id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
CVE-2021-1146
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Command Injection Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on an affected device. Cisco has not released software updates that address these vulnerabilities.
[ "cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*" ]
CVE-2013-3765
Unspecified vulnerability in Oracle Solaris 11 allows local users to affect availability via unknown vectors related to Kernel/VM.
[ "cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*" ]
GHSA-49mv-vfcp-8gg9
Moodle vulnerable to SQL Injection
A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.
[]
GHSA-4qg3-w6pq-6h3p
Missing Authorization vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Forms by Cimatti: from n/a through 1.5.7.
[]
GHSA-fc6c-wh46-2q9r
In the Linux kernel, the following vulnerability has been resolved:nfs: Fix KMSAN warning in decode_getfattr_attrs()Fix the following KMSAN warning:CPU: 1 UID: 0 PID: 7651 Comm: cp Tainted: G B Tainted: [B]=BAD_PAGE Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)===================================================== BUG: KMSAN: uninit-value in decode_getfattr_attrs+0x2d6d/0x2f90 decode_getfattr_attrs+0x2d6d/0x2f90 decode_getfattr_generic+0x806/0xb00 nfs4_xdr_dec_getattr+0x1de/0x240 rpcauth_unwrap_resp_decode+0xab/0x100 rpcauth_unwrap_resp+0x95/0xc0 call_decode+0x4ff/0xb50 __rpc_execute+0x57b/0x19d0 rpc_execute+0x368/0x5e0 rpc_run_task+0xcfe/0xee0 nfs4_proc_getattr+0x5b5/0x990 __nfs_revalidate_inode+0x477/0xd00 nfs_access_get_cached+0x1021/0x1cc0 nfs_do_access+0x9f/0xae0 nfs_permission+0x1e4/0x8c0 inode_permission+0x356/0x6c0 link_path_walk+0x958/0x1330 path_lookupat+0xce/0x6b0 filename_lookup+0x23e/0x770 vfs_statx+0xe7/0x970 vfs_fstatat+0x1f2/0x2c0 __se_sys_newfstatat+0x67/0x880 __x64_sys_newfstatat+0xbd/0x120 x64_sys_call+0x1826/0x3cf0 do_syscall_64+0xd0/0x1b0 entry_SYSCALL_64_after_hwframe+0x77/0x7fThe KMSAN warning is triggered in decode_getfattr_attrs(), when calling decode_attr_mdsthreshold(). It appears that fattr->mdsthreshold is not initialized.Fix the issue by initializing fattr->mdsthreshold to NULL in nfs_fattr_init().
[]
CVE-2025-49137
Hax CMS Stored Cross-Site Scripting vulnerability
HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.0, the application does not sufficiently sanitize user input, allowing for the execution of arbitrary JavaScript code. The 'saveNode' and 'saveManifest' endpoints take user input and store it in the JSON schema for the site. This content is then rendered in the generated HAX site. Although the application does not allow users to supply a `script` tag, it does allow the use of other HTML tags to run JavaScript. Version 11.0.0 fixes the issue.
[]
CVE-2006-4458
Directory traversal vulnerability in calendar/inc/class.holidaycalc.inc.php in phpGroupWare 0.9.16.010 and earlier allows remote attackers to include arbitrary local files via a .. (dot dot) sequence and trailing null (%00) byte in the GLOBALS[phpgw_info][user][preferences][common][country] parameter.
[ "cpe:2.3:a:phpgroupware:phpgroupware:0.9.16.010:*:*:*:*:*:*:*" ]
CVE-2023-32581
WordPress WP-Chatbot for Messenger plugin <= 4.7 - Broken Access Control
Missing Authorization vulnerability in MobileMonkey WP-Chatbot for Messenger allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP-Chatbot for Messenger: from n/a through 4.7.
[]
CVE-2022-38412
Adobe Animate SVG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
Adobe Animate version 21.0.11 (and earlier) and 22.0.7 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2014-6383
The stateless firewall in Juniper Junos 13.3R3, 14.1R1, and 14.1R2, when using Trio-based PFE modules, does not properly match ports, which might allow remote attackers to bypass firewall rule.
[ "cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*" ]
CVE-2007-6365
Cross-site scripting (XSS) vulnerability in modules/ecal/display.php in the Event Calendar in bcoos 1.0.10 allows remote attackers to inject arbitrary web script or HTML via the month parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: the day and year vectors are covered by CVE-2007-6274.
[ "cpe:2.3:a:bcoos:event_calendar:1.0.10:*:*:*:*:*:*:*" ]
CVE-2015-3805
Apple iOS before 8.4.1 and OS X before 10.10.5 allow local users to bypass a code-signing protection mechanism via a crafted Mach-O file, a different vulnerability than CVE-2015-3802.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
CVE-2024-9353
Popularis Extra <= 1.2.6 - Reflected Cross-Site Scripting
The Popularis Extra plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[ "cpe:2.3:a:themes4wp:popularis_extra:*:*:*:*:*:wordpress:*:*" ]
CVE-2018-3108
Vulnerability in the Oracle Fusion Middleware component of Oracle Fusion Middleware (subcomponent: Oracle Notification Service). Supported versions that are affected are 12.2.1.2 and 12.2.1.3. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTPS to compromise Oracle Fusion Middleware. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Fusion Middleware accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:fusion_middleware:12.2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:12.2.1.3:*:*:*:*:*:*:*" ]
CVE-2017-9582
The "BNB Mobile Banking" by Brady National Bank app 3.0.0 -- aka bnb-mobile-banking/id674215747 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:bradynationalbank:bnb_mobile_banking:3.0.0:*:*:*:*:iphone_os:*:*" ]
CVE-2020-24430
Acrobat Pro DC Use-After-Free vulnerability Could Lead to Arbitrary Code Execution
Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a use-after-free vulnerability when handling malicious JavaScript. This vulnerability could result in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-xp45-33wm-mg9r
BigTree-CMS contains a Cross Site Scripting (XSS) vulnerability in /users/create that can result in The low-privileged users can use this vulnerability to attack high-privileged(Developer) users.. This attack appear to be exploitable via no. This vulnerability appears to have been fixed in after commit b652cfdc14d0670c81ac4401ad5a04376745c279.
[]
CVE-2023-35959
Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns `.ghw` decompression.
[ "cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*" ]
GHSA-36hv-fqvj-3wq3
The PMA_Bookmark_get function in libraries/bookmark.lib.php in phpMyAdmin 2.11.x before 2.11.11.3, and 3.3.x before 3.3.9.2, does not properly restrict bookmark queries, which makes it easier for remote authenticated users to trigger another user's execution of a SQL query by creating a bookmark.
[]
GHSA-wgc7-m7cp-7vfg
The PHP package in Slackware 8.1, 9.0, and 9.1, when linked against a static library, includes /tmp in the search path, which allows local users to execute arbitrary code as the PHP user by inserting shared libraries into the appropriate path.
[]
CVE-2017-14321
Multiple cross-site scripting (XSS) vulnerabilities in the administrative interface in Mirasvit Helpdesk MX before 1.5.3 allow remote attackers to inject arbitrary web script or HTML via the (1) customer name or (2) subject in a ticket.
[ "cpe:2.3:a:mirasvit:helpdesk_mx:*:*:*:*:*:*:*:*" ]
CVE-2023-46175
IBM Cloud Pak for Multicloud Management information disclosure
IBM Cloud Pak for Multicloud Management 2.3 through 2.3 FP8 stores user credentials in a log file plain clear text which can be read by a privileged user.
[ "cpe:2.3:a:ibm:cloud_pak_for_multicloud_management_monitoring:2.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_multicloud_management_monitoring:2.3.0:fixpack8:*:*:*:*:*:*" ]
GHSA-qg22-qxjf-9f4f
Husdawg, LLC Systems Requirements Lab 3, as used by Instant Expert Analysis, allows remote attackers to force the download and execution of arbitrary programs via by specifiying a malicious website argument to the Init method in (1) a certain ActiveX control (sysreqlab2.cab, sysreqlab.dll, sysreqlabsli.dll, or sysreqlab2.dll) and (2) a certain Java applet in RLApplet.class in sysreqlab2.jar or sysreqlab.jar.
[]
GHSA-6f7g-g6qv-mmrw
Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
GHSA-qwf3-gf6f-rrw8
Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allow remote attackers to obtain sensitive information via a crafted CIP packet.
[]
CVE-2013-7195
PHPFox 3.7.3 and 3.7.4 allows remote authenticated users to bypass intended "Only Me" restrictions and "like" a publication via a request that specifies the ID for the publication.
[ "cpe:2.3:a:phpfox:phpfox:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpfox:phpfox:3.7.4:*:*:*:*:*:*:*" ]
CVE-2023-0568
Array overrun in common path resolve code
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ]
GHSA-r73h-f7r4-p3vq
Unspecified vulnerability in the AirPcap support in Wireshark (formerly Ethereal) 0.99.3 has unspecified attack vectors related to WEP key parsing.
[]
GHSA-vw3m-pvf6-gxw8
In the Linux kernel, the following vulnerability has been resolved:block: fix deadlock between bd_link_disk_holder and partition scan'open_mutex' of gendisk is used to protect open/close block devices. But in bd_link_disk_holder(), it is used to protect the creation of symlink between holding disk and slave bdev, which introduces some issues.When bd_link_disk_holder() is called, the driver is usually in the process of initialization/modification and may suspend submitting io. At this time, any io hold 'open_mutex', such as scanning partitions, can cause deadlocks. For example, in raid:T1 T2 bdev_open_by_dev lock open_mutex [1] ... efi_partition ... md_submit_bio md_ioctl mddev_syspend -> suspend all io md_add_new_disk bind_rdev_to_array bd_link_disk_holder try lock open_mutex [2] md_handle_request -> wait mddev_resumeT1 scan partition, T2 add a new device to raid. T1 waits for T2 to resume mddev, but T2 waits for open_mutex held by T1. Deadlock occurs.Fix it by introducing a local mutex 'blk_holder_mutex' to replace 'open_mutex'.
[]
CVE-2018-20900
cPanel before 71.9980.37 allows stored XSS in the YUM autorepair functionality (SEC-399).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
GHSA-qqq7-ff89-5hxp
Unspecified vulnerability in the Agile Core component in Oracle Supply Chain Products Suite 9.3.0.2 and 9.3.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Folders, Files & Attachments, a different vulnerability than CVE-2010-4429.
[]
GHSA-w2r7-j937-rrj3
Use of Hard-coded Credentials vulnerability in Utarit Information Technologies SoliPay Mobile App allows Read Sensitive Strings Within an Executable.This issue affects SoliPay Mobile App: before 5.0.8.
[]
GHSA-jcmr-v7r5-m28x
A vulnerability, which was classified as critical, has been found in SourceCodester Accounts Manager App 1.0. This issue affects some unknown processing of the file /endpoint/delete-account.php. The manipulation of the argument account leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-wm77-q74p-5763
Path Traversal in superstatic
Affected of `superstatic` are vulnerable to path traversal when used on Windows.Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0).RecommendationUpdate to version 5.0.2 or later.
[]
CVE-2022-24132
phpshe V1.8 is affected by a denial of service (DoS) attack in the registry's verification code, which can paralyze the target service.
[ "cpe:2.3:a:phpshe:phpshe:1.8:*:*:*:*:*:*:*" ]
GHSA-xjj6-f689-gwr9
Dell EMC SCG Policy Manager, versions from 5.10 to 5.12, contain(s) a contain a Hard-coded Cryptographic Key vulnerability. An attacker with the knowledge of the hard-coded sensitive information, could potentially exploit this vulnerability to login to the system to gain admin privileges.
[]
GHSA-5gvg-fggq-r6f6
A Missing Release of Memory after Effective Lifetime vulnerability in Juniper Networks Junos OS on MX Series allows an unauthenticated adjacent attacker to cause a Denial-of-Service (DoS).In a subscriber management scenario continuous subscriber logins will trigger a memory leak and eventually lead to an FPC crash and restart.This issue affects Junos OS on MX Series:All version before 21.2R3-S6,21.4 versions before 21.4R3-S6,22.1 versions before 22.1R3-S5,22.2 versions before 22.2R3-S3,22.3 versions before 22.3R3-S2,22.4 versions before 22.4R3,23.2 versions before 23.2R2.
[]
GHSA-89wq-qcf5-vx73
SQL injection vulnerability in admin/index2.asp in GOUAE DWD Realty allows remote attackers to execute arbitrary SQL commands via the uname parameter, a different vector than CVE-2007-6163. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
CVE-2024-20102
In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998892; Issue ID: MSV-1601.
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt3605:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*" ]
GHSA-8mgf-crrg-6qxp
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
[]
GHSA-c5c4-6w52-p8qr
Adobe Illustrator version 25.2.3 (and earlier) is affected by an Out-of-bounds Write vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2024-26215
DHCP Server Service Denial of Service Vulnerability
DHCP Server Service Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
GHSA-7fmj-f47p-w477
Cross-site scripting (XSS) was possible in notification pop-ups. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 28035
[]
CVE-2020-13699
TeamViewer Desktop for Windows before 15.8.3 does not properly quote its custom URI handlers. A malicious website could launch TeamViewer with arbitrary parameters, as demonstrated by a teamviewer10: --play URL. An attacker could force a victim to send an NTLM authentication request and either relay the request or capture the hash for offline password cracking. This affects teamviewer10, teamviewer8, teamviewerapi, tvchat1, tvcontrol1, tvfiletransfer1, tvjoinv8, tvpresent1, tvsendfile1, tvsqcustomer1, tvsqsupport1, tvvideocall1, and tvvpn1. The issue is fixed in 8.0.258861, 9.0.258860, 10.0.258873, 11.0.258870, 12.0.258869, 13.2.36220, 14.2.56676, 14.7.48350, and 15.8.3.
[ "cpe:2.3:a:teamviewer:teamviewer:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-hjh6-cq5x-wfcq
The Frontend component in Sophos UTM with firmware 9.405-5 and earlier allows local administrators to obtain sensitive password information by reading the "value" field of the SMTP user settings in the notifications configuration tab.
[]
CVE-2016-3205
The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3206 and CVE-2016-3207.
[ "cpe:2.3:a:microsoft:jscript:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:vbscript:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*" ]
GHSA-7hfx-h3j3-rwq4
D-Tale server-side request forgery through Web uploads
ImpactUsers hosting D-Tale publicly can be vulnerable to server-side request forgery (SSRF) allowing attackers to access files on the server.PatchesUsers should upgrade to version 3.9.0 where the "Load From the Web" input is turned off by default. You can find out more information on how to turn it back on [here](https://github.com/man-group/dtale?tab=readme-ov-file#load-data--sample-datasets)WorkaroundsThe only workaround for versions earlier than 3.9.0 is to only host D-Tale to trusted users.ReferencesSee "Load Data & Sample Datasets" [documentation](https://github.com/man-group/dtale?tab=readme-ov-file#load-data--sample-datasets)
[]
GHSA-w9r7-3rj5-pq9r
Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[]
GHSA-gqmr-r75p-994g
TechyTalk Quick Chat WordPress Plugin All up to the latest is affected by: SQL Injection. The impact is: Access to the database. The component is: like_escape is used in Quick-chat.php line 399. The attack vector is: Crafted ajax request.
[]
CVE-2009-2871
Unspecified vulnerability in Cisco IOS 12.2 and 12.4, when SSLVPN sessions, SSH sessions, or IKE encrypted nonces are enabled, allows remote attackers to cause a denial of service (device reload) via a crafted encrypted packet, aka Bug ID CSCsq24002.
[ "cpe:2.3:o:cisco:ios:12.2xna:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xnb:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xnc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xnd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xq:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xr:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4xz:*:*:*:*:*:*:*" ]
GHSA-ggrr-j79r-pq3m
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
[]
GHSA-wfw3-f86p-vm65
/servlets/ajax_file_upload?fieldName=binary3 in dotCMS 5.1.1 allows XSS and HTML Injection.
[]
GHSA-x2wv-xwwr-px62
Improper privilege management vulnerability in McAfee Consumer Product Removal Tool prior to version 10.4.128 could allow a local user to modify a configuration file and perform a LOLBin (Living off the land) attack. This could result in the user gaining elevated permissions and being able to execute arbitrary code, through not correctly checking the integrity of the configuration file.
[]
CVE-2023-35719
ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability
ManageEngine ADSelfService Plus GINA Client Insufficient Verification of Data Authenticity Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of ManageEngine ADSelfService Plus. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Password Reset Portal used by the GINA client. The issue results from the lack of proper authentication of data received via HTTP. An attacker can leverage this vulnerability to bypass authentication and execute code in the context of SYSTEM. Was ZDI-CAN-17009.
[ "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:6.1:6122:*:*:*:*:*:*" ]
CVE-2014-7577
The B&H Photo Video Pro Audio (aka com.bhphoto) application 2.5.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:bandh:b\\&h_photo_video_pro_audio:2.5.1:*:*:*:*:android:*:*" ]
GHSA-q7p4-5vmg-rr2r
A vulnerability in Cisco SD-WAN Solution software could allow an authenticated, local attacker to cause a buffer overflow on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain access to information that they are not authorized to access and make changes to the system that they are not authorized to make.
[]
CVE-2016-1995
HPE System Management Homepage before 7.5.4 allows remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*" ]
GHSA-fxj2-2fcx-f575
A vulnerability classified as problematic was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file cashconfirm.php of the component POST Parameter Handler. The manipulation of the argument transactioncode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223129 was assigned to this vulnerability.
[]
GHSA-69r6-frgh-wc7c
Multiple Zoho ManageEngine products suffer from local privilege escalation due to improper permissions for the %SYSTEMDRIVE%\ManageEngine directory and its sub-folders. Moreover, the services associated with said products try to execute binaries such as sc.exe from the current directory upon system start. This will effectively allow non-privileged users to escalate privileges to NT AUTHORITY\SYSTEM. This affects Desktop Central 10.0.380, EventLog Analyzer 12.0.2, ServiceDesk Plus 10.0.0, SupportCenter Plus 8.1, O365 Manager Plus 4.0, Mobile Device Manager Plus 9.0.0, Patch Connect Plus 9.0.0, Vulnerability Manager Plus 9.0.0, Patch Manager Plus 9.0.0, OpManager 12.3, NetFlow Analyzer 11.0, OpUtils 11.0, Network Configuration Manager 11.0, FireWall 12.0, Key Manager Plus 5.6, Password Manager Pro 9.9, Analytics Plus 1.0, and Browser Security Plus.
[]
GHSA-xx28-7x9q-6ch2
index.php in myBloggie 2.1.1 allows remote attackers to obtain sensitive information via an invalid post_id parameter, which reveals the path in an error message.
[]
CVE-2024-12481
cjbi wetech-cms UserDao.java findUser sql injection
A vulnerability was found in cjbi wetech-cms 1.0/1.1/1.2. It has been declared as critical. Affected by this vulnerability is the function findUser of the file wetech-cms-master\wetech-core\src\main\java\tech\wetech\cms\dao\UserDao.java. The manipulation of the argument searchValue/gId/rId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:cjbi:wetech-cms:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cjbi:wetech-cms:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cjbi:wetech-cms:1.2:*:*:*:*:*:*:*" ]
CVE-2023-22661
Buffer overflow in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:server_system_d50tnp1mhcrlc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_d50tnp1mhcrlc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_d50tnp1mhcpac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_d50tnp1mhcpac:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_d50tnp2mhsvac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_d50tnp2mhsvac:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_d50tnp2mhstac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_d50tnp2mhstac:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_d50tnp1mhcrac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_d50tnp1mhcrac:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_d50tnp2mfalac_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_d50tnp2mfalac:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_m50cyp1ur204_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_m50cyp1ur204:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_m50cyp1ur212_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_m50cyp1ur212:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_m50cyp2ur312_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_m50cyp2ur312:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:server_system_m50cyp2ur208_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:server_system_m50cyp2ur208:-:*:*:*:*:*:*:*" ]
GHSA-ggpf-24jw-3fcw
CVE-2025-24357 Malicious model remote code execution fix bypass with PyTorch < 2.6.0
Descriptionhttps://github.com/vllm-project/vllm/security/advisories/GHSA-rh4j-5rhw-hr54 reported a vulnerability where loading a malicious model could result in code execution on the vllm host. The fix applied to specify `weights_only=True` to calls to `torch.load()` did not solve the problem prior to PyTorch 2.6.0.PyTorch has issued a new CVE about this problem: https://github.com/advisories/GHSA-53q9-r3pm-6pq6This means that versions of vLLM using PyTorch before 2.6.0 are vulnerable to this problem.Background KnowledgeWhen users install VLLM according to the official manual ![image](https://github.com/user-attachments/assets/d17e0bdb-26f2-46d6-adf6-0b17e5ddf5c7)But the version of PyTorch is specified in the requirements. txt file ![image](https://github.com/user-attachments/assets/94aad622-ad6d-4741-b772-c342727c58c7)So by default when the user install VLLM, it will install the PyTorch with version 2.5.1 ![image](https://github.com/user-attachments/assets/04ff31b0-aad1-490a-963d-00fda91da47b)In CVE-2025-24357, weights_only=True was used for patching, but we know this is not secure. Because we found that using Weights_only=True in pyTorch before 2.5.1 was unsafeHere, we use this interface to prove that it is not safe. ![image](https://github.com/user-attachments/assets/0d86efcd-2aad-42a2-8ac6-cc96b054c925)Fixupdate PyTorch version to 2.6.0CreditThis vulnerability was found By Ji'an Zhou and Li'shuo Song
[]
GHSA-pvp4-m7wj-rwq3
Appspace 6.2.4 is affected by Incorrect Access Control via the Appspace Web Portal password reset page.
[]
CVE-2006-3239
SQL injection vulnerability in message.php in VBZooM 1.11 and earlier allows remote attackers to execute arbitrary SQL commands via the UserID parameter.
[ "cpe:2.3:a:vbzoom:vbzoom:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:vbzoom:vbzoom:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:vbzoom:vbzoom:1.11:*:*:*:*:*:*:*" ]
GHSA-r27m-m9vv-f47r
Multiple cross-site scripting (XSS) vulnerabilities in Jupiter CMS allow remote attackers to inject arbitrary web script or HTML via the (1) language[Admin name] and (2) language[Admin back] parameters in (a) modules/blocks.php; the (3) language[Register title] and (4) language[Register title2] parameters in (b) modules/register.php; the (5) language[Mass-Email form title], (6) language[Mass-Email form desc], (7) language[Mass-Email form desc2] (8) language[Mass-Email form desc3], and (9) language[Mass-Email form desc4] parameters in (c) modules/mass-email.php; the (10) language[Forgotten title], (11) language[Forgotten desc], (12) language[Forgotten desc2], (13) language[Forgotten desc3], (14) language[Forgotten desc4], and (15) language[Forgotten desc5] parameters in (d) modules/register.php; and the (16) language[Search view desc], (17) language[Search view desc2], (18) language[Search view desc3], (19) language[Search view desc4], (20) language[Search view desc5], (21) language[Search view desc6], (22) language[Search view desc7], and (23) language[Search view desc8] parameters in (e) modules/search.php.
[]
GHSA-33f9-4h6q-m86q
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSOAR before 7.2.1 allows an authenticated attacker to execute unauthorized code or commands via crafted HTTP GET requests.
[]
CVE-2024-31379
WordPress Smash Balloon Social Post Feed plugin <= 4.2.1 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Smash Balloon Smash Balloon Social Post Feed.This issue affects Smash Balloon Social Post Feed: from n/a through 4.2.1.
[]
CVE-2009-2150
Multiple cross-site request forgery (CSRF) vulnerabilities in Campus Virtual-LMS allow (1) remote attackers to hijack the authentication of arbitrary users for requests that terminate a session via login/logout.php, and might allow remote attackers to hijack the authentication of certain users via a (2) ADD or (3) DELETE action to enrolments/step2.php.
[ "cpe:2.3:a:campusvirtualcomputrade:campus_virtual-lms:*:*:*:*:*:*:*:*" ]
CVE-2017-9103
An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records.
[ "cpe:2.3:a:gnu:adns:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*" ]
CVE-2016-3362
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Automation Services on SharePoint Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3365.
[ "cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_online_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_designer:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_designer:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_designer:2013:sp1:*:*:*:*:*:*" ]
GHSA-h3mv-4m2h-gvch
read_ujpg in jpgcoder.cc in Dropbox Lepton 1.2.1 allows attackers to cause a denial-of-service (application runtime crash because of an integer overflow) via a crafted file.
[]
GHSA-gmf4-h5jx-m84h
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.
[]
CVE-2013-2906
Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.cpp, core/platform/audio/HRTFElevation.cpp, and modules/webaudio/ConvolverNode.cpp.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:30.0.1599.64:*:*:*:*:*:*:*" ]
GHSA-p4vg-vc3x-pqwq
The ONEDC app before 1.7 for iOS does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-cxw4-9qv9-vx5h
High severity vulnerability that affects PeterO.Cbor
ImpactThe CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as `EncodeToBytes`, `ToString`, or `ToJSONString`, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.PatchesThis problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.WorkaroundsSince version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.In version 3.6, if the method used `CBORObject.Read()` or `CBORObject.DecodeFromBytes()` to decode a serialized CBOR object, call the overload that takes `CBOREncodeOptions` as follows:In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:Alternatively, for such versions, the application can use `WriteTo` to decode the CBOR object to a so-called "limited memory stream", that is, a `Stream` that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).ReferencesSee the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).For more informationIf you have any questions or comments about this advisory:Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
[]
GHSA-27qw-fff9-qjq8
Null pointer dereference vulnerability in the PDF preview module Impact: Successful exploitation of this vulnerability may affect function stability.
[]
CVE-2006-0643
Cross-site scripting (XSS) vulnerability in WiredRed e/pop Web Conferencing 4.1.0.755 allows remote authenticated users to inject arbitrary web script or HTML via the topic name of a conference.
[ "cpe:2.3:a:wiredred:e_pop_web_conferencing:4.1.0.755:*:*:*:*:*:*:*" ]
CVE-2023-26450
The "OX Count" web service did not specify a media-type when processing responses by external resources. Malicious script code can be executed within the victims context. This can lead to session hijacking or triggering unwanted actions via the web interface and API. To exploit this an attacker would require temporary access to the users account or lure a user to a compromised account. We are now defining the accepted media-type to avoid code execution. No publicly available exploits are known.
[ "cpe:2.3:a:open-xchange:open-xchange_appsuite_frontend:*:*:*:*:*:*:*:*" ]
CVE-1999-0737
The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
[ "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*" ]
GHSA-w942-gw6m-p62c
Denial of service in GJSON
GJSON before 1.6.4 allows attackers to cause a denial of service via crafted JSON. Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.
[]
CVE-2021-33594
F-Secure Safe browser for Android vulnerable to Address Bar Spoofing
An address bar spoofing vulnerability was discovered in Safe Browser for Android. When user clicks on a specially crafted a malicious URL, it appears like a legitimate one on the address bar, while the content comes from other domain and presented in a window, covering the original content. A remote attacker can leverage this to perform address bar spoofing attack.
[ "cpe:2.3:a:f-secure:safe:*:*:*:*:*:android:*:*" ]
GHSA-5r3q-54c5-hc9v
Simple Task Scheduling System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /schedules/view_schedule.php.
[]
CVE-2024-50043
nfsd: fix possible badness in FREE_STATEID
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix possible badness in FREE_STATEID When multiple FREE_STATEIDs are sent for the same delegation stateid, it can lead to a possible either use-after-free or counter refcount underflow errors. In nfsd4_free_stateid() under the client lock we find a delegation stateid, however the code drops the lock before calling nfs4_put_stid(), that allows another FREE_STATE to find the stateid again. The first one will proceed to then free the stateid which leads to either use-after-free or decrementing already zeroed counter.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*" ]
GHSA-wxhv-5px8-hg6r
Missing Authorization vulnerability in Migrate Clone allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Clone: from n/a through 2.4.5.
[]
CVE-2019-19507
In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.
[ "cpe:2.3:a:json_pattern_validator_project:json_pattern_validator:*:*:*:*:*:*:*:*" ]
CVE-2016-6469
A vulnerability in HTTP URL parsing of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) vulnerability due to the proxy process unexpectedly restarting. More Information: CSCvb04312. Known Affected Releases: 9.0.1-162 9.1.1-074. Known Fixed Releases: 10.1.0-129 9.1.2-010.
[ "cpe:2.3:a:cisco:web_security_appliance:9.0.1-162:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:9.1.1-074:*:*:*:*:*:*:*" ]
GHSA-xgr7-jgq3-mhmc
Contract balance not updating correctly after interchain transaction
Summary_Short summary of the problem. Make the impact and severity as clear as possible. For example: An unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server._DetailsWe discovered a bug walking through how to liquid stake using Safe which itself is a contract. The bug only appears when there is a local state change together with an ICS20 transfer in the same function and uses the contract's balance, that is using the contract address as the `sender` parameter in an ICS20 transfer using the ICS20 precompileProof of ConceptImpactThis is in essence the "infinite money glitch" allowing contracts to double the supply of Evmos after each transaction.SeverityBased on [ImmuneFi Severity Classification System](https://immunefisupport.zendesk.com/hc/en-us/articles/13332717597585-Severity-Classification-System) the severity was evaluated to `Critical` since the attack could have lead to create new supply of EVMOS and therefore lead to Direct loss of funds's value.PatchesThe issue has been patched in versions >=V18.1.0.For more informationIf you have any questions or comments about this advisory:Reach out to the Core Team in [Discord](https://discord.gg/evmos) Open a discussion in [evmos/evmos](https://github.com/evmos/evmos/discussions) Email us at [[email protected]](mailto:[email protected]) for security questions
[]
GHSA-v65v-mq8p-jwmw
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability This vulnerability allows a low level user to perform the actions with SYSTEM privileges.
[]
CVE-2017-15218
ImageMagick 7.0.7-2 has a memory leak in ReadOneJNGImage in coders/png.c.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.7-2:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
GHSA-42qf-73xw-h6m8
Cross-site scripting (XSS) vulnerability in e107_admin/db.php in e107 2.0 alpha2 and earlier allows remote attackers to inject arbitrary web script or HTML via the type parameter.
[]
GHSA-g6mw-6vmq-3w32
Nonce token leak vulnerability leading to arbitrary file upload, theme deletion, plugin settings change discovered in Responsive Menu WordPress plugin (versions <= 4.1.7).
[]
CVE-2016-0225
IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x through 7.0.0.9 allows remote authenticated Commerce Accelerator administrators to obtain sensitive information via unspecified vectors.
[ "cpe:2.3:a:ibm:websphere_commerce:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:6.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_commerce:7.0.0.9:*:*:*:*:*:*:*" ]
GHSA-26x3-37g3-jpmw
razorCMS 1.2 allows remote authenticated users to access administrator directories and files by creating and deleting a directory.
[]
GHSA-vc4f-x28m-p38x
Multiple cross-site scripting (XSS) vulnerabilities in functions.inc.php for Double Choco Latte 0.9.4.3 allow remote attackers to inject arbitrary web script or HTML via the (1) class or (2) method name.
[]
GHSA-w25x-j7hc-vxvg
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal.
[]
GHSA-627w-79w2-pp7h
Session fixation vulnerability in Cybozu Garoon before 3.7.2 allows remote attackers to hijack web sessions via unspecified vectors.
[]
GHSA-j66x-pqjc-hw6v
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in oniswap Mini twitter feed allows Stored XSS. This issue affects Mini twitter feed: from n/a through 3.0.
[]
GHSA-9crr-whpr-g3mc
Adobe Illustrator version 24.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing crafted PDF files. This could result in a read past the end of an allocated memory structure, potentially resulting in arbitrary code execution in the context of the current user. This vulnerability requires user interaction to exploit.
[]
GHSA-gxfx-4m5q-qcqf
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1129.
[]