id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
GHSA-39r3-j54m-rvh3
Cross-site scripting (XSS) vulnerability in Hastymail2 before 1.01 allows remote attackers to inject arbitrary web script or HTML via a crafted background attribute within a cell in a TABLE element, related to improper use of the htmLawed filter.
[]
GHSA-m9f8-wwhq-rgp2
An issue was discovered on Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges on the device via poor credential management.
[]
GHSA-gr39-677j-2h8c
OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, and WRC-2533GS2V-B v1.62 and earlier.
[]
GHSA-r786-p84w-55j2
Integer overflow in the authenticate_post function in CGit before 0.12 allows remote attackers to have unspecified impact via a large value in the Content-Length HTTP header, which triggers a buffer overflow.
[]
CVE-2024-38612
ipv6: sr: fix invalid unregister error path
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix invalid unregister error path The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL is not defined. In that case if seg6_hmac_init() fails, the genl_unregister_family() isn't called. This issue exist since commit 46738b1317e1 ("ipv6: sr: add option to control lwtunnel support"), and commit 5559cea2d5aa ("ipv6: sr: fix possible use-after-free and null-ptr-deref") replaced unregister_pernet_subsys() with genl_unregister_family() in this error path.
[ "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:acrn:*:*:*:*:*:*:*:*" ]
GHSA-q68r-x3xx-f2m3
51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API mediaclip.cgi did not have a sufficient input validation allowing for uploading more audio clips then designed resulting in the Axis device running out of memory.  Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
[]
GHSA-g7q9-53fm-wrgh
Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the title parameter at /librarian/history.php.
[]
GHSA-4f4x-pggh-m93v
Deserialization of Untrusted Data vulnerability in impleCode eCommerce Product Catalog allows Object Injection. This issue affects eCommerce Product Catalog: from n/a through 3.4.3.
[]
CVE-2018-11154
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 12 of 46).
[ "cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*" ]
GHSA-6q2v-hjxc-f9rp
Missing Authorization vulnerability in Team118GROUP Team 118GROUP Agent allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Team 118GROUP Agent: from n/a through 1.6.0.
[]
CVE-2024-47642
WordPress Keap Official Opt-in Forms plugin <= 2.0.1 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Keap Keap Official Opt-in Forms allows Stored XSS.This issue affects Keap Official Opt-in Forms: from n/a through 2.0.1.
[]
CVE-2011-2694
Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
[ "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
CVE-2025-2558
The Wound <= 0.0.1 - Unauthenticated LFI
The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server
[]
CVE-2008-0949
Unspecified vulnerability in IBM Informix Dynamic Server (IDS) 7.x through 11.x allows remote attackers to gain privileges via a malformed connection request packet.
[ "cpe:2.3:a:ibm:informix_dynamic_server:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:9.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:9.40.tc5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:9.40.xd8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:9.40_xc7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc7w1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2:*:*:*:*:*:*:*" ]
CVE-2014-3146
Incomplete blacklist vulnerability in the lxml.html.clean module in lxml before 3.3.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function.
[ "cpe:2.3:a:lxml:lxml:*:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:1.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.1:alpha1:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2:-:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2:alpha1:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2:beta1:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2:beta2:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2:beta3:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2:beta4:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.3:-:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.3:alpha1:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.3:alpha2:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.3:beta1:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.0:-:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.3.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.3.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.3.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.3.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.3.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:lxml:lxml:3.3.3:*:*:*:*:*:*:*" ]
CVE-2010-1030
Unspecified vulnerability in HP-UX B.11.31, with AudFilter rules enabled, allows local users to cause a denial of service via unknown vectors.
[ "cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*" ]
GHSA-pwxr-5vrp-26jw
IBM Quality Manager (RQM) 6.02, 6.06, and 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 168293.
[]
CVE-2010-0120
Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows allows remote attackers to execute arbitrary code via large size values in QCP audio content.
[ "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*" ]
GHSA-hmjc-jvgw-hw44
Cross-site scripting (XSS) vulnerability in gb/user/index.php in Ramui Forum, possibly 1.0 Beta, allows remote attackers to inject arbitrary web script or HTML via the query parameter.
[]
GHSA-6w85-2w93-mrpr
In the Linux kernel, the following vulnerability has been resolved:speakup: Fix sizeof() vs ARRAY_SIZE() bugThe "buf" pointer is an array of u16 values. This code should be using ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512), otherwise it can the still got out of bounds.
[]
CVE-2008-1238
Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" ]
CVE-2018-6781
In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008264.
[ "cpe:2.3:a:jiangmin:antivirus:16.0.0.100:*:*:*:*:*:*:*" ]
CVE-2020-11864
libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows denial of service (issue 2 of 2).
[ "cpe:2.3:a:libemf_project:libemf:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
CVE-2016-8939
IBM Tivoli Storage Manager (IBM Spectrum Protect 7.1 and 8.1) clients/agents store password information in the Windows Registry in a manner which can be compromised. IBM X-Force ID: 118790.
[ "cpe:2.3:a:ibm:tivoli_storage_manager:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.3.6.100:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.100:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.200:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.500:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.600:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1..5.100:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.100:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.200:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.300:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.000:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.100:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5.200:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7.100:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7.200:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:8.1.1.100:*:*:*:*:*:*:*" ]
CVE-2005-0598
The RealServer RealSubscriber on Cisco devices running Application and Content Networking System (ACNS) 5.1 allow remote attackers to cause a denial of service (CPU consumption) via malformed packets.
[ "cpe:2.3:a:cisco:application_and_content_networking_software:\\(acns\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:4.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:4.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_and_content_networking_software:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_delivery_manager:4630:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_delivery_manager:4650:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4630:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4630:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4630:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4650:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4650:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4650:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_distribution_manager_4670:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:507:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:507_2.2_.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:507_3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:507_4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:507_4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:510:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:560:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:560_2.2_.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:560_3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:560_4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:560_4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:565:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:590:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:590_2.2_.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:590_3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:590_4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:590_4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7320:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7320_2.2_.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7320_3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7320_4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7320_4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine:7325:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine_module_for_cisco_router:2600_series:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine_module_for_cisco_router:2800_series:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3600_series:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3700_series:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3800_series:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:content_router_4430:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:content_router_4450:*:*:*:*:*:*:*:*" ]
CVE-2023-40131
In GpuService of GpuService.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
GHSA-9w6g-vm3j-6hg4
Type confusion could lead to a heap out-of-bounds write in V8 in Google Chrome prior to 64.0.3282.168 allowing a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
[]
GHSA-hhx3-g956-h93h
An issue was discovered in Cloud Foundry Foundation BOSH Release 261.x versions prior to 261.3 and all 260.x versions. In certain cases an authenticated Director user can provide a malicious checksum that could allow them to escalate their privileges on the Director VM, aka "BOSH Director Shell Injection Vulnerabilities."
[]
CVE-2022-20830
Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability
A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC without authentication. This vulnerability exists because the GUI is accessible on self-managed cloud installations or local server installations of Cisco vManage. An attacker could exploit this vulnerability by accessing the exposed GUI of Cisco SD-AVC. A successful exploit could allow the attacker to view managed device names, SD-AVC logs, and SD-AVC DNS server IP addresses.
[ "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*" ]
GHSA-xhwm-2wwh-ggc2
SQL injection vulnerability in Wiz-Ad 1.3 allows remote attackers to execute arbitrary SQL commands via unknown vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
GHSA-g9q9-wh2q-x3pm
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Spiffy Plugins WP Flow Plus allows Stored XSS.This issue affects WP Flow Plus: from n/a through 5.2.2.
[]
CVE-2021-45061
Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*" ]
GHSA-3346-hwjm-fgpv
Insufficient memory protection for Intel(R) Ethernet I218 Adapter driver for Windows* 10 before version 24.1 may allow an authenticated user to potentially enable information disclosure via local access.
[]
GHSA-9g8w-c3c6-8wxm
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.
[]
CVE-2022-45076
WordPress Flexible Elementor Panel Plugin <= 2.3.8 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in WebMat Flexible Elementor Panel plugin <= 2.3.8 versions.
[ "cpe:2.3:a:webmat:flexible_elementor_panel:*:*:*:*:*:wordpress:*:*" ]
GHSA-r55x-7v7f-p64g
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.
[]
GHSA-rr9f-vrp3-f94h
Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in WordPress WP Google Maps plugin (versions <= 8.1.12). Vulnerable parameters: &dataset_name, &wpgmza_gdpr_retention_purpose, &wpgmza_gdpr_company_name, &name #2, &name, &polyname #2, &polyname, &address.
[]
CVE-2018-7781
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, by sending a specially crafted request an authenticated user can view password in clear text and results in privilege escalation.
[ "cpe:2.3:o:schneider-electric:imps110-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imps110-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imps110-1e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imps110-1e:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imps110-1er_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imps110-1er:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:ibps110-1er_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:ibps110-1er:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp1110-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp1110-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp1110-1e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp1110-1e:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp1110-1er_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp1110-1er:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:ibp1110-1er_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:ibp1110-1er:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp219-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp219-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp219-1e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp219-1e:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp219-1er_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp219-1er:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:ibp219-1er_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:ibp219-1er:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp319-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp319-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp319-1e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp319-1e:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp319-1er_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp319-1er:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:ibp319-1er_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:ibp319-1er:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp519-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp519-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp519-1e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp519-1e:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:imp519-1er_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:imp519-1er:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:ibp519-1er_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:ibp519-1er:-:*:*:*:*:*:*:*" ]
GHSA-cp2m-j67p-96qc
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An app may be able to bypass ASLR.
[]
GHSA-w2h6-9f22-wxjx
An Integer Overflow exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22001B in the Accops HyWorks Windows Client prior to v 3.2.8.200 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
[]
GHSA-h27r-x6vq-qp4c
The msm gpu driver for custom Linux kernels on the Xiaomi perseus-p-oss MIX 3 device through 2018-11-26 has an integer overflow and OOPS because of missing checks of the count argument in _sde_debugfs_conn_cmd_tx_write in drivers/gpu/drm/msm/sde/sde_connector.c. This is exploitable for a device crash via a syscall by a crafted application on a rooted device.
[]
CVE-2021-23272
TIBCO BPM Cross Site Scripting (XSS)
The Application Development Clients component of TIBCO Software Inc.'s TIBCO BPM Enterprise and TIBCO BPM Enterprise Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a Cross Site Scripting (XSS) attack on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO BPM Enterprise: versions 4.3.0 and below and TIBCO BPM Enterprise Distribution for TIBCO Silver Fabric: versions 4.3.0 and below.
[ "cpe:2.3:a:tibco:bpm_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:bpm_enterprise_distribution_for_silver_fabric:*:*:*:*:*:*:*:*" ]
GHSA-9fmj-x3g8-hmqv
Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability.
[]
CVE-2022-20816
Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to delete arbitrary files from an affected system. This vulnerability exists because the affected software does not properly validate HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to delete arbitrary files from the affected system.
[ "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*" ]
CVE-2024-0463
code-projects Online Faculty Clearance HTTP POST Request admin_view_info.php sql injection
A vulnerability was found in code-projects Online Faculty Clearance 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /production/admin_view_info.php of the component HTTP POST Request Handler. The manipulation of the argument haydi leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250568.
[ "cpe:2.3:a:fabianros:online_faculty_clearance_system:1.0:*:*:*:*:*:*:*" ]
CVE-2012-4539
Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
[ "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*" ]
CVE-2021-47000
ceph: fix inode leak on getattr error in __fh_to_dentry
In the Linux kernel, the following vulnerability has been resolved: ceph: fix inode leak on getattr error in __fh_to_dentry
[]
GHSA-997q-cp6v-cm6w
stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
[]
CVE-2009-2163
Cross-site scripting (XSS) vulnerability in login/default.aspx in Sitecore CMS before 6.0.2 Update-1 090507 allows remote attackers to inject arbitrary web script or HTML via the sc_error parameter.
[ "cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:sitecore:cms:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:sitecore:cms:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:sitecore:cms:6.0.1:*:*:*:*:*:*:*" ]
GHSA-cw2p-h75f-wq2f
The Avaya 4602 SW IP Phone (Model 4602D02A) with 2.2.2 and earlier SIP firmware uses a constant media port number for calls, which allows remote attackers to cause a denial of service (audio quality loss) via a flood of packets to the RTP port.
[]
GHSA-fwm6-ghvh-8mr4
The Affiliates Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.9.34. This is due to missing or incorrect nonce validation on the process_bulk_action function in ListAffiliatesTable.php. This makes it possible for unauthenticated attackers to delete affiliates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
GHSA-5378-fj29-782c
The mintToken function of a smart contract implementation for SlidebitsToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
GHSA-8p5q-qwh5-4pqj
Opera before 11.10 allows remote attackers to hijack (1) searches and (2) customizations via unspecified third party applications.
[]
CVE-2025-24152
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app may be able to cause unexpected system termination or corrupt kernel memory.
[]
GHSA-3wcf-84jq-4rxx
An issue discovered in pdfmake 0.2.9 allows remote attackers to run arbitrary code via crafted POST request to the path '/pdf'.
[]
CVE-2020-2756
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
[ "cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*", "cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*" ]
GHSA-c3q7-q63g-7jw7
ASP-Nuke RC2 and earlier allows remote attackers to list all logged-in users by submitting an invalid "pseudo" cookie.
[]
GHSA-mmgj-46r8-x39q
SQL injection vulnerability in ajax_udf.php in OpenDocMan before 1.2.7.2 allows remote attackers to execute arbitrary SQL commands via the add_value parameter.
[]
CVE-2024-5649
Universal Slider <= 1.6.5 - Authenticated (Contributor+) PHP Object Injection
The Universal Slider plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.6.5 via deserialization of untrusted input 'fsl_get_gallery_value' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
[ "cpe:2.3:a:webhuntinfotech:universal_slider:*:*:*:*:*:wordpress:*:*" ]
CVE-2022-41999
A denial of service vulnerability exists in the DDS native tile reading functionality of OpenImageIO Project OpenImageIO v2.3.19.0 and v2.4.4.2. A specially-crafted .dds can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability.
[ "cpe:2.3:a:openimageio:openimageio:2.3.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:openimageio:openimageio:2.4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
CVE-2020-3351
Cisco SD-WAN Solution Software Denial of Service Vulnerability
A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper validation of fields in Cisco SD-WAN peering messages that are encapsulated in UDP packets. An attacker could exploit this vulnerability by sending crafted UDP messages to the targeted system. A successful exploit could allow the attacker to cause services on the device to fail, resulting in a DoS condition that could impact the targeted device and other devices that depend on it.
[ "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:vedge_cloud_router:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*" ]
CVE-2022-41687
Insecure inherited permissions in the HotKey Services for some Intel(R) NUC P14E Laptop Element software for Windows 10 before version 1.1.44 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:nuc_p14e_laptop_element:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*" ]
CVE-2015-4779
Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect integrity and availability via unknown vectors, a different vulnerability than CVE-2015-4774 and CVE-2015-4788.
[ "cpe:2.3:a:oracle:berkeley_db:11.2.5.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:berkeley_db:11.2.5.2.42:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:berkeley_db:11.2.5.3.28:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:berkeley_db:12.1.6.0.35:*:*:*:*:*:*:*" ]
GHSA-q8p9-93xv-92jh
SQL injection vulnerability in default.aspx in easypage allows remote attackers to execute arbitrary SQL commands via the srch parameter in the Search page.
[]
GHSA-hhx2-5833-74qf
DG Remote Control Server 1.6.2 allows remote attackers to cause a denial of service (crash or CPU consumption) and possibly execute arbitrary code via a long message to TCP port 1071 or 1073, possibly due to a buffer overflow.
[]
CVE-2023-22342
Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*" ]
CVE-2023-42562
Integer overflow vulnerability in detectionFindFaceSupportMultiInstance of libFacePreProcessingjni.camera.samsung.so prior to SMR Dec-2023 Release 1 allows attacker to trigger heap overflow.
[ "cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*" ]
GHSA-fg35-c4c9-gp8p
There is an improper authentication vulnerability in several smartphones. Certain function interface in the system does not sufficiently validate the caller's identity in certain share scenario, successful exploit could cause information disclosure. Affected product versions include:Mate 30 Pro versions Versions earlier than 10.0.0.205(C00E202R7P2);Mate 30 versions Versions earlier than 10.0.0.205(C00E201R7P2).
[]
GHSA-w9jj-mrhj-pwhj
In K7 Antivirus 15.1.0306, the driver file (K7Sentry.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x950025b0.
[]
CVE-2006-0276
Multiple unspecified vulnerabilities in Oracle Collaboration Suite Release 2, version 9.0.4.2 (Oracle9i) have unspecified impact and attack vectors, as identified by Oracle Vuln# (1) OCS01, 2) OCS02, 3) OCS03, 4) OCS04, 5) OCS05, 6) OCS06, 7) OCS07, (8) OCS08, and (9) OCS09 in the (a) Email Server component; 10) OCS10 (and (11) OCS11 in the (b) Oracle Collaboration Suite Wireless & Voice (component; 12) OCS12 and (13) OCS13 in the (c) Oracle Content (Management SDK component; 14) OCS14 and (15) OCS15 in the (d) Oracle (Content Services component.
[ "cpe:2.3:a:oracle:collaboration_suite:9.0.4.2:r2:*:*:*:*:*:*" ]
CVE-2021-27850
Bypass of the fix for CVE-2019-0195
A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.1, upgrade to 5.6.2 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later.
[ "cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*" ]
GHSA-fc49-wgh2-47f2
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in apollo13themes Rife Free allows Stored XSS.This issue affects Rife Free: from n/a through 2.4.19.
[]
CVE-1999-1388
passwd in SunOS 4.1.x allows local users to overwrite arbitrary files via a symlink attack and the -F command line argument.
[ "cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*" ]
CVE-2020-6557
Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
GHSA-r9vc-pgpj-x6f4
Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010.
[]
CVE-2018-4214
An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to cause a denial of service (memory corruption and Safari crash) or possibly have unspecified other impact via a crafted web site.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" ]
GHSA-j2hp-jqgm-85pf
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AccessAlly PopupAlly allows Stored XSS.This issue affects PopupAlly: from n/a through 2.1.1.
[]
GHSA-9f3p-cpj2-496g
Stack-based buffer overflow in the FindConfigChildeKeyList method in the XNSSDKDEVICE.XnsSdkDeviceCtrlForIpInstaller.1 ActiveX control in Samsung iPOLiS Device Manager before 1.8.7 allows remote attackers to execute arbitrary code via a long value.
[]
CVE-2004-1571
AJ-Fork 167 allows remote attackers to gain sensitive information via a direct request to (1) auto-acronyms.php, (2) auto-archive.php, (3) ount-article-views.php, (4) kses.php, (5) custom-quick-tags.php, (6) disable-all-comments.php, (7) easy-date-format.php, (8) enable-disable-comments.php, (9) filter-by-author.php, (10) format-switcher.php, (11) long-to-short.php, (12) prospective-posting.php, or (13) sort-by-xfield.php, which displays the full path in an error message.
[ "cpe:2.3:a:aj-fork:aj-fork:167:*:*:*:*:*:*:*" ]
CVE-2008-1323
Cross-site request forgery (CSRF) vulnerability in index.php in WoltLab Burning Board Lite (wBB) 2 Beta 1 allows remote attackers to delete threads as other users via the ThreadDelete action.
[ "cpe:2.3:a:woltlab:burning_board_lite:2.0:beta_1:*:*:*:*:*:*" ]
CVE-2024-43912
wifi: nl80211: disallow setting special AP channel widths
In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: disallow setting special AP channel widths Setting the AP channel width is meant for use with the normal 20/40/... MHz channel width progression, and switching around in S1G or narrow channels isn't supported. Disallow that.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-383h-xx34-hq84
A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).
[]
CVE-2006-1397
Multiple cross-site scripting (XSS) vulnerabilities in (a) phpAdsNew and (b) phpPgAds before 2.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) certain parameters to the banner delivery module, which is not properly handled in the administrator interface, or (2) certain parameters to the login form.
[ "cpe:2.3:a:phpadsnew:phpadsnew:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpadsnew:phpadsnew:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpadsnew:phpadsnew:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpadsnew:phpadsnew:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpadsnew:phpadsnew:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpadsnew:phpadsnew:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpadsnew:phpadsnew:2_dev_2001-10-09:*:*:*:*:*:*:*", "cpe:2.3:a:phppgads:phppgads:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:phppgads:phppgads:2.0.4_pr2:*:*:*:*:*:*:*", "cpe:2.3:a:phppgads:phppgads:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:phppgads:phppgads:2.0.7:*:*:*:*:*:*:*" ]
GHSA-7v6g-m3gq-vpm5
An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur via /alert_check/action=delete_alert_checker/alert_test_id= because of pages/alert_check.inc.php.
[]
CVE-2020-4975
IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192435.
[ "cpe:2.3:a:ibm:doors_next:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_lifecycle_management:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_requirements_quality_assistant_on-premises:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:global_configuration_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*" ]
GHSA-g28x-287m-pqv9
A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files, aka "Windows Theme API Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
[]
GHSA-g6f8-f8f2-6wh5
In the Linux kernel, the following vulnerability has been resolved:i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlockA deadlock may happen since the i3c_master_register() acquires &i3cbus->lock twice. See the log below. Use i3cdev->desc->info instead of calling i3c_device_info() to avoid acquiring the lock twice.v2:Modified the title and commit message============================================ WARNING: possible recursive locking detected 6.11.0-mainlineinit/1 is trying to acquire lock: f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_bus_normaluse_lockbut task is already holding lock: f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_master_registerother info that might help us debug this: Possible unsafe locking scenario:lock(&i3cbus->lock); lock(&i3cbus->lock);*** DEADLOCK ***May be due to missing lock nesting notation2 locks held by init/1: #0: fcffff809b6798f8 (&dev->mutex){....}-{3:3}, at: __driver_attach #1: f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_master_registerstack backtrace: CPU: 6 UID: 0 PID: 1 Comm: init Call trace: dump_backtrace+0xfc/0x17c show_stack+0x18/0x28 dump_stack_lvl+0x40/0xc0 dump_stack+0x18/0x24 print_deadlock_bug+0x388/0x390 __lock_acquire+0x18bc/0x32ec lock_acquire+0x134/0x2b0 down_read+0x50/0x19c i3c_bus_normaluse_lock+0x14/0x24 i3c_device_get_info+0x24/0x58 i3c_device_uevent+0x34/0xa4 dev_uevent+0x310/0x384 kobject_uevent_env+0x244/0x414 kobject_uevent+0x14/0x20 device_add+0x278/0x460 device_register+0x20/0x34 i3c_master_register_new_i3c_devs+0x78/0x154 i3c_master_register+0x6a0/0x6d4 mtk_i3c_master_probe+0x3b8/0x4d8 platform_probe+0xa0/0xe0 really_probe+0x114/0x454 __driver_probe_device+0xa0/0x15c driver_probe_device+0x3c/0x1ac __driver_attach+0xc4/0x1f0 bus_for_each_dev+0x104/0x160 driver_attach+0x24/0x34 bus_add_driver+0x14c/0x294 driver_register+0x68/0x104 __platform_driver_register+0x20/0x30 init_module+0x20/0xfe4 do_one_initcall+0x184/0x464 do_init_module+0x58/0x1ec load_module+0xefc/0x10c8 __arm64_sys_finit_module+0x238/0x33c invoke_syscall+0x58/0x10c el0_svc_common+0xa8/0xdc do_el0_svc+0x1c/0x28 el0_svc+0x50/0xac el0t_64_sync_handler+0x70/0xbc el0t_64_sync+0x1a8/0x1ac
[]
CVE-2020-2851
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Common Desktop Environment). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H).
[ "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*" ]
CVE-2019-19587
In WSO2 Enterprise Integrator 6.5.0, reflected XSS occurs when updating the message processor configuration from the source view in the Management Console.
[ "cpe:2.3:a:wso2:enterprise_integrator:6.5.0:*:*:*:*:*:*:*" ]
CVE-2007-4543
Cross-site scripting (XSS) vulnerability in enter_bug.cgi in Bugzilla 2.17.1 through 2.20.4, 2.22.x before 2.22.3, and 3.x before 3.0.1 allows remote attackers to inject arbitrary web script or HTML via the buildid field in the "guided form."
[ "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*" ]
CVE-2021-3692
Use of Predictable Algorithm in Random Number Generator in yiisoft/yii2
yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator
[ "cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*" ]
CVE-2013-2462
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
[ "cpe:2.3:a:oracle:jre:*:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:*:update21:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*" ]
GHSA-f4m4-vgf6-42vm
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
[]
GHSA-w6cm-9c76-c988
A credentials leak was found in the OpenShift Container Platform. The private key for the external cluster certificate was stored incorrectly in the oauth-serving-cert ConfigMaps, and accessible to any authenticated OpenShift user or service-account. A malicious user could exploit this flaw by reading the oauth-serving-cert ConfigMap in the openshift-config-managed namespace, compromising any web traffic secured using that certificate.
[]
CVE-2018-1000856
DomainMOD version 4.09.03 and above. Also verified in the latest version 4.11.01 contains a Cross Site Scripting (XSS) vulnerability in Segment Name field in the segments page that can result in Arbitrary script can be executed on all users browsers who visit the affected page. This attack appear to be exploitable via Victim must visit the vulnerable page. This vulnerability appears to have been fixed in No fix yet.
[ "cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*" ]
CVE-2018-20843
In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
[ "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_res_3700:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*" ]
GHSA-c9gq-c7g6-cr8x
In MuPDF 1.12.0 and earlier, multiple reachable assertions in the PDF parser allow an attacker to cause a denial of service (assert crash) via a crafted file.
[]
CVE-2004-0167
DiskArbitration in Mac OS X 10.2.8 and 10.3.2 does not properly initialize writeable removable media.
[ "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*" ]
CVE-2022-31749
Authenticated arbitrary file read/write in WatchGuard Fireware OS
An argument injection vulnerability in the diagnose and import pac commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows an authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances
[]
GHSA-5r53-xj9v-rj4f
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0590, CVE-2019-0591, CVE-2019-0593, CVE-2019-0605, CVE-2019-0607, CVE-2019-0610, CVE-2019-0642, CVE-2019-0644, CVE-2019-0651, CVE-2019-0652, CVE-2019-0655.
[]