id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2025-4683 | MStore API – Create Native Android & iOS Apps On The Cloud <= 4.17.5 - Missing Authorization to Authenticated (Subscriber+) Posts Creation | The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the create_blog function in all versions up to, and including, 4.17.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new posts. | []
|
CVE-2012-0711 | Integer signedness error in the db2dasrrm process in the DB2 Administration Server (DAS) in IBM DB2 9.1 through FP11, 9.5 before FP9, and 9.7 through FP5 on UNIX platforms allows remote attackers to execute arbitrary code via a crafted request that triggers a heap-based buffer overflow. | [
"cpe:2.3:a:ibm:db2:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp10:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp11:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp2a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp3a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp4a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp6a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp7:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp7a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp8:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.1:fp9:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp2a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp3a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp3b:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp4a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp5:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp6a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp7:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.5:fp8:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:fp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:fp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:fp3:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:fp3a:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:fp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:fp5:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*"
]
|
|
GHSA-46mm-j866-6rxf | SQL injection vulnerability in the Sections module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the artid parameter in a viewarticle op. | []
|
|
CVE-2024-0622 | Local privilege escalation vulnerability could affect OpenText Operations Agent on Non-Windows platforms. | Local privilege escalation vulnerability affects OpenText Operations Agent product versions 12.15 and 12.20-12.25 when installed on Non-Windows platforms. The vulnerability could allow local privilege escalation.
| [
"cpe:2.3:a:microfocus:operations_agent:*:*:*:*:*:*:*:*"
]
|
CVE-2024-9526 | Stored XSS in Kubeflow Pipeline View | There exists a stored XSS Vulnerability in Kubeflow Pipeline View web UI. The Kubeflow Web UI allows to create new pipelines. When creating a new pipeline, it is possible to add a description. The description field allows html tags, which are not filtered properly. Leading to a stored XSS. We recommend upgrading past commit 930c35f1c543998e60e8d648ce93185c9b5dbe8d | [
"cpe:2.3:a:kubeflow:kubeflow_w_pipeline_view:*:*:*:*:*:*:*:*"
]
|
GHSA-xphm-wf5f-fcxm | An authentication bypass (account takeover) vulnerability exists in Premiumdatingscript 4.2.7.7 due to a weak password reset mechanism in requests\user.php. | []
|
|
CVE-2024-13827 | Razorpay Subscription Button Elementor Plugin <= 1.0.3 - Reflected Cross-Site Scripting via add_query_arg and remove_query_arg Functions | The Razorpay Subscription Button Elementor Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg() and remove_query_arg() functions without appropriate escaping on the URL in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | []
|
CVE-2002-0680 | Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228. | [
"cpe:2.3:a:goahead_software:goahead_webserver:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:goahead_software:goahead_webserver:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:goahead_software:goahead_webserver:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:goahead_software:goahead_webserver:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:goahead_software:goahead_webserver:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:orange_software:orange_web_server:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:montavista_software:hard_hat_linux:1.0:*:*:*:*:*:*:*"
]
|
|
CVE-2023-41117 | An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contain packages, standalone packages, and functions that run SECURITY DEFINER but are inadequately secured against search_path attacks. | [
"cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*"
]
|
|
CVE-2021-45116 | An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key. | [
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
]
|
|
GHSA-35v4-cfj4-wrvg | Cross-site request forgery (CSRF) vulnerability in the web-management interface in the fabric interconnect (FI) component in Cisco Unified Computing System (UCS) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCtg20755. | []
|
|
CVE-2023-28865 | Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR15, 4.0.0 SR05, 4.1.0 SR03, and 4.2.0 SR02 fails to validate the directory contents of certain directories (e.g., ensuring the expected hash sum) during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk. | [
"cpe:2.3:a:dieboldnixdorf:vynamic_security_suite:*:*:*:*:*:*:*:*"
]
|
|
GHSA-29w2-736q-xjjm | The Yahoo! Japan Yafuoku! application 4.3.0 and earlier for iOS and Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
|
|
GHSA-hjqw-r6v2-ghff | Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | []
|
|
CVE-2016-0955 | Cross-site scripting (XSS) vulnerability in Adobe Experience Manager (AEM) 6.1.0 allows remote authenticated users to inject arbitrary web script or HTML via a folder title field that is mishandled in the Deletion popup dialog. | [
"cpe:2.3:a:adobe:experience_manager:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
]
|
|
GHSA-5mh2-6fm3-6r87 | TsFtpSrv.exe in Broker FTP 6.1.0.0 allows remote attackers to cause a denial of service (CPU consumption) via an open idle connection. | []
|
|
CVE-2012-0518 | Unspecified vulnerability in the Oracle Application Server Single Sign-On component in Oracle Fusion Middleware 10.1.4.3.0 allows remote attackers to affect integrity via unknown vectors related to Redirects, a different vulnerability than CVE-2012-3175. | [
"cpe:2.3:a:oracle:fusion_middleware:10.1.4.3:*:*:*:*:*:*:*"
]
|
|
GHSA-38fw-5cvw-p8h6 | bgpd/bgp_label.c in FRRouting (FRR) before 8.5 attempts to read beyond the end of the stream during labeled unicast parsing. | []
|
|
CVE-2004-2352 | Cross-site scripting (XSS) vulnerability in GBook for PHP-Nuke 1.0 allows remote attackers to inject arbitrary web script or HTML via cookies that are stored in the $_COOKIE PHP variable, which is not cleansed by PHP-Nuke. | [
"cpe:2.3:a:martin_bauer:gbook:*:*:*:*:*:*:*:*",
"cpe:2.3:a:martin_bauer:gbook:1.4:*:*:*:*:*:*:*"
]
|
|
GHSA-393c-4g2g-74rm | An issue was discovered in Webmin 2.021. A Cross-site Scripting (XSS) Bypass vulnerability was discovered in the file upload functionality. Normally, the application restricts the upload of certain file types such as .svg, .php, etc., and displays an error message if a prohibited file type is detected. However, by following certain steps, an attacker can bypass these restrictions and inject malicious code. | []
|
|
GHSA-692g-7998-j2vj | In the Linux kernel, the following vulnerability has been resolved:tls: fix missing memory barrier in tls_initIn tls_init(), a write memory barrier is missing, and store-store
reordering may cause NULL dereference in tls_{setsockopt,getsockopt}.CPU0 CPU1// In tls_init()
// In tls_ctx_create()
ctx = kzalloc()
ctx->sk_proto = READ_ONCE(sk->sk_prot) -(1)// In update_sk_prot()
WRITE_ONCE(sk->sk_prot, tls_prots) -(2)In the above scenario, when (1) and (2) are reordered, (3) can observe
the NULL value of ctx->sk_proto, causing NULL dereference.To fix it, we rely on rcu_assign_pointer() which implies the release
barrier semantic. By moving rcu_assign_pointer() after ctx->sk_proto is
initialized, we can ensure that ctx->sk_proto are visible when
changing sk->sk_prot. | []
|
|
GHSA-hcjf-q57r-cmv3 | In music service, there is a missing permission check. This could lead to local denial of service in contacts service with no additional execution privileges needed. | []
|
|
GHSA-3c52-h4x3-2jhm | Out-of-bounds write in firmware for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 1.7.0.8 and some Intel(R) Ethernet 700 Series Controllers and Adapters before version 9.101 may allow a privileged user to potentially enable denial of service via local access. | []
|
|
CVE-2024-47292 | Path traversal vulnerability in the Bluetooth module
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
]
|
|
CVE-2020-4631 | IBM Spectrum Protect Plus 10.1.0 through 10.1.6 agent files, in non-default configurations, on Windows are assigned access to everyone with full control permissions, which could allow a local user to cause interruption of the service operations. IBM X-Force ID: 185372. | [
"cpe:2.3:a:ibm:spectrum_protect_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
|
GHSA-736r-p8hh-3qrw | An issue was discovered in idreamsoft iCMS V7.0.13. There is SQL Injection via the app/article/article.admincp.php _data_id parameter. | []
|
|
GHSA-x99q-39mr-2g4h | acpRunner ActiveX 1.2.5.0 allows remote attackers to execute arbitrary code via the (1) DownLoadURL, (2) SaveFilePath, and (3) Download ActiveX methods. | []
|
|
CVE-2021-25780 | An arbitrary file upload vulnerability has been identified in posts.php in Baby Care System 1.0. The vulnerability could be exploited by an remote attacker to upload content to the server, including PHP files, which could result in command execution and obtaining a shell. | [
"cpe:2.3:a:baby_care_system_project:baby_care_system:1.0:*:*:*:*:*:*:*"
]
|
|
GHSA-xj6g-jqvr-8wx7 | A use after free in Blink in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. | []
|
|
GHSA-rjm6-gxhw-jxmp | Use of hard-coded cryptographic key issue exists in AIPHONE IX SYSTEM, IXG SYSTEM, and System Support Software. A network-adjacent unauthenticated attacker may log in to SFTP service and obtain and/or manipulate unauthorized files. | []
|
|
CVE-2015-0203 | The qpidd broker in Apache Qpid 0.30 and earlier allows remote authenticated users to cause a denial of service (daemon crash) via an AMQP message with (1) an invalid range in a sequence set, (2) content-bearing methods other than message-transfer, or (3) a session-gap control before a corresponding session-attach. | [
"cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*"
]
|
|
GHSA-4h6f-87mh-p2fp | Pagure: XSS possible in file attachment endpoint | []
|
|
CVE-2025-49268 | WordPress Verge3D <= 4.9.4 - Broken Access Control Vulnerability | Missing Authorization vulnerability in Soft8Soft LLC Verge3D allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Verge3D: from n/a through 4.9.4. | []
|
GHSA-4qjp-889f-chf5 | Buffer overflow in Canary Labs Trend Web Server before 9.5.2 allows remote attackers to execute arbitrary code via a crafted TCP packet. | []
|
|
CVE-2023-51618 | D-Link DIR-X3260 prog.cgi SetWLanRadioSecurity Stack-Based Buffer Overflow Remote Code Execution Vulnerability | D-Link DIR-X3260 prog.cgi SetWLanRadioSecurity Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-X3260 routers. Authentication is required to exploit this vulnerability.
The specific flaw exists within the prog.cgi binary, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of a user-supplied string before copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21595. | [
"cpe:2.3:o:dlink:dir-x3260:1.04b01:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-x3260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-x3260:-:*:*:*:*:*:*:*"
]
|
CVE-2024-5246 | NETGEAR ProSAFE Network Management System Tomcat Remote Code Execution Vulnerability | NETGEAR ProSAFE Network Management System Tomcat Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.
The specific flaw exists within the product installer. The issue results from the use of a vulnerable version of Apache Tomcat. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22868. | [
"cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*"
]
|
CVE-2023-31546 | Cross Site Scripting (XSS) vulnerability in DedeBIZ v6.0.3 allows attackers to run arbitrary code via the search feature. | [
"cpe:2.3:a:dedebiz:dedebiz:6.0.3:*:*:*:*:*:*:*"
]
|
|
GHSA-h368-4vc2-fv34 | Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker uploads a specially crafted tar file to the HTTP /cgi-bin/upload_vpntar interface. | []
|
|
CVE-2021-47476 | comedi: ni_usb6501: fix NULL-deref in command paths | In the Linux kernel, the following vulnerability has been resolved:
comedi: ni_usb6501: fix NULL-deref in command paths
The driver uses endpoint-sized USB transfer buffers but had no sanity
checks on the sizes. This can lead to zero-size-pointer dereferences or
overflowed transfer buffers in ni6501_port_command() and
ni6501_counter_command() if a (malicious) device has smaller max-packet
sizes than expected (or when doing descriptor fuzz testing).
Add the missing sanity checks to probe(). | []
|
GHSA-wcfj-m59v-ggwc | Enphase Envoy versions D7.0.88 is vulnerable to a command injection exploit that may allow an attacker to execute root commands. | []
|
|
CVE-2013-1776 | sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal. NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*",
"cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*"
]
|
|
CVE-2006-4450 | usercp_avatar.php in PHPBB 2.0.20, when avatar uploading is enabled, allows remote attackers to use the server as a web proxy by submitting a URL to the avatarurl parameter, which is then used in an HTTP GET request. | [
"cpe:2.3:a:phpbb_group:phpbb:2.0.20:*:*:*:*:*:*:*"
]
|
|
CVE-2007-6497 | Hosting Controller 6.1 Hot fix 3.3 and earlier (1) allows remote attackers to change arbitrary user profiles via a request to Hosting/Addreseller.asp with modified loginname and email parameters; and (2) allows remote authenticated users to change a credit amount and increase a discount via an UpdateUser action to Accounts/AccountActions.asp with modified UserName, FullName, CreditLimit, and DefaultDiscount parameters, a related issue to CVE-2005-2219. | [
"cpe:2.3:a:hosting_controller:hosting_controller:*:*:*:*:*:*:*:*"
]
|
|
GHSA-gjvw-2pj9-fgr6 | In the Linux kernel, the following vulnerability has been resolved:staging: gpib: Fix Oops after disconnect in ni_usbIf the usb dongle is disconnected subsequent calls to the
driver cause a NULL dereference Oops as the bus_interface
is set to NULL on disconnect.This problem was introduced by setting usb_dev from the bus_interface
for dev_xxx messages.Previously bus_interface was checked for NULL only in the the functions
directly calling usb_fill_bulk_urb or usb_control_msg.Check for valid bus_interface on all interface entry points
and return -ENODEV if it is NULL. | []
|
|
GHSA-92p7-v927-945m | io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its allocation failed, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) and possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file. | []
|
|
GHSA-c7qx-5gcm-px6c | SAP NetWeaver Enterprise Portal - versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs over the network, resulting in reflected Cross-Site Scripting (XSS) vulnerability, therefore changing the scope of the attack. This leads to limited impact on confidentiality and integrity of data. | []
|
|
GHSA-2qv3-h9c7-9qcq | Windows WLAN AutoConfig Service Information Disclosure Vulnerability | []
|
|
GHSA-jm66-w89r-r4f4 | WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. | []
|
|
CVE-2025-26540 | WordPress Helloprint Plugin <= 2.0.7 - Arbitrary File Deletion vulnerability | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Helloprint allows Path Traversal. This issue affects Helloprint: from n/a through 2.0.7. | []
|
GHSA-rhf5-jmh4-q5rv | Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS). | []
|
|
CVE-2018-17035 | UCMS 1.4.6 has SQL injection during installation via the install/index.php mysql_dbname parameter. | [
"cpe:2.3:a:ucms_project:ucms:1.4.6:*:*:*:*:*:*:*"
]
|
|
CVE-2015-6075 | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6068, CVE-2015-6072, CVE-2015-6073, CVE-2015-6077, CVE-2015-6079, CVE-2015-6080, and CVE-2015-6082. | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
]
|
|
CVE-2022-37052 | A reachable Object::getString assertion in Poppler 22.07.0 allows attackers to cause a denial of service due to a failure in markObject. | [
"cpe:2.3:a:freedesktop:poppler:22.07.0:*:*:*:*:*:*:*"
]
|
|
CVE-2020-12012 | Baxter ExactaMix EM 2400 & EM 1200, Versions ExactaMix EM2400 Versions 1.10, 1.11, 1.13, 1.14, ExactaMix EM1200 Versions 1.1, 1.2, 1.4, 1.5, Baxter ExactaMix EM 2400 Versions 1.10, 1.11, and 1.13, and ExactaMix EM1200 Versions 1.1, 1.2, and 1.4 have hard-coded administrative account credentials for the ExactaMix application. Successful exploitation of this vulnerability may allow an attacker with physical access to gain unauthorized access to view/update system configuration or data. This could impact confidentiality and integrity of the system and risk exposure of sensitive information including PHI. | [
"cpe:2.3:o:baxter:em2400_firmware:1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:baxter:em2400_firmware:1.11:*:*:*:*:*:*:*",
"cpe:2.3:o:baxter:em2400_firmware:1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:baxter:em2400_firmware:1.14:*:*:*:*:*:*:*",
"cpe:2.3:h:baxter:em2400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:baxter:em1200_firmware:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:baxter:em1200_firmware:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:baxter:em1200_firmware:1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:baxter:em1200_firmware:1.5:*:*:*:*:*:*:*",
"cpe:2.3:h:baxter:em1200:-:*:*:*:*:*:*:*"
]
|
|
GHSA-4xqh-59xq-qxj9 | The QS Dark Mode Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | []
|
|
CVE-2024-31451 | Limited file write in routes.py (GHSL-2023-250) | DocsGPT is a GPT-powered chat for documentation. DocsGPT is vulnerable to unauthenticated limited file write in routes.py. This vulnerability is fixed in 0.8.1. | [
"cpe:2.3:a:arc53:docsgpt:-:*:*:*:*:*:*:*"
]
|
GHSA-vv36-cxp3-6vh8 | Multiple directory traversal vulnerabilities in AGENTS/index.php in NetArt MEDIA Real Estate Portal 2.0 allow remote emote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) folder and (2) action parameters. | []
|
|
CVE-2008-4639 | jhead.c in Matthias Wandel jhead 2.84 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file. | [
"cpe:2.3:a:sentex:jhead:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.4-1:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.4-2:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:sentex:jhead:2.82:*:*:*:*:*:*:*"
]
|
|
CVE-2017-7694 | Remote Code Execution vulnerability in symphony/content/content.blueprintsdatasources.php in Symphony CMS through 2.6.11 allows remote attackers to execute code and get a webshell from the back-end. The attacker must be authenticated and enter PHP code in the datasource editor or event editor. | [
"cpe:2.3:a:getsymphony:symphony:*:*:*:*:*:*:*:*"
]
|
|
CVE-2024-41864 | Adobe Substance 3D Designer ICO Parsing Out-Of-Bounds Write Vulnerability | Substance3D - Designer versions 13.1.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:substance_3d_designer:*:*:*:*:*:*:*:*"
]
|
GHSA-2888-p547-jrjr | Blink routers BL-WR9000 V2.4.9 , BL-AC2100_AZ3 V1.0.4, BL-X10_AC8 v1.0.5 , BL-LTE300 v1.2.3, BL-F1200_AT1 v1.0.0, BL-X26_AC8 v1.2.8, BLAC450M_AE4 v4.0.0 and BL-X26_DA3 v1.2.7 were discovered to contain multiple command injection vulnerabilities via the dns1 and dns2 parameters in the bs_SetDNSInfo function. | []
|
|
GHSA-39w4-x968-7pjw | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-4808, CVE-2015-6013, CVE-2015-6014, and CVE-2016-0432. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this issue is a stack-based buffer overflow in Oracle Outside In 8.5.2 and earlier, which allows remote attackers to execute arbitrary code via a crafted Paradox DB file. | []
|
|
CVE-2022-48453 | In camera driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed | [
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*"
]
|
|
GHSA-rf3q-qph6-mx79 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | []
|
|
GHSA-3785-m3x6-8q8c | IBM Maximo Application Suite 8.10, 8.11, and 9.0 - Monitor Component stores source code on the web server that could aid in further attacks against the system. | []
|
|
CVE-2013-4630 | Stack-based buffer overflow on Huawei AR 150, 200, 1200, 2200, and 3200 routers, when SNMPv3 debugging is enabled, allows remote attackers to execute arbitrary code via malformed SNMPv3 requests. | [
"cpe:2.3:h:huawei:ar_1200:v200r001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_1200:v200r002:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_1200:v200r003:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_150:v200r001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_150:v200r002:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_150:v200r003:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_200:v200r001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_200:v200r002:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_200:v200r003:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_2200:v200r001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_2200:v200r002:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_2200:v200r003:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_3200:v200r001:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_3200:v200r002:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar_3200:v200r003:*:*:*:*:*:*:*"
]
|
|
CVE-2020-5004 | IBM Jazz Foundation products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192957. | [
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_requirements_quality_assistant_on-premises:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_workflow_management:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*"
]
|
|
GHSA-662j-935h-ph4p | Vulnerability in the Oracle Common Applications Calendar component of Oracle E-Business Suite (subcomponent: Applications Calendar). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Common Applications Calendar. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Common Applications Calendar, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Common Applications Calendar accessible data as well as unauthorized update, insert or delete access to some of Oracle Common Applications Calendar accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | []
|
|
GHSA-9ffp-pxf7-q2mx | The IRM Newsroom plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'irmeventlist' shortcode in all versions up to, and including, 1.2.17 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
|
|
GHSA-65r5-237m-62hm | Cost Calculator Builder Pro plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to 3.1.72, via the send_demo_webhook() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | []
|
|
CVE-2020-12328 | Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. | [
"cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*"
]
|
|
CVE-2022-34064 | The Zibal package in PyPI v1.0.0 was discovered to contain a code execution backdoor. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges. | [
"cpe:2.3:a:zibal_project:zibal:1.0.0:*:*:*:*:pypi:*:*"
]
|
|
GHSA-qr2j-wrhx-4829 | Go Ethereum Improper Input Validation | In Go Ethereum (aka geth) before 1.8.14, TraceChain in eth/api_tracer.go does not verify that the end block is after the start block.Specific Go Packages Affectedgithub.com/ethereum/go-ethereum/eth | []
|
CVE-2022-38038 | Windows Kernel Elevation of Privilege Vulnerability | Windows Kernel Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
]
|
CVE-2024-37186 | An os command injection vulnerability exists in the adm.cgi set_ledonoff() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | []
|
|
GHSA-6v7m-rgwp-qcr4 | A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments. | []
|
|
GHSA-38pg-fhjw-6gv5 | With administrator or admin privileges the application can be tricked into overwriting files in app_data/Config folder, e.g. the systemsettings.xml file. THis is possible in SmarterTrack v100.0.8019.14010 | []
|
|
GHSA-qvfx-6875-jf8q | Multiple cross-site scripting (XSS) vulnerabilities in JExperts Channel Platform 5.0.33_CCB allow remote attackers to inject arbitrary web script or HTML via the (1) usuario.nome variable in an editarUsuario action to usuario.do or (2) titulo.form variable in a novoChamado action to ticket.do. | []
|
|
GHSA-2973-f65x-7j53 | Denial-of-service (DoS) vulnerability exists in NetBIOS service of HMI GC-A2 series. If a remote unauthenticated attacker sends a specially crafted packets to specific ports, a denial-of-service (DoS) condition may occur. | []
|
|
GHSA-q9x9-3h5c-87j4 | A Security Bypass vulnerability exists in the activate.asp page in Arial Software Campaign Enterprise 11.0.551, which could let a remote malicious user modify the SerialNumber field. | []
|
|
CVE-2010-3666 | TYPO3 before 4.1.14, 4.2.x before 4.2.13, 4.3.x before 4.3.4 and 4.4.x before 4.4.1 contains insecure randomness in the uniqid function. | [
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
]
|
|
GHSA-f3c9-9prg-x3q9 | PHPJabbers Food Delivery Script v3.0 is vulnerable to SQL Injection in the "column" parameter of index.php. | []
|
|
CVE-2022-25037 | An issue in wanEditor v4.7.11 and fixed in v.4.7.12 and v.5 was discovered to contain a cross-site scripting (XSS) vulnerability via the image upload function. | [
"cpe:2.3:a:wangeditor:wangeditor:*:*:*:*:*:*:*:*"
]
|
|
GHSA-33w6-hvmq-gh4x | diffoscope Path Traversal vulnerability | diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file, such as ../.ssh/id_rsa, may be disclosed to an attacker. This occurs because the value of the gpg --use-embedded-filenames option is trusted. | []
|
CVE-2023-3561 | GZ Scripts PHP GZ Hotel Booking Script load.php cross site scripting | A vulnerability, which was classified as problematic, was found in GZ Scripts PHP GZ Hotel Booking Script 1.8. This affects an unknown part of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-233355. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:gzscripts:php_gz_hotel_booking_script:1.8:*:*:*:*:*:*:*"
]
|
GHSA-9cg4-699v-g366 | The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption. | []
|
|
GHSA-vj47-xvv7-vcr5 | Deserialization of Untrusted Data vulnerability in Master Slider Master Slider Pro.This issue affects Master Slider Pro: from n/a through 3.6.5. | []
|
|
CVE-2017-13725 | The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print(). | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
|
|
CVE-2023-43642 | Missing upper bound check on chunk length in snappy-java | snappy-java is a Java port of the snappy, a fast C++ compresser/decompresser developed by Google. The SnappyInputStream was found to be vulnerable to Denial of Service (DoS) attacks when decompressing data with a too large chunk size. Due to missing upper bound check on chunk length, an unrecoverable fatal error can occur. All versions of snappy-java including the latest released version 1.1.10.3 are vulnerable to this issue. A fix has been introduced in commit `9f8c3cf74` which will be included in the 1.1.10.4 release. Users are advised to upgrade. Users unable to upgrade should only accept compressed data from trusted sources. | [
"cpe:2.3:a:xerial:snappy-java:*:*:*:*:*:*:*:*"
]
|
CVE-2024-11568 | IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | IrfanView DXF File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24872. | [
"cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x64:*",
"cpe:2.3:a:irfanview:irfanview:4.67:*:*:*:*:*:x86:*"
]
|
GHSA-9xxw-f9v5-7xhw | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the richValue property of a Field object within AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8272. | []
|
|
GHSA-q55j-hjhh-8278 | The Jupiter X Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File inclusion in all versions up to, and including, 4.8.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the page with the included SVG file. | []
|
|
GHSA-gx3x-r4gq-w2r8 | A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268765 was assigned to this vulnerability. | []
|
|
CVE-2011-3714 | ClanSphere 2010.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by mods/board/attachment.php. | [
"cpe:2.3:a:csphere:clansphere:2010.0:*:*:*:*:*:*:*"
]
|
|
CVE-2012-5078 | Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2012-5080. | [
"cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*"
]
|
|
CVE-2011-3789 | phpwcms 1.4.7 r412 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by template/inc_script/frontend_render/disabled/majonavi.php and certain other files. | [
"cpe:2.3:a:phpwcms:phpwcms:1.4.7:r412:*:*:*:*:*:*"
]
|
|
GHSA-cqgq-69xw-jf2x | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Josh Leuze Meteor Slides allows Stored XSS.This issue affects Meteor Slides: from n/a through 1.5.7. | []
|
|
CVE-2007-5952 | Cross-site scripting (XSS) vulnerability in admin/index.php in Helios Calendar 1.2.1 Beta allows remote attackers to inject arbitrary web script or HTML via the username parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:helioscalendar:helios_calendar:1.2.1_beta:*:*:*:*:*:*:*"
]
|
|
GHSA-p7x7-rwp6-7mfx | Percona XtraBackup before 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when --history is passed at run time, this command line is also written to the PERCONA_SCHEMA.xtrabackup_history table. | []
|
|
CVE-2011-2249 | Unspecified vulnerability in Oracle Solaris 8, 9, and 10 allows remote authenticated users to affect availability, related to TCP/IP. | [
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*"
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.