id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2020-15093 | Improper verification of signature threshold in tough | The tough library (Rust/crates.io) prior to version 0.7.1 does not properly verify the threshold of cryptographic signatures. It allows an attacker to duplicate a valid signature in order to circumvent TUF requiring a minimum threshold of unique signatures before the metadata is considered valid. A fix is available in version 0.7.1. CVE-2020-6174 is assigned to the same vulnerability in the TUF reference implementation. | [
"cpe:2.3:a:amazon:tough:*:*:*:*:*:rust:*:*"
]
|
CVE-2007-0583 | Multiple cross-site scripting (XSS) vulnerabilities in HTTP Commander 6.0, and possibly earlier, allow remote attackers to inject arbitrary web script or HTML via the (1) LogoffMessage parameter to logofflast.aspx or the (2) txtUsername parameter to Default.aspx. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:http_commander:http_commander:6.0:*:*:*:*:*:*:*"
]
|
|
GHSA-34ff-v4jj-rwc7 | resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone. | []
|
|
CVE-2001-1320 | Network Associates PGP Keyserver 7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via exceptional BER encodings (possibly buffer overflows), as demonstrated by the PROTOS LDAPv3 test suite. | [
"cpe:2.3:a:pgp:keyserver:7.0:*:*:*:*:*:*:*"
]
|
|
GHSA-2c2j-2pgv-gfgc | Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow
compromise key generation, certificate loading, and other card management operations during enrollment. | []
|
|
CVE-2002-1844 | Microsoft Windows Media Player (WMP) 6.3, when installed on Solaris, installs executables with world-writable permissions, which allows local users to delete or modify the executables to gain privileges. | [
"cpe:2.3:a:microsoft:windows_media_player:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*"
]
|
|
CVE-2020-4909 | IBM Cloud Pak System 2.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 191273. | [
"cpe:2.3:a:ibm:cloud_pak_system:*:*:*:*:*:*:*:*"
]
|
|
GHSA-2hqf-qqmq-pgpp | Malicious Package in commander-js | All versions of `commander-js` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads an arbitrary file and executes its contents as a post-install script.RecommendationThis package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary. | []
|
GHSA-wq45-c8xj-98wj | Hosting Controller 6.1 Hotfix 1.9 and earlier allows remote attackers to register arbitrary users via a direct request to addsubsite.asp with the loginname and password parameters set. | []
|
|
CVE-2025-5018 | Hive Support <= 1.2.4 - Authenticated (Subscriber+) Missing Authorization via hs_update_ai_chat_settings and hive_lite_support_get_all_binbox | The Hive Support plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the hs_update_ai_chat_settings() and hive_lite_support_get_all_binbox() functions in all versions up to, and including, 1.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read and overwrite the site’s OpenAI API key and inspection data or modify AI-chat prompts and behavior. This vulnerability is potentially a duplicate of CVE-2025-32208 or/and CVE-2025-32242. | []
|
CVE-2019-10153 | A flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters in a guest VM's comment or other fields would cause fence_rhevm to exit with an exception. In cluster environments, this could lead to preventing automated recovery or otherwise denying service to clusters of which that VM is a member. | [
"cpe:2.3:a:clusterlabs:fence-agents:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
]
|
|
CVE-2016-9810 | The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call. | [
"cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:*"
]
|
|
GHSA-cpwg-58mj-87w6 | Invoxia NVX220 devices allow access to /bin/sh via escape from a restricted CLI, leading to disclosure of password hashes. | []
|
|
GHSA-jgc8-vf4g-2f67 | A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability. | []
|
|
CVE-2009-3449 | MP3 Collector 2.3 allows remote attackers to cause a denial of service (application crash) via a long URL in a .m3u playlist file. | [
"cpe:2.3:a:collectorz:mp3_collector:2.3:*:*:*:*:*:*:*"
]
|
|
GHSA-25x4-r7rm-rcw2 | A vulnerability has been found in PHPGurukul Maid Hiring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/search-maid.php. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | []
|
|
CVE-2018-13826 | An XML external entity vulnerability in the XOG functionality, in CA PPM 14.3 and below, 14.4, 15.1, 15.2 CP5 and below, and 15.3 CP2 and below, allows remote attackers to conduct server side request forgery attacks. | [
"cpe:2.3:a:broadcom:project_portfolio_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:project_portfolio_management:14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:project_portfolio_management:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:project_portfolio_management:15.2:cp5:*:*:*:*:*:*",
"cpe:2.3:a:ca:project_portfolio_management:15.3:cp2:*:*:*:*:*:*"
]
|
|
CVE-2022-28282 | By using a link with <code>rel="localization"</code> a use-after-free could have been triggered by destroying an object during JavaScript execution and then referencing the object through a freed pointer, leading to a potential exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
]
|
|
CVE-2016-4300 | Integer overflow in the read_SubStreamsInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a 7zip file with a large number of substreams, which triggers a heap-based buffer overflow. | [
"cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
]
|
|
CVE-2017-1149 | IBM UrbanCode Deploy (UCD) 6.0, 6.1, and 6.2 is vulnerable to a denial of service, caused by an XML External Entity Injection (XXE) error when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume all available memory resources. IBM X-Force ID: 122202. | [
"cpe:2.3:a:ibm:urbancode_deploy:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.0.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.0.201:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:urbancode_deploy:6.2.1.1:*:*:*:*:*:*:*"
]
|
|
GHSA-cg66-88cp-whx8 | Unspecified vulnerability in Boost before 6.x-1.03, a module for Drupal, allows remote attackers to create new webroot directories via unknown attack vectors. | []
|
|
CVE-2025-20635 | In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09403752; Issue ID: MSV-2434. | []
|
|
CVE-2013-1891 | In OpenCart 1.4.7 to 1.5.5.1, implemented anti-traversal code in filemanager.php is ineffective and can be bypassed. | [
"cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
|
GHSA-8jxm-xp43-qh3q | Silver vulnerable to MitM attack against implants due to a cryptography vulnerability | SummaryThe current cryptography implementation in Sliver up to version 1.5.39 allows a MitM with access to the corresponding implant binary to execute arbitrary codes on implanted devices via intercepted and crafted responses. (Reserved CVE ID: CVE-2023-34758)DetailsPlease see [the PoC repo](https://github.com/tangent65536/Slivjacker).PoCPlease also see [the PoC repo](https://github.com/tangent65536/Slivjacker).
To setup a simple PoC environment,Generate an implant with its C2 set to the PoC server's address and copy the embedded private implant key and public server key into the config json.Run the implant on a separate VM and a `notepad.exe` window should pop up on the implanted VM.ImpactA successful attack grants the attacker permission to execute arbitrary code on the implanted device.Referenceshttps://github.com/BishopFox/sliver/blob/master/implant/sliver/cryptography/implant.go
https://github.com/BishopFox/sliver/blob/master/implant/sliver/cryptography/crypto.go
https://github.com/tangent65536/SlivjackerCredits[Ting-Wei Hsieh](https://github.com/tangent65536) from [CHT Security Co. Ltd.](https://www.chtsecurity.com/?lang=en) | []
|
GHSA-7875-j5rv-pqwq | The Just Bureaucracy (aka com.magzter.justbureaucracy) application 3.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
|
|
GHSA-xw76-qw2j-v4fp | Use after free in shell in Google Chrome on ChromeOS prior to 100.0.4896.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | []
|
|
CVE-2018-13082 | The mintToken function of a smart contract implementation for MODI Token (MODI), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:moditokenerc20_project:moditokenerc20:-:*:*:*:*:*:*:*"
]
|
|
CVE-2017-6151 | In F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator and WebSafe software version 13.0.0, undisclosed requests made to BIG-IP virtual servers which make use of the "HTTP/2 profile" may result in a disruption of service to TMM. | [
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:13.0.0:*:*:*:*:*:*:*"
]
|
|
CVE-2008-4922 | Buffer overflow in the DjVu ActiveX Control 3.0 for Microsoft Office (DjVu_ActiveX_MSOffice.dll) allows remote attackers to execute arbitrary code via a long (1) ImageURL property, and possibly the (2) Mode, (3) Page, or (4) Zoom properties. | [
"cpe:2.3:a:djvu:activex_control_for_microsoft_office_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*"
]
|
|
CVE-2024-49638 | WordPress Risk Warning Bar plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Ali Azlan Risk Warning Bar allows Reflected XSS.This issue affects Risk Warning Bar: from n/a through 1.0. | [
"cpe:2.3:a:aliazlan:risk_warning_bar:*:*:*:*:*:wordpress:*:*"
]
|
CVE-2009-2433 | Stack-based buffer overflow in the AddFavorite method in Microsoft Internet Explorer allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a long URL in the first argument. | [
"cpe:2.3:a:microsoft:ie:8.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0.5730:unknown:gold:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.0.5730.11:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.00.5730.1100:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16386:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7.00.6000.16441:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8.0.6001:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8.0.6001:beta:*:*:*:*:*:*"
]
|
|
GHSA-3fgq-cmr4-97rr | phpMyAdmin CSS Injection Vulnerability | phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to a CSS injection attack through crafted cookie parameters | []
|
CVE-2024-33266 | SQL Injection vulnerability in Helloshop deliveryorderautoupdate v.2.8.1 and before allows an attacker to run arbitrary SQL commands via the DeliveryorderautoupdateOrdersModuleFrontController::initContent function. | [
"cpe:2.3:a:helloshop:deliveryorderautoupdate:*:*:*:*:*:*:*:*"
]
|
|
GHSA-3q5q-8rwq-gwp8 | Credential disclosure in the '/webs/userpasswd.htm' endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 allows an authenticated attacker to leak the password for the administrative account via requests to the vulnerable endpoint. | []
|
|
CVE-2023-34110 | Flask-AppBuilder vulnerable to possible disclosure of sensitive information on user error | Flask-AppBuilder is an application development framework, built on top of Flask. Prior to version 4.3.2, an authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed password. This vulnerability has been fixed in version 4.3.2.
| [
"cpe:2.3:a:flask-appbuilder_project:flask-appbuilder:*:*:*:*:*:*:*:*"
]
|
CVE-2024-4325 | Server-Side Request Forgery (SSRF) in gradio-app/gradio | A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the user and expected to be a URL, is used to make an HTTP request without sufficient validation checks. This flaw allows an attacker to send crafted requests that could lead to unauthorized access to the local network or the AWS metadata endpoint, thereby compromising the security of internal servers. | [
"cpe:2.3:a:gradio_project:gradio:-:*:*:*:*:python:*:*",
"cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*"
]
|
CVE-2025-25724 | list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale. | []
|
|
GHSA-8r98-9q2c-r66c | Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Interoperability SEC). Supported versions that are affected are Prior to 9.2.7.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | []
|
|
CVE-2021-30662 | This issue was addressed with improved checks. This issue is fixed in iOS 14.5 and iPadOS 14.5. Processing a maliciously crafted file may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
]
|
|
CVE-2022-27472 | SQL injection vulnerability in Topics Counting feature of Roothub 2.6.0 allows unauthorized attackers to execute arbitrary SQL commands via the "s" parameter remotely. | [
"cpe:2.3:a:roothub_project:roothub:2.6.0:*:*:*:*:*:*:*"
]
|
|
GHSA-cv5p-mx2f-hjcv | SQL injection vulnerability in writemessage.php in Yogurt 0.3, when register_globals is enabled, allows remote authenticated users to execute arbitrary SQL commands via the original parameter. | []
|
|
GHSA-2x77-gppq-9cj5 | Multiple cross-site scripting (XSS) vulnerabilities in the Spider Facebook plugin before 1.0.11 for WordPress allow (1) remote attackers to inject arbitrary web script or HTML via the appid parameter in a registration task to the default URI or remote administrators to inject arbitrary web script or HTML via the (2) asc_or_desc, (3) order_by, (4) page_number, (5) serch_or_not, or (6) search_events_by_title parameter in (a) the Spider_Facebook_manage page to wp-admin/admin.php or a (b) selectpagesforfacebook or (c) selectpostsforfacebook action to wp-admin/admin-ajax.php. | []
|
|
CVE-2019-2998 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.17 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
]
|
|
GHSA-46p9-c28x-c7x9 | Cross-site scripting (XSS) vulnerability in mod.php in eNdonesia 8.2 allows remote attackers to inject arbitrary web script or HTML via the mod parameter. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | []
|
|
CVE-2025-23630 | WordPress Cyber Slider plugin <= 1.1 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Cyber Slider allows Reflected XSS. This issue affects Cyber Slider: from n/a through 1.1. | []
|
GHSA-r4h2-77r7-2xch | It was found that the fix for CVE-2014-0114 had been reverted in JBoss Operations Network 3 (JON). This flaw allows attackers to manipulate ClassLoader properties on a vulnerable server. Exploits that have been published rely on ClassLoader properties that are exposed such as those in JON 3. Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/site/solutions/869353. Note that while multiple products released patches for the original CVE-2014-0114 flaw, the reversion described by this CVE-2019-3834 flaw only occurred in JON 3. | []
|
|
GHSA-jh35-xrpp-vv4q | PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults. | []
|
|
GHSA-9cx9-7v8g-h36v | PTZOptics PT30X-SDI/NDI-xx before firmware 6.3.40 is vulnerable to an OS command injection issue. The camera does not sufficiently validate the ntp_addr configuration value which may lead to arbitrary command execution when ntp_client is started. When chained with CVE-2024-8956, a remote and unauthenticated attacker can execute arbitrary OS commands on affected devices. | []
|
|
GHSA-c7f8-wqfw-qhrr | Heap-based buffer overflow in Red Hat adminutil 1.1.6 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via % (percent) encoded HTTP input to unspecified CGI scripts in Fedora Directory Server. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-2929. | []
|
|
CVE-2025-31207 | A logic issue was addressed with improved checks. This issue is fixed in iOS 18.5 and iPadOS 18.5. An app may be able to enumerate a user's installed apps. | []
|
|
CVE-2019-9261 | In libxaac there is a possible out of bounds read due to missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-116774214 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
|
|
GHSA-vph9-j5h2-h3xp | Missing Authorization vulnerability in magepeopleteam WpEvently allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WpEvently: from n/a through 4.2.9. | []
|
|
GHSA-r798-gf85-6mc8 | mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode without the Apache log, allows local users to overwrite arbitrary files via (1) a symlink attack on predictable temporary filenames on Unix systems, or (2) an NTFS hard link on Windows systems when the "Strengthen default permissions of internal system objects" policy is not enabled. | []
|
|
GHSA-p4jx-5p2x-4pq7 | SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables. | []
|
|
CVE-2013-5938 | Cross-site scripting (XSS) vulnerability in the Click2Sell Suite module 6.x-1.x for Drupal allows remote attackers to inject arbitrary web script or HTML via a confirmation form. | [
"cpe:2.3:a:click2sell:click2sell_suite_module:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
]
|
|
GHSA-rrmg-hr5x-6w4q | Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via /vam/vam_ep.php. | []
|
|
CVE-2011-0666 | Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
]
|
|
CVE-2021-24875 | eCommerce Product Catalog for WordPress < 3.0.39 - Reflected Cross-Site Scripting | The eCommerce Product Catalog Plugin for WordPress plugin before 3.0.39 does not escape the ic-settings-search parameter before outputting it back in the page in an attribute, leading to a Reflected Cross-Site Scripting issue | [
"cpe:2.3:a:implecode:ecommerce_product_catalog:*:*:*:*:*:wordpress:*:*"
]
|
CVE-2022-42544 | In getView of AddAppNetworksFragment.java, there is a possible way to mislead the user about network add requests due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224545390 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
|
|
GHSA-2p6p-9rc9-62j9 | Craft CMS has potential RCE when PHP `register_argc_argv` config setting is enabled | ImpactYou are affected if your php.ini configuration has `register_argc_argv` enabled.PatchesUpdate to 3.9.14, 4.13.2, or 5.5.2.WorkaroundsIf you can't upgrade yet, and `register_argc_argv` is enabled, you can disable it to mitigate the issue. | []
|
CVE-2025-21907 | mm: memory-failure: update ttu flag inside unmap_poisoned_folio | In the Linux kernel, the following vulnerability has been resolved:
mm: memory-failure: update ttu flag inside unmap_poisoned_folio
Patch series "mm: memory_failure: unmap poisoned folio during migrate
properly", v3.
Fix two bugs during folio migration if the folio is poisoned.
This patch (of 3):
Commit 6da6b1d4a7df ("mm/hwpoison: convert TTU_IGNORE_HWPOISON to
TTU_HWPOISON") introduce TTU_HWPOISON to replace TTU_IGNORE_HWPOISON in
order to stop send SIGBUS signal when accessing an error page after a
memory error on a clean folio. However during page migration, anon folio
must be set with TTU_HWPOISON during unmap_*(). For pagecache we need
some policy just like the one in hwpoison_user_mappings to set this flag.
So move this policy from hwpoison_user_mappings to unmap_poisoned_folio to
handle this warning properly.
Warning will be produced during unamp poison folio with the following log:
------------[ cut here ]------------
WARNING: CPU: 1 PID: 365 at mm/rmap.c:1847 try_to_unmap_one+0x8fc/0xd3c
Modules linked in:
CPU: 1 UID: 0 PID: 365 Comm: bash Tainted: G W 6.13.0-rc1-00018-gacdb4bbda7ab #42
Tainted: [W]=WARN
Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015
pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : try_to_unmap_one+0x8fc/0xd3c
lr : try_to_unmap_one+0x3dc/0xd3c
Call trace:
try_to_unmap_one+0x8fc/0xd3c (P)
try_to_unmap_one+0x3dc/0xd3c (L)
rmap_walk_anon+0xdc/0x1f8
rmap_walk+0x3c/0x58
try_to_unmap+0x88/0x90
unmap_poisoned_folio+0x30/0xa8
do_migrate_range+0x4a0/0x568
offline_pages+0x5a4/0x670
memory_block_action+0x17c/0x374
memory_subsys_offline+0x3c/0x78
device_offline+0xa4/0xd0
state_store+0x8c/0xf0
dev_attr_store+0x18/0x2c
sysfs_kf_write+0x44/0x54
kernfs_fop_write_iter+0x118/0x1a8
vfs_write+0x3a8/0x4bc
ksys_write+0x6c/0xf8
__arm64_sys_write+0x1c/0x28
invoke_syscall+0x44/0x100
el0_svc_common.constprop.0+0x40/0xe0
do_el0_svc+0x1c/0x28
el0_svc+0x30/0xd0
el0t_64_sync_handler+0xc8/0xcc
el0t_64_sync+0x198/0x19c
---[ end trace 0000000000000000 ]---
[[email protected]: unmap_poisoned_folio(): remove shadowed local `mapping', per Miaohe] | []
|
GHSA-vc9w-r2x3-9p7g | Stack-based buffer overflow in the logging functionality in the Preboot Policy service in Novell ZENworks Configuration Management (ZCM) allows remote attackers to execute arbitrary code via unspecified vectors. | []
|
|
GHSA-w579-p9rx-pmrq | The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command. | []
|
|
CVE-2018-21249 | An issue was discovered in Mattermost Server before 5.3.0. It mishandles timing. | [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
]
|
|
CVE-2005-3920 | SQL injection vulnerability in Babe Logger 2 allows remote attackers to execute arbitrary SQL commands via the (1) gal parameter to index.php or (2) id parameter to comments.php. | [
"cpe:2.3:a:babe_logger:babe_logger:2:*:*:*:*:*:*:*"
]
|
|
GHSA-6jx6-mrpj-vr27 | A vulnerability, which was classified as critical, was found in code-projects Online Bus Reservation System 1.0. This affects an unknown part of the file /seatlocation.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | []
|
|
GHSA-8gqj-226h-gm8r | Passport-wsfed-saml2 allows SAML Authentication Bypass via Attribute Smuggling | OverviewThis vulnerability allows an attacker to impersonate any user during SAML authentication by tampering with a valid SAML response. This can be done by adding attributes to the response.Am I Affected?You are affected by this SAML Attribute Smuggling vulnerability if you are using `passport-wsfed-saml2` version 4.6.3 or below, specifically under the following conditions:The service provider is using `passport-wsfed-saml2`,A valid SAML Response signed by the Identity Provider can be obtainedFixUpgrade to v4.6.4 or greater. | []
|
GHSA-g766-f6qx-6wx9 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | []
|
|
GHSA-78jj-qvg7-6h49 | H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function UpdateWanLinkspyMulti. | []
|
|
CVE-2021-33203 | Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories. | [
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
]
|
|
GHSA-748w-7rvw-f2rj | Remote file upload vulnerability in fast-image-adder v1.1 Wordpress plugin | []
|
|
CVE-2006-5504 | Cross-site scripting (XSS) vulnerability in index.php in Simple Machines Forum (SMF) allows remote attackers to inject arbitrary web script or HTML via a base64 encoded params value in the action parameter. | [
"cpe:2.3:a:simple_machines:simple_machines_forum:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:simple_machines:simple_machines_forum:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:simple_machines:simple_machines_forum:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:simple_machines:simple_machines_forum:1.1_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:simple_machines:simple_machines_forum:1.1_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:simple_machines:simple_machines_forum:1.1_rc3:*:*:*:*:*:*:*"
]
|
|
CVE-2017-11122 | On Broadcom BCM4355C0 Wi-Fi chips 9.44.78.27.0.1.56, an attacker can trigger an information leak due to insufficient length validation, related to ICMPv6 router advertisement offloading. | [
"cpe:2.3:o:broadcom:bcm4355c0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm4355c0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
]
|
|
CVE-2019-16928 | Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command. | [
"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
]
|
|
CVE-2024-13312 | Open Social - Moderately critical - Access bypass - SA-CONTRIB-2024-076 | Missing Authorization vulnerability in Drupal Open Social allows Forceful Browsing.This issue affects Open Social: from 11.8.0 before 12.3.10, from 12.4.0 before 12.4.9. | []
|
CVE-2022-24696 | Mirametrix Glance before 5.1.1.42207 (released on 2018-08-30) allows a local attacker to elevate privileges. NOTE: this is unrelated to products from the glance.com and glance.net websites. | [
"cpe:2.3:a:mirametrix:glance:*:*:*:*:*:*:*:*"
]
|
|
CVE-2012-5127 | Integer overflow in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted WebP image. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*"
]
|
|
GHSA-rhw4-64w9-8wxw | vim is vulnerable to Stack-based Buffer Overflow | []
|
|
CVE-2012-0672 | WebKit in Apple iOS before 5.1.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [
"cpe:2.3:o:apple:iphone_os:*:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0:-:ipodtouch:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0.1:-:ipad:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0.1:-:iphone:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0.1:-:ipodtouch:*:*:*:*:*"
]
|
|
GHSA-f52h-j689-x786 | libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, directly modifies /etc/passwd, which allows local users to cause a denial of service (inconsistent file state) by causing an error during the modification. NOTE: this issue can be combined with CVE-2015-3245 to gain privileges. | []
|
|
GHSA-847h-627c-4g75 | An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference. | []
|
|
GHSA-4q76-q6w7-7fw8 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.1.1049. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the getAnnot method. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-6013. | []
|
|
CVE-2022-0323 | Improper Neutralization of Special Elements Used in a Template Engine in bobthecow/mustache.php | Improper Neutralization of Special Elements Used in a Template Engine in Packagist mustache/mustache prior to 2.14.1. | [
"cpe:2.3:a:mustache_project:mustache:*:*:*:*:*:php:*:*"
]
|
CVE-2019-14880 | A vulnerability was found in Moodle versions 3.7 before 3.7.3, 3.6 before 3.6.7, 3.5 before 3.5.9 and earlier. OAuth 2 providers who do not verify users' email address changes require additional verification during sign-up to reduce the risk of account compromise. | [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
]
|
|
GHSA-rfvw-5848-gxc5 | Silverstripe Flash Clipboard Reflected XSS | SilverStripe versions 3.0.0 until 4.3.5 and 4.4.4 are vulnerable to Flash Clipboard Reflected XSS. Versions 4.3.5 and 4.4.4 of `silverstripe/framework` and version 1.3.5 of `silverstripe/admin` contain a fix for this issue. | []
|
GHSA-vwxx-w68r-9cm2 | Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: CPA v1 V-2023-009. | []
|
|
GHSA-gwr4-m5cm-8f54 | Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file. | []
|
|
GHSA-8qjw-q35q-vjp5 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause an integrity impact to the downstream devices.When a peer sends a BGP update message which contains the aggregator attribute with an ASN value of zero (0), rpd accepts and propagates this attribute, which can cause issues for downstream BGP peers receiving this.This issue affects:Junos OS:All versions before 21.4R3-S6,22.2 versions before 22.2R3-S3,22.4 versions before 22.4R3;Junos OS Evolved:All versions before 21.4R3-S7-EVO,22.2 versions before 22.2R3-S4-EVO,22.4 versions before 22.4R3-EVO. | []
|
|
GHSA-rcjr-8rgf-qwcm | By abusing the 'install rpm url' command, an attacker can escape the restricted clish shell on affected versions of Ivanti MobileIron Core. This issue was fixed in version 11.1.0.0. | []
|
|
GHSA-fqq7-vx9f-v496 | DaveGamble/cJSON cJSON 1.7.8 is affected by: Improper Check for Unusual or Exceptional Conditions. The impact is: Null dereference, so attack can cause denial of service. The component is: cJSON_GetObjectItemCaseSensitive() function. The attack vector is: crafted json file. The fixed version is: 1.7.9 and later. | []
|
|
GHSA-23wx-cgxq-vpwx | Prototype Pollution in dset | All versions of `dset` prior to 3.1.2 are vulnerable to Prototype Pollution via `dset/merge` mode, as the `dset` function checks for prototype pollution by validating if the top-level path contains `__proto__`, `constructor` or `prototype`. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution. | []
|
CVE-2012-6044 | M-Player 0.4 allows remote attackers to cause a denial of service (crash) via a crafted MP3 file. | [
"cpe:2.3:a:mjsware:m-player:4.3:*:*:*:*:*:*:*"
]
|
|
CVE-2021-0497 | In memory management driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-183461320 | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
|
|
GHSA-x8q5-c934-chcc | Lexmark MX6500 LW75.JD.P296 and previous devices have Incorrect Access Control via the access control settings. | []
|
|
GHSA-gj63-vjmx-x788 | The vulnerability allows a low privileged (untrusted) application to
modify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged shell on the device without requiring the physical access through USB. | []
|
|
GHSA-8368-c7f9-h333 | The Red Hat Directory Server before 8.2.11-13 and 389 Directory Server do not properly restrict access to entity attributes, which allows remote authenticated users to obtain sensitive information via a search query for the attribute. | []
|
|
GHSA-wm9w-3fvv-87q8 | There is an insufficient input validation vulnerability in FusionCompute 8.0.0. Due to the input validation is insufficient, an attacker can exploit this vulnerability to upload any files to the device. Successful exploit may cause the service abnormal. | []
|
|
CVE-2022-1545 | It was possible to disclose details of confidential notes created via the API in Gitlab CE/EE affecting all versions from 13.2 prior to 14.8.6, 14.9 prior to 14.9.4, and 14.10 prior to 14.10.1 if an unauthorised project member was tagged in the note. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:enterprise:*:*:*"
]
|
|
GHSA-47xw-xh86-4m2j | Add2it Mailman Free 1.73 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the list parameter. | []
|
|
CVE-2017-9574 | The "KC Area Credit Union Mobile Banking" by K C Area Credit Union app 3.0.1 -- aka kc-area-credit-union-mobile-banking/id1097607736 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:meafinancial:kc_area_credit_union_mobile_banking:3.0.1:*:*:*:*:iphone_os:*:*"
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.