.80 (All versions), SiPass integrated V2.85 (All versions), Siveillance Identity V1.5 (All versions), Siveillance Identity V1.6 (All versions < V1.6.284.0). Affected applications insufficiently limit the access to the internal message broker system. This could allow an unauthenticated remote attacker to subscribe to arbitrary message queues.
|
[
"cpe:2.3:a:siemens:sipass_integrated:2.76:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sipass_integrated:2.76:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:siveillance_identity:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:*"
] |
|
CVE-2020-15008
|
A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user supplied table name with little validation, the table name can be modified to allow arbitrary update commands to be run. Usage of other SQL injection techniques such as timing attacks, it is possible to perform full data extraction as well. Patched in 2020.7 and in a hotfix for 2019.12.
|
[
"cpe:2.3:a:connectwise:connectwise_automate:*:*:*:*:*:*:*:*",
"cpe:2.3:a:connectwise:connectwise_automate:2019.12:*:*:*:*:*:*:*"
] |
|
GHSA-q8ww-99pm-fjf2
|
In the Linux kernel, the following vulnerability has been resolved:net: atm: add lec_mutexsyzbot found its way in net/atm/lec.c, and found an error path
in lecd_attach() could leave a dangling pointer in dev_lec[].Add a mutex to protect dev_lecp[] uses from lecd_attach(),
lec_vcc_attach() and lec_mcast_attach().Following patch will use this mutex for /proc/net/atm/lec.BUG: KASAN: slab-use-after-free in lecd_attach net/atm/lec.c:751 [inline]
BUG: KASAN: slab-use-after-free in lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008
Read of size 8 at addr ffff88807c7b8e68 by task syz.1.17/6142CPU: 1 UID: 0 PID: 6142 Comm: syz.1.17 Not tainted 6.16.0-rc1-syzkaller-00239-g08215f5486ec #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:408 [inline]
print_report+0xcd/0x680 mm/kasan/report.c:521
kasan_report+0xe0/0x110 mm/kasan/report.c:634
lecd_attach net/atm/lec.c:751 [inline]
lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008
do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
sock_do_ioctl+0x118/0x280 net/socket.c:1190
sock_ioctl+0x227/0x6b0 net/socket.c:1311
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:907 [inline]
__se_sys_ioctl fs/ioctl.c:893 [inline]
__x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
</TASK>Allocated by task 6132:
kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
__kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394
kasan_kmalloc include/linux/kasan.h:260 [inline]
__do_kmalloc_node mm/slub.c:4328 [inline]
__kvmalloc_node_noprof+0x27b/0x620 mm/slub.c:5015
alloc_netdev_mqs+0xd2/0x1570 net/core/dev.c:11711
lecd_attach net/atm/lec.c:737 [inline]
lane_ioctl+0x17db/0x23e0 net/atm/lec.c:1008
do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
sock_do_ioctl+0x118/0x280 net/socket.c:1190
sock_ioctl+0x227/0x6b0 net/socket.c:1311
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:907 [inline]
__se_sys_ioctl fs/ioctl.c:893 [inline]
__x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7fFreed by task 6132:
kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x51/0x70 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2381 [inline]
slab_free mm/slub.c:4643 [inline]
kfree+0x2b4/0x4d0 mm/slub.c:4842
free_netdev+0x6c5/0x910 net/core/dev.c:11892
lecd_attach net/atm/lec.c:744 [inline]
lane_ioctl+0x1ce8/0x23e0 net/atm/lec.c:1008
do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
sock_do_ioctl+0x118/0x280 net/socket.c:1190
sock_ioctl+0x227/0x6b0 net/socket.c:1311
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:907 [inline]
__se_sys_ioctl fs/ioctl.c:893 [inline]
__x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
|
[] |
|
GHSA-f2w4-4w88-537q
|
Improper Privilege Management vulnerability in 8theme XStore Core allows Privilege Escalation.This issue affects XStore Core: from n/a through 5.3.8.
|
[] |
|
CVE-2017-1497
|
IBM Sterling File Gateway 2.2 could allow an unauthorized user to view files they should not have access to providing they know the directory location of the file. IBM X-Force ID: 128695.
|
[
"cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*"
] |
|
GHSA-3fpv-54ff-wqfj
|
Deserialization of Untrusted Data in topthink/framework
|
The package topthink/framework before version 6.0.12 is vulnerable to Deserialization of Untrusted Data due to insecure `unserialize` method in the `Driver` class.
|
[] |
CVE-2003-0361
|
gPS before 1.1.0 does not properly follow the rgpsp connection source acceptation policy as specified in the rgpsp.conf file, which could allow unauthorized remote attackers to connect to rgpsp.
|
[
"cpe:2.3:o:debian:debian_linux:0.9.1:*:woody_gps_package:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:0.9.2:*:woody_gps_package:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:0.9.3:*:woody_gps_package:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:0.9.4:*:woody_gps_package:*:*:*:*:*"
] |
|
CVE-2002-0359
|
xfsmd for IRIX 6.5 through 6.5.16 uses weak authentication, which allows remote attackers to call dangerous RPC functions, including those that can mount or unmount xfs file systems, to gain root privileges.
|
[
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.5f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.5m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.7f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.7m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.8f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.8m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.9f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.9m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.10f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.10m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.11f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.11m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.12f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.12m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.13f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.13m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*"
] |
|
CVE-2012-1009
|
NetSarang Xlpd 4 Build 0100 and NetSarang Xmanager Enterprise 4 Build 0186 allow remote attackers to cause a denial of service (daemon crash) via a malformed LPD request.
|
[
"cpe:2.3:a:netsarang:xlpd:4:0100:*:*:*:*:*:*",
"cpe:2.3:a:netsarang:xmanager_enterprise:4:0186:*:*:*:*:*:*"
] |
|
GHSA-qmcf-vc5w-fwpw
|
A remote denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33129467.
|
[] |
|
GHSA-2q77-j9qq-67hg
|
The Interactive Contact Form and Multi Step Form Builder WordPress plugin before 3.4 does not sanitise and escape some parameters, which could allow unauthenticated users to perform Cross-Site Scripting attacks
|
[] |
|
CVE-2015-6398
|
Cisco Nexus 9000 Application Centric Infrastructure (ACI) Mode switches with software before 11.0(1c) allow remote attackers to cause a denial of service (device reload) via an IPv4 ICMP packet with the IP Record Route option, aka Bug ID CSCuq57512.
|
[
"cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-1600
|
YOP Poll < 6.4.3 - IP Spoofing
|
The YOP Poll WordPress plugin before 6.4.3 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations to vote in certain situations.
|
[
"cpe:2.3:a:yop-poll:yop_poll:*:*:*:*:*:wordpress:*:*"
] |
CVE-2017-5129
|
A use after free in WebAudio in Blink in Google Chrome prior to 62.0.3202.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-q5cv-m2fg-983f
|
SQL injection vulnerability in tr.php in YourFreeWorld Banner Management Script allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] |
|
GHSA-8cjj-hfq6-q64w
|
Unspecified vulnerability in the Oracle Payroll component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to View Payslip.
|
[] |
|
GHSA-4vff-8c4j-m2j6
|
In the Linux kernel, the following vulnerability has been resolved:btrfs: zoned: initialize device's zone info for seedingWhen performing seeding on a zoned filesystem it is necessary to
initialize each zoned device's btrfs_zoned_device_info structure,
otherwise mounting the filesystem will cause a NULL pointer dereference.This was uncovered by fstests' testcase btrfs/163.
|
[] |
|
CVE-2022-24129
|
The OIDC OP plugin before 3.0.4 for Shibboleth Identity Provider allows server-side request forgery (SSRF) due to insufficient restriction of the request_uri parameter. This allows attackers to interact with arbitrary third-party HTTP services.
|
[
"cpe:2.3:a:shibboleth:oidc_op:*:*:*:*:*:identity_provider:*:*"
] |
|
GHSA-qrm3-3qcc-mmqr
|
Cross Site Scripting (XSS) in X2Engine X2CRM v6.9 and older allows remote attackers to execute arbitrary code by injecting arbitrary web script or HTML via the "New Name" field of the "Rename a Module" tool.
|
[] |
|
GHSA-9272-59x2-gwf2
|
Malicious Package in ripedm160
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
|
[] |
CVE-2025-48299
|
WordPress YayExtra plugin <= 1.5.5 - SQL Injection Vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in YayCommerce YayExtra allows SQL Injection. This issue affects YayExtra: from n/a through 1.5.5.
|
[] |
CVE-2017-5623
|
An issue was discovered in OxygenOS before 4.1.0 on OnePlus 3 and 3T devices. The attacker can change the bootmode of the device by issuing the 'fastboot oem boot_mode {rf/wlan/ftm/normal} command' in contradiction to the threat model of Android where the bootloader MUST NOT allow any security-sensitive operation to be run unless the bootloader is unlocked.
|
[
"cpe:2.3:o:oneplus:oxygenos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:oneplus:oneplus_3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:oneplus:oneplus_3t:-:*:*:*:*:*:*:*"
] |
|
CVE-2013-3373
|
CRLF injection vulnerability in Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a MIME header.
|
[
"cpe:2.3:a:bestpractical:rt:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:preflight1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:preflight0:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.1:rc5:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.8:rc4:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.9:rc3:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.11:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.11:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.13:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.13:rc2:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.14:rc1:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:rt:3.8.16:*:*:*:*:*:*:*"
] |
|
CVE-2000-1161
|
The installation of AdCycle banner management system leaves the build.cgi program in a web-accessible directory, which allows remote attackers to execute the program and view passwords or delete databases.
|
[
"cpe:2.3:a:adcycle:adcycle:0.77b:*:*:*:*:*:*:*"
] |
|
GHSA-wrrm-pwrp-4mqm
|
A CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service when an attacker repeatedly sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
|
[] |
|
CVE-2024-26727
|
btrfs: do not ASSERT() if the newly created subvolume already got read
|
In the Linux kernel, the following vulnerability has been resolved:
btrfs: do not ASSERT() if the newly created subvolume already got read
[BUG]
There is a syzbot crash, triggered by the ASSERT() during subvolume
creation:
assertion failed: !anon_dev, in fs/btrfs/disk-io.c:1319
------------[ cut here ]------------
kernel BUG at fs/btrfs/disk-io.c:1319!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
RIP: 0010:btrfs_get_root_ref.part.0+0x9aa/0xa60
<TASK>
btrfs_get_new_fs_root+0xd3/0xf0
create_subvol+0xd02/0x1650
btrfs_mksubvol+0xe95/0x12b0
__btrfs_ioctl_snap_create+0x2f9/0x4f0
btrfs_ioctl_snap_create+0x16b/0x200
btrfs_ioctl+0x35f0/0x5cf0
__x64_sys_ioctl+0x19d/0x210
do_syscall_64+0x3f/0xe0
entry_SYSCALL_64_after_hwframe+0x63/0x6b
---[ end trace 0000000000000000 ]---
[CAUSE]
During create_subvol(), after inserting root item for the newly created
subvolume, we would trigger btrfs_get_new_fs_root() to get the
btrfs_root of that subvolume.
The idea here is, we have preallocated an anonymous device number for
the subvolume, thus we can assign it to the new subvolume.
But there is really nothing preventing things like backref walk to read
the new subvolume.
If that happens before we call btrfs_get_new_fs_root(), the subvolume
would be read out, with a new anonymous device number assigned already.
In that case, we would trigger ASSERT(), as we really expect no one to
read out that subvolume (which is not yet accessible from the fs).
But things like backref walk is still possible to trigger the read on
the subvolume.
Thus our assumption on the ASSERT() is not correct in the first place.
[FIX]
Fix it by removing the ASSERT(), and just free the @anon_dev, reset it
to 0, and continue.
If the subvolume tree is read out by something else, it should have
already get a new anon_dev assigned thus we only need to free the
preallocated one.
|
[] |
CVE-2024-1499
|
The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Pricing Table widget in the $settings['title_tags'] parameter in all versions up to, and including, 2.10.30 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
CVE-2017-6827
|
Heap-based buffer overflow in the MSADPCM::initializeCoefficients function in MSADPCM.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted audio file.
|
[
"cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*"
] |
|
GHSA-h94p-p746-v4fv
|
A location bar spoofing attack where the location bar of loaded page will be shown over the content of another tab due to a series of JavaScript events combined with fullscreen mode. Note: This issue only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox < 51.
|
[] |
|
GHSA-7j7h-p7m5-p62q
|
A privacy issue was addressed by removing sensitive data. This issue is fixed in iPadOS 17.7.7, macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. A malicious app may be able to read sensitive location information.
|
[] |
|
GHSA-4m88-fhx6-92j5
|
Bytecode Alliance wasm-micro-runtime (aka WebAssembly Micro Runtime or WAMR) before 1.3.0 can have an "double free or corruption" error for a valid WebAssembly module because push_pop_frame_ref_offset is mishandled.
|
[] |
|
CVE-2024-9301
|
A path traversal issue in E2Nest prior to commit 8a41948e553c89c56b14410c6ed395e9cfb9250a
|
[
"cpe:2.3:a:netflix:e2nest:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-40828
|
B.C. Institute of Technology CodeIgniter <=3.1.13 is vulnerable to SQL Injection via system\database\DB_query_builder.php or_where_not_in() function. Note: Multiple third parties have disputed this as not a valid vulnerability.
|
[
"cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codeigniter:codeigniter:3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:codeigniter:codeigniter:3.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:codeigniter:codeigniter:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:codeigniter:codeigniter:3.0:rc3:*:*:*:*:*:*"
] |
|
CVE-2022-25149
|
WP Statistics <= 13.1.5 Unauthenticated Blind SQL Injection via IP
|
The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the IP parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5.
|
[
"cpe:2.3:a:veronalabs:wp_statistics:*:*:*:*:*:wordpress:*:*"
] |
CVE-2019-13939
|
A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) (All versions < V2.8.2), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8.2 < V2.8.19), Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), Desigo PXC00-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC00-U (All versions >= V2.3x and < V6.00.327), Desigo PXC001-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC100-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC12-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC128-U (All versions >= V2.3x and < V6.00.327), Desigo PXC200-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC22-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC22.1-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC36.1-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC50-E.D (All versions >= V2.3 < V6.0.327), Desigo PXC64-U (All versions >= V2.3x and < V6.00.327), Desigo PXM20-E (All versions >= V2.3 < V6.0.327), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus Source Code (All versions), SIMOTICS CONNECT 400 (All versions < V0.3.0.330), TALON TC Compact (BACnet) (All versions < V3.5.3), TALON TC Modular (BACnet) (All versions < V3.5.3). By sending specially crafted DHCP packets to a device where the DHCP client is enabled, an attacker could change the IP address of the device to an invalid value.
|
[
"cpe:2.3:a:siemens:capital_vstar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_readystart:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_safetycert:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_source_code:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:nucleus_rtos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_modular_equiment_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_modular_equiment_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_modular_building_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_modular_building_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_pxc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_pxc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxm20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxm20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simotics_connect_400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simotics_connect_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:talon_tc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:talon_tc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc00-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc00-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc00-u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc00-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc001-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc001-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc12-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc12-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc22-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc22-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc22.1-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc22.1-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigo_pxc36.1-e.d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigo_pxc36.1-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigopxc50-e.d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigopxc50-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigopxc64-u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigopxc64-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigopxc100-e.d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigopxc100-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigopxc128-u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigopxc128-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigopxc200-e.d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigopxc200-e.d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:desigopxm20-e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:desigopxm20-e:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-25808
|
Cross-site Request Forgery (CSRF) vulnerability in Lychee version 3.1.6, allows remote attackers to execute arbitrary code via the create new album function.
|
[
"cpe:2.3:a:lycheeorg:lychee:*:*:*:*:*:*:*:*"
] |
|
GHSA-f9mv-78h4-x2jx
|
The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE is set to always-malloc, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ico file.
|
[] |
|
CVE-2025-27043
|
Buffer Copy Without Checking Size of Input in Video
|
Memory corruption while processing manipulated payload in video firmware.
|
[] |
CVE-2015-5013
|
The IBM Security Access Manager appliance includes configuration files that contain obfuscated plaintext-passwords which authenticated users can access.
|
[
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_for_web_appliance:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_mobile:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_for_mobile_appliance:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_9.0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_9.0:-:*:*:*:*:*:*:*"
] |
|
GHSA-v3j8-q37p-7695
|
Cross Site Scripting (XSS vulnerability exists in Portainer before 2.9.1 via the node input box in Custom Templates.
|
[] |
|
CVE-2020-3431
|
Cisco Small Business RV Series Routers Cross-Site Scripting Vulnerability
|
A vulnerability in the web-based management interface of Cisco Small Business RV042 Dual WAN VPN Routers and Cisco Small Business RV042G Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.
The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] |
GHSA-whcq-9xqv-qhr4
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fugu Maintenance Switch plugin <= 1.5.2 versions.
|
[] |
|
GHSA-jgm8-vvh4-72gh
|
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 150017.
|
[] |
|
CVE-2022-29033
|
A vulnerability has been identified in JT2Go (All versions < V13.3.0.3), Teamcenter Visualization V13.3 (All versions < V13.3.0.3), Teamcenter Visualization V14.0 (All versions < V14.0.0.1). The CGM_NIST_Loader.dll library is vulnerable to uninitialized pointer free while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process.
|
[
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-24401
|
WordPress Mobile Call Now & Map Buttons Plugin <= 1.5.0 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Davidsword Mobile Call Now & Map Buttons plugin <= 1.5.0 versions.
|
[
"cpe:2.3:a:davidsword:mobile_call_now_\\&_map_buttons:*:*:*:*:*:wordpress:*:*"
] |
GHSA-4gxq-mqgw-j2ww
|
In sprd_sysdump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
|
[] |
|
GHSA-vm9x-85qm-fvq3
|
The api /api/snapshot and /api/get_log_file would allow unauthenticated access.
It could allow a DoS attack or get arbitrary files from FE node.
Please upgrade to 2.0.3 to fix these issues.
|
[] |
|
CVE-2018-16036
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] |
|
GHSA-h6w8-52mq-4qxc
|
Apache Linkis contains Deserialization of Untrusted Data
|
In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be blacklisted. Versions of Apache Linkis <= 1.3.0 will be affected. We recommend users to upgrade the version of Linkis to version 1.3.1.
|
[] |
GHSA-qgw5-chqv-jf7p
|
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in XFA event management. Successful exploitation could lead to arbitrary code execution.
|
[] |
|
CVE-2020-0946
|
An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory, aka 'Media Foundation Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-0937, CVE-2020-0939, CVE-2020-0945, CVE-2020-0947.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-jxhj-v2x6-23c5
|
In parseRecursively of cppbor_parse.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-192743373
|
[] |
|
GHSA-v6qc-f595-6qvv
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in IP2Location IP2Location Country Blocker.This issue affects IP2Location Country Blocker: from n/a through 2.33.3.
|
[] |
|
GHSA-6pvg-63w9-jhx6
|
Zentao Biz version 8.7 and before is vulnerable to Information Disclosure.
|
[] |
|
CVE-2017-17161
|
The 'Find Phone' function in some Huawei smart phones with software earlier than Duke-L09C10B186 versions, earlier than Duke-L09C432B187 versions, earlier than Duke-L09C636B186 versions has an authentication bypass vulnerability. Due to improper authentication realization in the 'Find Phone' function. An attacker may exploit the vulnerability to bypass the 'Find Phone' function in order to use the phone normally.
|
[
"cpe:2.3:o:huawei:duke-l09_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:duke-l09:-:*:*:*:*:*:*:*"
] |
|
GHSA-w629-xc8x-7g3v
|
Experience Manager versions 6.5.15.0 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[] |
|
GHSA-jmw3-v7qc-2gx9
|
Buffer overflow in Xsun X server in Solaris 7 allows local users to gain root privileges via a long -dev parameter.
|
[] |
|
CVE-2018-12093
|
tinyexr 0.9.5 has a memory leak in ParseEXRHeaderFromMemory in tinyexr.h.
|
[
"cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*"
] |
|
GHSA-gjjm-x2xg-8xgc
|
The JavaServer Pages (JSP) component in Cisco Integrated Management Controller (IMC) Supervisor before 1.0.0.1 and UCS Director (formerly Cloupia Unified Infrastructure Controller) before 5.2.0.1 allows remote attackers to write to arbitrary files via crafted HTTP requests, aka Bug IDs CSCus36435 and CSCus62625.
|
[] |
|
CVE-2006-6376
|
Multiple directory traversal vulnerabilities in fm.php in Simple File Manager (SFM) 0.24a allow remote attackers to use ".." sequences to (1) read arbitrary files via the filename parameter in a download action, (2) delete arbitrary files via the delete parameter, and (3) modify arbitrary files via the edit parameter, which can be leveraged to execute arbitrary code.
|
[
"cpe:2.3:a:onedotoh:simple_file_manager:0.24a:*:*:*:*:*:*:*"
] |
|
CVE-2021-27678
|
Cross-site scripting (XSS) vulnerability in Snippets in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name.
|
[
"cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*"
] |
|
GHSA-q356-m8pw-frv3
|
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which use $lookup and collations. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions prior to 3.6.15.
|
[] |
|
GHSA-8jmv-j56r-8xpf
|
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 266064.
|
[] |
|
CVE-2017-8811
|
The implementation of raw message parameter expansion in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows HTML mangling attacks.
|
[
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.28.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.28.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.29.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.29.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-30355
|
Amazon Kindle e-reader prior to and including version 5.13.4 improperly manages privileges, allowing the framework user to elevate privileges to root.
|
[
"cpe:2.3:o:amazon:kindle_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amazon:kindle:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-5102
|
Insufficient Control Flow Management in RDT400 in SICK APU allows an unprivileged remote attacker to potentially enable hidden functionality via HTTP requests.
|
[
"cpe:2.3:h:sick:apu0200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sick:apu0200_firmware:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-15789
|
Microk8s Privilege Escalation Vulnerability
|
Privilege escalation vulnerability in MicroK8s allows a low privilege user with local access to obtain root access to the host by provisioning a privileged container. Fixed in MicroK8s 1.15.3.
|
[
"cpe:2.3:a:canonical:microk8s:*:*:*:*:*:*:*:*"
] |
CVE-2021-4001
|
A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*"
] |
|
CVE-2024-23364
|
Buffer Over-read in WLAN Firmware
|
Transient DOS when processing the non-transmitted BSSID profile sub-elements present within the MBSSID Information Element (IE) of a beacon frame that is received from over-the-air (OTA).
|
[
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_3210_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:immersive_home_326_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5312_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5332_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9008_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9554_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq9574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2062_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2065_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6554a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6777aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6787aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8082_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8084_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8085_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8386_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcf8000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcf8001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6422_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6432_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qxm8083_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*"
] |
CVE-2024-56214
|
WordPress UserPro plugin <= 5.1.9 - Local File Inclusion vulnerability
|
Path Traversal: '.../...//' vulnerability in DeluxeThemes Userpro allows Path Traversal.This issue affects Userpro: from n/a through 5.1.9.
|
[] |
GHSA-8frw-r4fr-c96p
|
An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang. A specially crafted tiff file can cause a heap-overflow resulting in remote code execution. An attacker can send a file or a URL to trigger this vulnerability.
|
[] |
|
CVE-2025-23727
|
WordPress AZ Content Finder plugin <= 0.1 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound AZ Content Finder allows Reflected XSS. This issue affects AZ Content Finder: from n/a through 0.1.
|
[] |
CVE-2025-28985
|
WordPress Elastic Email Subscribe Form <= 1.2.2 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in Elastic Email Elastic Email Subscribe Form allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Elastic Email Subscribe Form: from n/a through 1.2.2.
|
[] |
CVE-2013-7489
|
The Beaker library through 1.11.0 for Python is affected by deserialization of untrusted data, which could lead to arbitrary code execution.
|
[
"cpe:2.3:a:beakerbrowser:beaker:*:*:*:*:*:python:*:*"
] |
|
CVE-2020-26101
|
In cPanel before 88.0.3, insecure RNDC credentials are used for BIND on a templated VM (SEC-549).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-2097
|
Authenticated List control client can execute the LINQ query in SCM Server to present event as list for operator. An authenticated malicious client can send special LINQ query to execute arbitrary code remotely (RCE) on the SCM Server that an attacker otherwise does not have authorization to do.
|
[
"cpe:2.3:a:hitachienergy:modular_advanced_control_for_hvdc:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-53026
|
Buffer Over-read in Data Network Stack & Connectivity
|
Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call.
|
[] |
GHSA-7m6g-jmv3-c8cf
|
An improper neutralization of input vulnerability in FortiWeb allows a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the Disclaimer Description of a Replacement Message.
|
[] |
|
GHSA-8v6h-j8r8-9mjq
|
Inappropriate implementation in WebApp Installs in Google Chrome on Windows prior to 128.0.6613.84 allowed an attacker who convinced a user to install a malicious application to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
|
[] |
|
CVE-2023-39955
|
Notes attachment render HTML in preview mode
|
Notes is a note-taking app for Nextcloud, an open-source cloud platform. Starting in version 4.4.0 and prior to version 4.8.0, when creating a note file with HTML, the content is rendered in the preview instead of the file being offered to download. Nextcloud Notes app version 4.8.0 contains a patch for the issue. No known workarounds are available.
|
[
"cpe:2.3:a:nextcloud:notes:*:*:*:*:*:nextcloud:*:*"
] |
CVE-2005-3492
|
FlatFrag 0.3 and earlier allows remote attackers to cause a denial of service (crash) by sending an NT_CONN_OK command from a client that is not connected, which triggers a null dereference.
|
[
"cpe:2.3:a:johannes_f._kuhlmann:flatfrag:0.3:*:*:*:*:*:*:*"
] |
|
CVE-2022-0860
|
Improper Authorization in cobbler/cobbler
|
Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.
|
[
"cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] |
GHSA-whx5-3vjj-xg9h
|
Buffer overflow in mIRC 5.91 and earlier allows a remote server to execute arbitrary code on the client via a long nickname.
|
[] |
|
CVE-2022-2362
|
Download Manager < 3.2.50 - Bypass IP Address Blocking Restriction
|
The Download Manager WordPress plugin before 3.2.50 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based download blocking restrictions.
|
[
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:*"
] |
GHSA-r23x-h32h-x9jh
|
In the standard library in Rust before 1.51.0, the Zip implementation calls __iterator_get_unchecked() for the same index more than once when nested. This bug can lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
|
[] |
|
GHSA-v279-6x6v-qx69
|
process_debug_info in dwarf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file that contains a negative size value in a CU structure.
|
[] |
|
GHSA-vgx9-m8h2-6vmq
|
Tadiran Telecom Aeonix - CWE-204: Observable Response Discrepancy
|
[] |
|
GHSA-8mv4-j2q7-6w42
|
An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for ChatSecure (3.2.0 - 4.0.0; only iOS) and Zom (all versions up to 1.0.11; only iOS).
|
[] |
|
GHSA-frxh-87ph-hrfx
|
Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.1 and 6.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
|
[] |
|
GHSA-w765-6g68-fxf9
|
Installation file of ESET security products on Windowsallow an attacker to misuse to delete an arbitrary file without having the permissions to do so.
|
[] |
|
GHSA-wjpq-x66w-f4mj
|
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and Linux RealPlayer 11.0.2.1744 allows remote attackers to execute arbitrary code via a crafted conditional component in AAC frame data.
|
[] |
|
CVE-2006-7025
|
SQL injection vulnerability in admin/config.php in Bookmark4U 2.0 and 2.1 allows remote attackers to inject arbitrary SQL command via the sqlcmd parameter.
|
[
"cpe:2.3:a:sangwan_kim:bookmark4u:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-9415
|
The bj-lazy-load plugin before 1.0 for WordPress has Remote File Inclusion.
|
[
"cpe:2.3:a:angrycreative:bj_lazy_load:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2019-20412
|
The Convert Sub-Task to Issue page in affected versions of Atlassian Jira Server and Data Center allow remote attackers to enumerate the following information via an Improper Authentication vulnerability: Workflow names; Project Key, if it is part of the workflow name; Issue Keys; Issue Types; Status Types. The affected versions are before version 7.13.9, and from version 8.0.0 before 8.4.2.
|
[
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.