id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2021-1146 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device. Cisco has not released software updates that address these vulnerabilities. | [
"cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
]
|
CVE-2013-3765 | Unspecified vulnerability in Oracle Solaris 11 allows local users to affect availability via unknown vectors related to Kernel/VM. | [
"cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*"
]
|
|
GHSA-49mv-vfcp-8gg9 | Moodle vulnerable to SQL Injection | A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions. | []
|
GHSA-4qg3-w6pq-6h3p | Missing Authorization vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Forms by Cimatti: from n/a through 1.5.7. | []
|
|
GHSA-fc6c-wh46-2q9r | In the Linux kernel, the following vulnerability has been resolved:nfs: Fix KMSAN warning in decode_getfattr_attrs()Fix the following KMSAN warning:CPU: 1 UID: 0 PID: 7651 Comm: cp Tainted: G B
Tainted: [B]=BAD_PAGE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)=====================================================
BUG: KMSAN: uninit-value in decode_getfattr_attrs+0x2d6d/0x2f90
decode_getfattr_attrs+0x2d6d/0x2f90
decode_getfattr_generic+0x806/0xb00
nfs4_xdr_dec_getattr+0x1de/0x240
rpcauth_unwrap_resp_decode+0xab/0x100
rpcauth_unwrap_resp+0x95/0xc0
call_decode+0x4ff/0xb50
__rpc_execute+0x57b/0x19d0
rpc_execute+0x368/0x5e0
rpc_run_task+0xcfe/0xee0
nfs4_proc_getattr+0x5b5/0x990
__nfs_revalidate_inode+0x477/0xd00
nfs_access_get_cached+0x1021/0x1cc0
nfs_do_access+0x9f/0xae0
nfs_permission+0x1e4/0x8c0
inode_permission+0x356/0x6c0
link_path_walk+0x958/0x1330
path_lookupat+0xce/0x6b0
filename_lookup+0x23e/0x770
vfs_statx+0xe7/0x970
vfs_fstatat+0x1f2/0x2c0
__se_sys_newfstatat+0x67/0x880
__x64_sys_newfstatat+0xbd/0x120
x64_sys_call+0x1826/0x3cf0
do_syscall_64+0xd0/0x1b0
entry_SYSCALL_64_after_hwframe+0x77/0x7fThe KMSAN warning is triggered in decode_getfattr_attrs(), when calling
decode_attr_mdsthreshold(). It appears that fattr->mdsthreshold is not
initialized.Fix the issue by initializing fattr->mdsthreshold to NULL in
nfs_fattr_init(). | []
|
|
CVE-2025-49137 | Hax CMS Stored Cross-Site Scripting vulnerability | HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.0, the application does not sufficiently sanitize user input, allowing for the execution of arbitrary JavaScript code. The 'saveNode' and 'saveManifest' endpoints take user input and store it in the JSON schema for the site. This content is then rendered in the generated HAX site. Although the application does not allow users to supply a `script` tag, it does allow the use of other HTML tags to run JavaScript. Version 11.0.0 fixes the issue. | []
|
CVE-2006-4458 | Directory traversal vulnerability in calendar/inc/class.holidaycalc.inc.php in phpGroupWare 0.9.16.010 and earlier allows remote attackers to include arbitrary local files via a .. (dot dot) sequence and trailing null (%00) byte in the GLOBALS[phpgw_info][user][preferences][common][country] parameter. | [
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.16.010:*:*:*:*:*:*:*"
]
|
|
CVE-2023-32581 | WordPress WP-Chatbot for Messenger plugin <= 4.7 - Broken Access Control | Missing Authorization vulnerability in MobileMonkey WP-Chatbot for Messenger allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP-Chatbot for Messenger: from n/a through 4.7. | []
|
CVE-2022-38412 | Adobe Animate SVG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | Adobe Animate version 21.0.11 (and earlier) and 22.0.7 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
CVE-2014-6383 | The stateless firewall in Juniper Junos 13.3R3, 14.1R1, and 14.1R2, when using Trio-based PFE modules, does not properly match ports, which might allow remote attackers to bypass firewall rule. | [
"cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*"
]
|
|
CVE-2007-6365 | Cross-site scripting (XSS) vulnerability in modules/ecal/display.php in the Event Calendar in bcoos 1.0.10 allows remote attackers to inject arbitrary web script or HTML via the month parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: the day and year vectors are covered by CVE-2007-6274. | [
"cpe:2.3:a:bcoos:event_calendar:1.0.10:*:*:*:*:*:*:*"
]
|
|
CVE-2015-3805 | Apple iOS before 8.4.1 and OS X before 10.10.5 allow local users to bypass a code-signing protection mechanism via a crafted Mach-O file, a different vulnerability than CVE-2015-3802. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
|
|
CVE-2024-9353 | Popularis Extra <= 1.2.6 - Reflected Cross-Site Scripting | The Popularis Extra plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [
"cpe:2.3:a:themes4wp:popularis_extra:*:*:*:*:*:wordpress:*:*"
]
|
CVE-2018-3108 | Vulnerability in the Oracle Fusion Middleware component of Oracle Fusion Middleware (subcomponent: Oracle Notification Service). Supported versions that are affected are 12.2.1.2 and 12.2.1.3. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Fusion Middleware accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:fusion_middleware:12.2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.2.1.3:*:*:*:*:*:*:*"
]
|
|
CVE-2017-9582 | The "BNB Mobile Banking" by Brady National Bank app 3.0.0 -- aka bnb-mobile-banking/id674215747 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:bradynationalbank:bnb_mobile_banking:3.0.0:*:*:*:*:iphone_os:*:*"
]
|
|
CVE-2020-24430 | Acrobat Pro DC Use-After-Free vulnerability Could Lead to Arbitrary Code Execution | Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a use-after-free vulnerability when handling malicious JavaScript. This vulnerability could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
GHSA-xp45-33wm-mg9r | BigTree-CMS contains a Cross Site Scripting (XSS) vulnerability in /users/create that can result in The low-privileged users can use this vulnerability to attack high-privileged(Developer) users.. This attack appear to be exploitable via no. This vulnerability appears to have been fixed in after commit b652cfdc14d0670c81ac4401ad5a04376745c279. | []
|
|
CVE-2023-35959 | Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns `.ghw` decompression. | [
"cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*"
]
|
|
GHSA-36hv-fqvj-3wq3 | The PMA_Bookmark_get function in libraries/bookmark.lib.php in phpMyAdmin 2.11.x before 2.11.11.3, and 3.3.x before 3.3.9.2, does not properly restrict bookmark queries, which makes it easier for remote authenticated users to trigger another user's execution of a SQL query by creating a bookmark. | []
|
|
GHSA-wgc7-m7cp-7vfg | The PHP package in Slackware 8.1, 9.0, and 9.1, when linked against a static library, includes /tmp in the search path, which allows local users to execute arbitrary code as the PHP user by inserting shared libraries into the appropriate path. | []
|
|
CVE-2017-14321 | Multiple cross-site scripting (XSS) vulnerabilities in the administrative interface in Mirasvit Helpdesk MX before 1.5.3 allow remote attackers to inject arbitrary web script or HTML via the (1) customer name or (2) subject in a ticket. | [
"cpe:2.3:a:mirasvit:helpdesk_mx:*:*:*:*:*:*:*:*"
]
|
|
CVE-2023-46175 | IBM Cloud Pak for Multicloud Management information disclosure | IBM Cloud Pak for Multicloud Management 2.3 through 2.3 FP8 stores user credentials in a log file plain clear text which can be read by a privileged user. | [
"cpe:2.3:a:ibm:cloud_pak_for_multicloud_management_monitoring:2.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cloud_pak_for_multicloud_management_monitoring:2.3.0:fixpack8:*:*:*:*:*:*"
]
|
GHSA-qg22-qxjf-9f4f | Husdawg, LLC Systems Requirements Lab 3, as used by Instant Expert Analysis, allows remote attackers to force the download and execution of arbitrary programs via by specifiying a malicious website argument to the Init method in (1) a certain ActiveX control (sysreqlab2.cab, sysreqlab.dll, sysreqlabsli.dll, or sysreqlab2.dll) and (2) a certain Java applet in RLApplet.class in sysreqlab2.jar or sysreqlab.jar. | []
|
|
GHSA-6f7g-g6qv-mmrw | Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | []
|
|
GHSA-qwf3-gf6f-rrw8 | Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to obtain sensitive information via a crafted CIP packet. | []
|
|
CVE-2013-7195 | PHPFox 3.7.3 and 3.7.4 allows remote authenticated users to bypass intended "Only Me" restrictions and "like" a publication via a request that specifies the ID for the publication. | [
"cpe:2.3:a:phpfox:phpfox:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpfox:phpfox:3.7.4:*:*:*:*:*:*:*"
]
|
|
CVE-2023-0568 | Array overrun in common path resolve code | In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
]
|
GHSA-r73h-f7r4-p3vq | Unspecified vulnerability in the AirPcap support in Wireshark (formerly Ethereal) 0.99.3 has unspecified attack vectors related to WEP key parsing. | []
|
|
GHSA-vw3m-pvf6-gxw8 | In the Linux kernel, the following vulnerability has been resolved:block: fix deadlock between bd_link_disk_holder and partition scan'open_mutex' of gendisk is used to protect open/close block devices. But
in bd_link_disk_holder(), it is used to protect the creation of symlink
between holding disk and slave bdev, which introduces some issues.When bd_link_disk_holder() is called, the driver is usually in the process
of initialization/modification and may suspend submitting io. At this
time, any io hold 'open_mutex', such as scanning partitions, can cause
deadlocks. For example, in raid:T1 T2
bdev_open_by_dev
lock open_mutex [1]
...
efi_partition
...
md_submit_bio
md_ioctl mddev_syspend
-> suspend all io
md_add_new_disk
bind_rdev_to_array
bd_link_disk_holder
try lock open_mutex [2]
md_handle_request
-> wait mddev_resumeT1 scan partition, T2 add a new device to raid. T1 waits for T2 to resume
mddev, but T2 waits for open_mutex held by T1. Deadlock occurs.Fix it by introducing a local mutex 'blk_holder_mutex' to replace
'open_mutex'. | []
|
|
CVE-2018-20900 | cPanel before 71.9980.37 allows stored XSS in the YUM autorepair functionality (SEC-399). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
]
|
|
GHSA-qqq7-ff89-5hxp | Unspecified vulnerability in the Agile Core component in Oracle Supply Chain Products Suite 9.3.0.2 and 9.3.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Folders, Files & Attachments, a different vulnerability than CVE-2010-4429. | []
|
|
GHSA-w2r7-j937-rrj3 | Use of Hard-coded Credentials vulnerability in Utarit Information Technologies SoliPay Mobile App allows Read Sensitive Strings Within an Executable.This issue affects SoliPay Mobile App: before 5.0.8. | []
|
|
GHSA-jcmr-v7r5-m28x | A vulnerability, which was classified as critical, has been found in SourceCodester Accounts Manager App 1.0. This issue affects some unknown processing of the file /endpoint/delete-account.php. The manipulation of the argument account leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
|
|
GHSA-wm77-q74p-5763 | Path Traversal in superstatic | Affected of `superstatic` are vulnerable to path traversal when used on Windows.Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0).RecommendationUpdate to version 5.0.2 or later. | []
|
CVE-2022-24132 | phpshe V1.8 is affected by a denial of service (DoS) attack in the registry's verification code, which can paralyze the target service. | [
"cpe:2.3:a:phpshe:phpshe:1.8:*:*:*:*:*:*:*"
]
|
|
GHSA-xjj6-f689-gwr9 | Dell EMC SCG Policy Manager, versions from 5.10 to 5.12, contain(s) a contain a Hard-coded Cryptographic Key vulnerability. An attacker with the knowledge of the hard-coded sensitive information, could potentially exploit this vulnerability to login to the system to gain admin privileges. | []
|
|
GHSA-5gvg-fggq-r6f6 | A Missing Release of Memory after Effective Lifetime vulnerability in Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS).In a subscriber management scenario continuous subscriber logins will trigger a memory leak and eventually lead to an FPC crash and restart.This issue affects Junos OS on MX Series:All version before 21.2R3-S6,21.4 versions before 21.4R3-S6,22.1 versions before 22.1R3-S5,22.2 versions before 22.2R3-S3,22.3 versions before 22.3R3-S2,22.4 versions before 22.4R3,23.2 versions before 23.2R2. | []
|
|
GHSA-89wq-qcf5-vx73 | SQL injection vulnerability in admin/index2.asp in GOUAE DWD Realty allows remote attackers to execute arbitrary SQL commands via the uname parameter, a different vector than CVE-2007-6163. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
|
|
CVE-2024-20102 | In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998892; Issue ID: MSV-1601. | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt3605:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*"
]
|
|
GHSA-8mgf-crrg-6qxp | Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access. | []
|
|
GHSA-c5c4-6w52-p8qr | Adobe Illustrator version 25.2.3 (and earlier) is affected by an Out-of-bounds Write vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
|
|
CVE-2024-26215 | DHCP Server Service Denial of Service Vulnerability | DHCP Server Service Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
]
|
GHSA-7fmj-f47p-w477 | Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035 | []
|
|
CVE-2020-13699 | TeamViewer Desktop for Windows before 15.8.3 does not properly quote its custom URI handlers. A malicious website could launch TeamViewer with arbitrary parameters, as demonstrated by a teamviewer10: --play URL. An attacker could force a victim to send an NTLM authentication request and either relay the request or capture the hash for offline password cracking. This affects teamviewer10, teamviewer8, teamviewerapi, tvchat1, tvcontrol1, tvfiletransfer1, tvjoinv8, tvpresent1, tvsendfile1, tvsqcustomer1, tvsqsupport1, tvvideocall1, and tvvpn1. The issue is fixed in 8.0.258861, 9.0.258860, 10.0.258873, 11.0.258870, 12.0.258869, 13.2.36220, 14.2.56676, 14.7.48350, and 15.8.3. | [
"cpe:2.3:a:teamviewer:teamviewer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
|
GHSA-hjh6-cq5x-wfcq | The Frontend component in Sophos UTM with firmware 9.405-5 and earlier allows local administrators to obtain sensitive password information by reading the "value" field of the SMTP user settings in the notifications configuration tab. | []
|
|
CVE-2016-3205 | The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3206 and CVE-2016-3207. | [
"cpe:2.3:a:microsoft:jscript:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:vbscript:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
]
|
|
GHSA-7hfx-h3j3-rwq4 | D-Tale server-side request forgery through Web uploads | ImpactUsers hosting D-Tale publicly can be vulnerable to server-side request forgery (SSRF) allowing attackers to access files on the server.PatchesUsers should upgrade to version 3.9.0 where the "Load From the Web" input is turned off by default. You can find out more information on how to turn it back on [here](https://github.com/man-group/dtale?tab=readme-ov-file#load-data--sample-datasets)WorkaroundsThe only workaround for versions earlier than 3.9.0 is to only host D-Tale to trusted users.ReferencesSee "Load Data & Sample Datasets" [documentation](https://github.com/man-group/dtale?tab=readme-ov-file#load-data--sample-datasets) | []
|
GHSA-w9r7-3rj5-pq9r | Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | []
|
|
GHSA-gqmr-r75p-994g | TechyTalk Quick Chat WordPress Plugin All up to the latest is affected by: SQL Injection. The impact is: Access to the database. The component is: like_escape is used in Quick-chat.php line 399. The attack vector is: Crafted ajax request. | []
|
|
CVE-2009-2871 | Unspecified vulnerability in Cisco IOS 12.2 and 12.4, when SSLVPN sessions, SSH sessions, or IKE encrypted nonces are enabled, allows remote attackers to cause a denial of service (device reload) via a crafted encrypted packet, aka Bug ID CSCsq24002. | [
"cpe:2.3:o:cisco:ios:12.2xna:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xnb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xnc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xnd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*"
]
|
|
GHSA-ggrr-j79r-pq3m | SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. | []
|
|
GHSA-wfw3-f86p-vm65 | /servlets/ajax_file_upload?fieldName=binary3 in dotCMS 5.1.1 allows XSS and HTML Injection. | []
|
|
GHSA-x2wv-xwwr-px62 | Improper privilege management vulnerability in McAfee Consumer Product Removal Tool prior to version 10.4.128 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code, through not correctly checking the integrity of the configuration file. | []
|
|
CVE-2023-35719 | ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability | ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of ManageEngine ADSelfService Plus. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Password Reset Portal used by the GINA client. The issue results from the lack of proper authentication of data received via HTTP. An attacker can leverage this vulnerability to bypass authentication and execute code in the context of SYSTEM. Was ZDI-CAN-17009. | [
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6122:*:*:*:*:*:*"
]
|
CVE-2014-7577 | The B&H Photo Video Pro Audio (aka com.bhphoto) application 2.5.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:bandh:b\\&h_photo_video_pro_audio:2.5.1:*:*:*:*:android:*:*"
]
|
|
GHSA-q7p4-5vmg-rr2r | A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain access to information that they are not authorized to access and make changes to the system that they are not authorized to make. | []
|
|
CVE-2016-1995 | HPE System Management Homepage before 7.5.4 allows remote attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*"
]
|
|
GHSA-fxj2-2fcx-f575 | A vulnerability classified as problematic was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file cashconfirm.php of the component POST Parameter Handler. The manipulation of the argument transactioncode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223129 was assigned to this vulnerability. | []
|
|
GHSA-69r6-frgh-wc7c | Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus. | []
|
|
GHSA-xx28-7x9q-6ch2 | index.php in myBloggie 2.1.1 allows remote attackers to obtain sensitive information via an invalid post_id parameter, which reveals the path in an error message. | []
|
|
CVE-2024-12481 | cjbi wetech-cms UserDao.java findUser sql injection | A vulnerability was found in cjbi wetech-cms 1.0/1.1/1.2. It has been declared as critical. Affected by this vulnerability is the function findUser of the file wetech-cms-master\wetech-core\src\main\java\tech\wetech\cms\dao\UserDao.java. The manipulation of the argument searchValue/gId/rId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:cjbi:wetech-cms:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cjbi:wetech-cms:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cjbi:wetech-cms:1.2:*:*:*:*:*:*:*"
]
|
CVE-2023-22661 | Buffer overflow in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:server_system_d50tnp1mhcrlc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_d50tnp1mhcrlc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_d50tnp1mhcpac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_d50tnp1mhcpac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_d50tnp2mhsvac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_d50tnp2mhsvac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_d50tnp2mhstac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_d50tnp2mhstac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_d50tnp1mhcrac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_d50tnp1mhcrac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_d50tnp2mfalac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_d50tnp2mfalac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_m50cyp1ur204_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_m50cyp1ur204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_m50cyp1ur212_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_m50cyp1ur212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_m50cyp2ur312_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_m50cyp2ur312:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:server_system_m50cyp2ur208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:server_system_m50cyp2ur208:-:*:*:*:*:*:*:*"
]
|
|
GHSA-ggpf-24jw-3fcw | CVE-2025-24357 Malicious model remote code execution fix bypass with PyTorch < 2.6.0 | Descriptionhttps://github.com/vllm-project/vllm/security/advisories/GHSA-rh4j-5rhw-hr54 reported a vulnerability where loading a malicious model could result in code execution on the vllm host. The fix applied to specify `weights_only=True` to calls to `torch.load()` did not solve the problem prior to PyTorch 2.6.0.PyTorch has issued a new CVE about this problem: https://github.com/advisories/GHSA-53q9-r3pm-6pq6This means that versions of vLLM using PyTorch before 2.6.0 are vulnerable to this problem.Background KnowledgeWhen users install VLLM according to the official manual
But the version of PyTorch is specified in the requirements. txt file
So by default when the user install VLLM, it will install the PyTorch with version 2.5.1
In CVE-2025-24357, weights_only=True was used for patching, but we know this is not secure.
Because we found that using Weights_only=True in pyTorch before 2.5.1 was unsafeHere, we use this interface to prove that it is not safe.
Fixupdate PyTorch version to 2.6.0CreditThis vulnerability was found By Ji'an Zhou and Li'shuo Song | []
|
GHSA-pvp4-m7wj-rwq3 | Appspace 6.2.4 is affected by Incorrect Access Control via the Appspace Web Portal password reset page. | []
|
|
CVE-2006-3239 | SQL injection vulnerability in message.php in VBZooM 1.11 and earlier allows remote attackers to execute arbitrary SQL commands via the UserID parameter. | [
"cpe:2.3:a:vbzoom:vbzoom:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:vbzoom:vbzoom:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:vbzoom:vbzoom:1.11:*:*:*:*:*:*:*"
]
|
|
GHSA-r27m-m9vv-f47r | Multiple cross-site scripting (XSS) vulnerabilities in Jupiter CMS allow remote attackers to inject arbitrary web script or HTML via the (1) language[Admin name] and (2) language[Admin back] parameters in (a) modules/blocks.php; the (3) language[Register title] and (4) language[Register title2] parameters in (b) modules/register.php; the (5) language[Mass-Email form title], (6) language[Mass-Email form desc], (7) language[Mass-Email form desc2] (8) language[Mass-Email form desc3], and (9) language[Mass-Email form desc4] parameters in (c) modules/mass-email.php; the (10) language[Forgotten title], (11) language[Forgotten desc], (12) language[Forgotten desc2], (13) language[Forgotten desc3], (14) language[Forgotten desc4], and (15) language[Forgotten desc5] parameters in (d) modules/register.php; and the (16) language[Search view desc], (17) language[Search view desc2], (18) language[Search view desc3], (19) language[Search view desc4], (20) language[Search view desc5], (21) language[Search view desc6], (22) language[Search view desc7], and (23) language[Search view desc8] parameters in (e) modules/search.php. | []
|
|
GHSA-33f9-4h6q-m86q | An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSOAR before 7.2.1 allows an authenticated attacker to execute unauthorized code or commands via crafted HTTP GET requests. | []
|
|
CVE-2024-31379 | WordPress Smash Balloon Social Post Feed plugin <= 4.2.1 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Smash Balloon Smash Balloon Social Post Feed.This issue affects Smash Balloon Social Post Feed: from n/a through 4.2.1.
| []
|
CVE-2009-2150 | Multiple cross-site request forgery (CSRF) vulnerabilities in Campus Virtual-LMS allow (1) remote attackers to hijack the authentication of arbitrary users for requests that terminate a session via login/logout.php, and might allow remote attackers to hijack the authentication of certain users via a (2) ADD or (3) DELETE action to enrolments/step2.php. | [
"cpe:2.3:a:campusvirtualcomputrade:campus_virtual-lms:*:*:*:*:*:*:*:*"
]
|
|
CVE-2017-9103 | An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records. | [
"cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
]
|
|
CVE-2016-3362 | Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Automation Services on SharePoint Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3365. | [
"cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_designer:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_designer:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_designer:2013:sp1:*:*:*:*:*:*"
]
|
|
GHSA-h3mv-4m2h-gvch | read_ujpg in jpgcoder.cc in Dropbox Lepton 1.2.1 allows attackers to cause a denial-of-service (application runtime crash because of an integer overflow) via a crafted file. | []
|
|
GHSA-gmf4-h5jx-m84h | A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'. | []
|
|
CVE-2013-2906 | Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.cpp, core/platform/audio/HRTFElevation.cpp, and modules/webaudio/ConvolverNode.cpp. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.47:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.49:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.50:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.51:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.56:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.57:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.58:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.60:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.61:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:30.0.1599.64:*:*:*:*:*:*:*"
]
|
|
GHSA-p4vg-vc3x-pqwq | The ONEDC app before 1.7 for iOS does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
|
|
GHSA-cxw4-9qv9-vx5h | High severity vulnerability that affects PeterO.Cbor | ImpactThe CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as `EncodeToBytes`, `ToString`, or `ToJSONString`, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.PatchesThis problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.WorkaroundsSince version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.In version 3.6, if the method used `CBORObject.Read()` or `CBORObject.DecodeFromBytes()` to decode a serialized CBOR object, call the overload that takes `CBOREncodeOptions` as follows:In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:Alternatively, for such versions, the application can use `WriteTo` to decode the CBOR object to a so-called "limited memory stream", that is, a `Stream` that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).ReferencesSee the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).For more informationIf you have any questions or comments about this advisory:Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR). | []
|
GHSA-27qw-fff9-qjq8 | Null pointer dereference vulnerability in the PDF preview module
Impact: Successful exploitation of this vulnerability may affect function stability. | []
|
|
CVE-2006-0643 | Cross-site scripting (XSS) vulnerability in WiredRed e/pop Web Conferencing 4.1.0.755 allows remote authenticated users to inject arbitrary web script or HTML via the topic name of a conference. | [
"cpe:2.3:a:wiredred:e_pop_web_conferencing:4.1.0.755:*:*:*:*:*:*:*"
]
|
|
CVE-2023-26450 | The "OX Count" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.
| [
"cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:*:*:*:*:*:*:*:*"
]
|
|
CVE-1999-0737 | The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. | [
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*"
]
|
|
GHSA-w942-gw6m-p62c | Denial of service in GJSON | GJSON before 1.6.4 allows attackers to cause a denial of service via crafted JSON. Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector. | []
|
CVE-2021-33594 | F-Secure Safe browser for Android vulnerable to Address Bar Spoofing | An address bar spoofing vulnerability was discovered in Safe Browser for Android. When user clicks on a specially crafted a malicious URL, it appears like a legitimate one on the address bar, while the content comes from other domain and presented in a window, covering the original content. A remote attacker can leverage this to perform address bar spoofing attack. | [
"cpe:2.3:a:f-secure:safe:*:*:*:*:*:android:*:*"
]
|
GHSA-5r3q-54c5-hc9v | Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /schedules/view_schedule.php. | []
|
|
CVE-2024-50043 | nfsd: fix possible badness in FREE_STATEID | In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix possible badness in FREE_STATEID
When multiple FREE_STATEIDs are sent for the same delegation stateid,
it can lead to a possible either use-after-free or counter refcount
underflow errors.
In nfsd4_free_stateid() under the client lock we find a delegation
stateid, however the code drops the lock before calling nfs4_put_stid(),
that allows another FREE_STATE to find the stateid again. The first one
will proceed to then free the stateid which leads to either
use-after-free or decrementing already zeroed counter. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*"
]
|
GHSA-wxhv-5px8-hg6r | Missing Authorization vulnerability in Migrate Clone allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Clone: from n/a through 2.4.5. | []
|
|
CVE-2019-19507 | In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result. | [
"cpe:2.3:a:json_pattern_validator_project:json_pattern_validator:*:*:*:*:*:*:*:*"
]
|
|
CVE-2016-6469 | A vulnerability in HTTP URL parsing of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) vulnerability due to the proxy process unexpectedly restarting. More Information: CSCvb04312. Known Affected Releases: 9.0.1-162 9.1.1-074. Known Fixed Releases: 10.1.0-129 9.1.2-010. | [
"cpe:2.3:a:cisco:web_security_appliance:9.0.1-162:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:9.1.1-074:*:*:*:*:*:*:*"
]
|
|
GHSA-xgr7-jgq3-mhmc | Contract balance not updating correctly after interchain transaction | Summary_Short summary of the problem. Make the impact and severity as clear as possible. For example: An unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server._DetailsWe discovered a bug walking through how to liquid stake using Safe which itself is a contract. The bug only appears when there is a local state change together with an ICS20 transfer in the same function and uses the contract's balance, that is using the contract address as the `sender` parameter in an ICS20 transfer using the ICS20 precompileProof of ConceptImpactThis is in essence the "infinite money glitch" allowing contracts to double the supply of Evmos after each transaction.SeverityBased on [ImmuneFi Severity Classification System](https://immunefisupport.zendesk.com/hc/en-us/articles/13332717597585-Severity-Classification-System) the severity was evaluated to `Critical` since the attack could have lead to create new supply of EVMOS and therefore lead to Direct loss of funds's value.PatchesThe issue has been patched in versions >=V18.1.0.For more informationIf you have any questions or comments about this advisory:Reach out to the Core Team in [Discord](https://discord.gg/evmos)
Open a discussion in [evmos/evmos](https://github.com/evmos/evmos/discussions)
Email us at [[email protected]](mailto:[email protected]) for security questions | []
|
GHSA-v65v-mq8p-jwmw | The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability This vulnerability allows a low level user to perform the actions with SYSTEM privileges. | []
|
|
CVE-2017-15218 | ImageMagick 7.0.7-2 has a memory leak in ReadOneJNGImage in coders/png.c. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.7-2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
]
|
|
GHSA-42qf-73xw-h6m8 | Cross-site scripting (XSS) vulnerability in e107_admin/db.php in e107 2.0 alpha2 and earlier allows remote attackers to inject arbitrary web script or HTML via the type parameter. | []
|
|
GHSA-g6mw-6vmq-3w32 | Nonce token leak vulnerability leading to arbitrary file upload, theme deletion, plugin settings change discovered in Responsive Menu WordPress plugin (versions <= 4.1.7). | []
|
|
CVE-2016-0225 | IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x through 7.0.0.9 allows remote authenticated Commerce Accelerator administrators to obtain sensitive information via unspecified vectors. | [
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:6.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_commerce:7.0.0.9:*:*:*:*:*:*:*"
]
|
|
GHSA-26x3-37g3-jpmw | razorCMS 1.2 allows remote authenticated users to access administrator directories and files by creating and deleting a directory. | []
|
|
GHSA-vc4f-x28m-p38x | Multiple cross-site scripting (XSS) vulnerabilities in functions.inc.php for Double Choco Latte 0.9.4.3 allow remote attackers to inject arbitrary web script or HTML via the (1) class or (2) method name. | []
|
|
GHSA-w25x-j7hc-vxvg | Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal. | []
|
|
GHSA-627w-79w2-pp7h | Session fixation vulnerability in Cybozu Garoon before 3.7.2 allows remote attackers to hijack web sessions via unspecified vectors. | []
|
|
GHSA-j66x-pqjc-hw6v | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in oniswap Mini twitter feed allows Stored XSS. This issue affects Mini twitter feed: from n/a through 3.0. | []
|
|
GHSA-9crr-whpr-g3mc | Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing crafted PDF files. This could result in a read past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit. | []
|
|
GHSA-gxfx-4m5q-qcqf | An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1129. | []
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.