id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2021-4175 | Cross-site Scripting (XSS) - Stored in livehelperchat/livehelperchat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [
"cpe:2.3:a:livehelperchat:live_helper_chat:*:*:*:*:*:*:*:*"
] |
GHSA-jx64-r67p-6v8c | Under certain error conditions at time of SANnav installation or upgrade, the encryption key can be written into and obtained from a Brocade SANnav supportsave. An attacker with privileged access to the Brocade SANnav database could use the encryption key to obtain passwords used by Brocade SANnav. | [] |
|
CVE-2022-46422 | An issue in Netgear WNR2000 v1 1.2.3.7 and earlier allows authenticated attackers to cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process. | [
"cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-7jvg-wpf7-qqcj | There is a stack overflow vulnerability in the /goform/setMacFilterCfg function in the httpd service of Tenda ax12 22.03.01.21_cn router. An attacker can obtain a stable shell through a carefully constructed payload | [] |
|
GHSA-34rx-mprw-whv5 | An issue in Plone Docker Official Image 5.2.13 (5221) open-source software that could allow for remote code execution due to a package listed in ++plone++static/components not existing in the public package index (npm). | [] |
|
GHSA-5gp8-cj7x-g2vr | Cross-site scripting (XSS) vulnerability in staticpages/easypublish/index.php in EasyNews 4.0 allows remote attackers to inject arbitrary web script or HTML via the read parameter in an edp_pupublish action. | [] |
|
GHSA-jv5g-24q3-2ffw | SQL injection vulnerability in cn_users.php in CzarNews 1.20 and earlier allows remote attackers to execute arbitrary SQL commands via a recook cookie. | [] |
|
CVE-2024-23667 | An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI. | [
"cpe:2.3:a:fortinet:fortiweb_manager:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb_manager:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb_manager:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb_manager:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiweb_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiwebmanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiwebmanager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiwebmanager:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortiwebmanager:7.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-40770 | Adobe Prelude M4A File Parsing Memory Corruption Arbitrary Code Execution | Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability. | [
"cpe:2.3:a:adobe:prelude:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-4crg-m9w3-g9fc | The processInvocation function in org.jboss.as.ejb3.security.AuthorizationInterceptor in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, authorizes all requests when no roles are allowed for an Enterprise Java Beans (EJB) method invocation, which allows attackers to bypass intended access restrictions for EJB methods. | [] |
|
CVE-2024-47693 | IB/core: Fix ib_cache_setup_one error flow cleanup | In the Linux kernel, the following vulnerability has been resolved:
IB/core: Fix ib_cache_setup_one error flow cleanup
When ib_cache_update return an error, we exit ib_cache_setup_one
instantly with no proper cleanup, even though before this we had
already successfully done gid_table_setup_one, that results in
the kernel WARN below.
Do proper cleanup using gid_table_cleanup_one before returning
the err in order to fix the issue.
WARNING: CPU: 4 PID: 922 at drivers/infiniband/core/cache.c:806 gid_table_release_one+0x181/0x1a0
Modules linked in:
CPU: 4 UID: 0 PID: 922 Comm: c_repro Not tainted 6.11.0-rc1+ #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:gid_table_release_one+0x181/0x1a0
Code: 44 8b 38 75 0c e8 2f cb 34 ff 4d 8b b5 28 05 00 00 e8 23 cb 34 ff 44 89 f9 89 da 4c 89 f6 48 c7 c7 d0 58 14 83 e8 4f de 21 ff <0f> 0b 4c 8b 75 30 e9 54 ff ff ff 48 8 3 c4 10 5b 5d 41 5c 41 5d 41
RSP: 0018:ffffc90002b835b0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c8527
RDX: 0000000000000000 RSI: ffffffff811c8534 RDI: 0000000000000001
RBP: ffff8881011b3d00 R08: ffff88810b3abe00 R09: 205d303839303631
R10: 666572207972746e R11: 72746e6520444947 R12: 0000000000000001
R13: ffff888106390000 R14: ffff8881011f2110 R15: 0000000000000001
FS: 00007fecc3b70800(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000340 CR3: 000000010435a001 CR4: 00000000003706b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_regs+0x94/0xa0
? __warn+0x9e/0x1c0
? gid_table_release_one+0x181/0x1a0
? report_bug+0x1f9/0x340
? gid_table_release_one+0x181/0x1a0
? handle_bug+0xa2/0x110
? exc_invalid_op+0x31/0xa0
? asm_exc_invalid_op+0x16/0x20
? __warn_printk+0xc7/0x180
? __warn_printk+0xd4/0x180
? gid_table_release_one+0x181/0x1a0
ib_device_release+0x71/0xe0
? __pfx_ib_device_release+0x10/0x10
device_release+0x44/0xd0
kobject_put+0x135/0x3d0
put_device+0x20/0x30
rxe_net_add+0x7d/0xa0
rxe_newlink+0xd7/0x190
nldev_newlink+0x1b0/0x2a0
? __pfx_nldev_newlink+0x10/0x10
rdma_nl_rcv_msg+0x1ad/0x2e0
rdma_nl_rcv_skb.constprop.0+0x176/0x210
netlink_unicast+0x2de/0x400
netlink_sendmsg+0x306/0x660
__sock_sendmsg+0x110/0x120
____sys_sendmsg+0x30e/0x390
___sys_sendmsg+0x9b/0xf0
? kstrtouint+0x6e/0xa0
? kstrtouint_from_user+0x7c/0xb0
? get_pid_task+0xb0/0xd0
? proc_fail_nth_write+0x5b/0x140
? __fget_light+0x9a/0x200
? preempt_count_add+0x47/0xa0
__sys_sendmsg+0x61/0xd0
do_syscall_64+0x50/0x110
entry_SYSCALL_64_after_hwframe+0x76/0x7e | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2006-1801 | Cross-site scripting (XSS) vulnerability in planetsearchplus.php in planetSearch+ allows remote attackers to inject arbitrary web script or HTML via the search_exp parameter. | [
"cpe:2.3:a:planet_concept:planetsearch\\+:*:*:*:*:*:*:*:*"
] |
|
GHSA-q7w5-jvgc-gcf2 | The Cisco Content Services Switch (CSS) 11500 with software before 8.20.4.02 and the Application Control Engine (ACE) 4710 with software before A2(3.0) do not properly handle use of LF, CR, and LFCR as alternatives to the standard CRLF sequence between HTTP headers, which allows remote attackers to bypass intended header insertions or conduct HTTP request smuggling attacks via crafted header data, as demonstrated by LF characters preceding ClientCert-Subject and ClientCert-Subject-CN headers, aka Bug ID CSCta04885. | [] |
|
GHSA-ffxw-f5f8-xhhf | The WBEMSingleView.ocx ActiveX control 1.50.1131.0 in Microsoft WMI Administrative Tools 1.1 and earlier allows remote attackers to execute arbitrary code via a crafted argument to the ReleaseContext method, a different vector than CVE-2010-3973, possibly an untrusted pointer dereference. | [] |
|
GHSA-5phj-fp89-fpxp | A potential local bypass of security restrictions vulnerability has been identified in HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server's system ROMs prior to version 2.52. The vulnerability could be locally exploited to cause disclosure of sensitive information, denial of service (DoS), and/or compromise system integrity. | [] |
|
GHSA-25px-mjfm-j7v4 | Multiple SQL injection vulnerabilities in FrontAccounting (FA) 2.2.x before 2.2 RC allow remote attackers to execute arbitrary SQL commands via unspecified parameters to (1) bank_accounts.php, (2) currencies.php, (3) exchange_rates.php, (4) gl_account_types.php, and (5) gl_accounts.php in gl/manage/; and (6) audit_trail_db.inc, (7) comments_db.inc, (8) inventory_db.inc, (9) manufacturing_db.inc, and (10) references_db.inc in includes/db/. | [] |
|
CVE-2010-1716 | SQL injection vulnerability in the Agenda Address Book (com_agenda) component 1.0.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php. | [
"cpe:2.3:a:joomlanetprojects:com_agenda:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
|
GHSA-5mg4-xpj4-crpr | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in VOID CODERS Void Elementor Post Grid Addon for Elementor Page builder allows PHP Local File Inclusion.This issue affects Void Elementor Post Grid Addon for Elementor Page builder: from n/a through 2.3. | [] |
|
GHSA-r297-g992-2jwc | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WP Messiah Ai Image Alt Text Generator for WP. This issue affects Ai Image Alt Text Generator for WP: from n/a through 1.0.8. | [] |
|
CVE-2022-28229 | The hash functionality in userver before 42059b6319661583b3080cab9b595d4f8ac48128 allows attackers to cause a denial of service via crafted HTTP request, involving collisions. | [
"cpe:2.3:a:userver:userver:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-10176 | Digital Guardian Management Console 7.1.2.0015 has a Directory Traversal issue. | [
"cpe:2.3:a:digitalguardian:management_console:7.1.2.0015:*:*:*:*:*:*:*"
] |
|
GHSA-qff9-r3c8-wgm2 | A vulnerability was found in IET-OU Open Media Player up to 1.5.0. It has been declared as problematic. This vulnerability affects the function webvtt of the file application/controllers/timedtext.php. The manipulation of the argument ttml_url leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.5.1 is able to address this issue. The name of the patch is 3f39f2d68d11895929c04f7b49b97a734ae7cd1f. It is recommended to upgrade the affected component. VDB-216862 is the identifier assigned to this vulnerability. | [] |
|
GHSA-4xwc-mm2x-2868 | Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2023-21736, CVE-2023-21738. | [] |
|
GHSA-fhpr-42xj-phj9 | A specifically crafted packet sent by an attacker to EIPStackGroup OpENer EtherNet/IP commits and versions prior to Feb 10, 2021 may result in a denial-of-service condition. | [] |
|
GHSA-7hxg-9wxx-g3mp | The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process. | [] |
|
CVE-2014-1300 | Unspecified vulnerability in Apple Safari 7.0.2 on OS X allows remote attackers to execute arbitrary code with root privileges via unknown vectors, as demonstrated by Google during a Pwn4Fun competition at CanSecWest 2014. | [
"cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-xvqv-m23r-hxp7 | In the Linux kernel, the following vulnerability has been resolved:mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_reportFix possible array out of bound access in mt7921_mcu_tx_rate_report.
Remove unnecessary varibable in mt7921_mcu_tx_rate_report | [] |
|
GHSA-6m9f-9frj-6mpv | E-Series SANtricity OS Controller Software version 11.60.0 is susceptible to a vulnerability which allows an attacker to cause a Denial of Service (DoS) in IPv6 environments. | [] |
|
CVE-2024-32086 | WordPress Citadela Listing plugin <= 5.18.1 - Unauth. Sensitive Data Exposure vulnerability | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in AitThemes Citadela Listing.This issue affects Citadela Listing: from n/a through 5.18.1.
| [
"cpe:2.3:a:aitthemes:citadela:*:*:*:*:*:*:*:*"
] |
CVE-2024-5097 | SourceCodester Simple Inventory System tableedit.php#page=editprice cross-site request forgery | A vulnerability, which was classified as problematic, was found in SourceCodester Simple Inventory System 1.0. Affected is an unknown function of the file /tableedit.php#page=editprice. The manipulation of the argument itemnumber leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265080. | [
"cpe:2.3:a:simple_inventory_system_project:simple_inventory_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-rcq5-59gf-jqxv | IBM HMC (Hardware Management Console) 10.1.1010.0 and 10.2.1030.0 could allow a local user to escalate their privileges to root access on a restricted shell. IBM X-Force ID: 260740. | [] |
|
CVE-2024-11236 | Integer overflow in the firebird and dblib quoters causing OOB writes | In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, uncontrolled long string inputs to ldap_escape() function on 32-bit systems can cause an integer overflow, resulting in an out-of-bounds write. | [
"cpe:2.3:a:php_group:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] |
CVE-2024-5150 | Login with phone number <= 1.7.26 - Authentication Bypass due to Missing Empty Value Check | The Login with phone number plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.26. This is due to the 'activation_code' default value is empty, and the not empty check is missing in the 'lwp_ajax_register' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user email. The vulnerability is patched in version 1.7.26, but there is an issue in the patch that causes the entire function to not work, and this issue is fixed in version 1.7.27. | [] |
GHSA-qqx8-xhrr-9m9m | The Gallery Plugin for WordPress plugin before 1.8.4.7 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers | [] |
|
GHSA-6j7f-h4xq-x8r7 | IBM Data Risk Manager (iDNA) 2.0.6 could allow a remote authenticated attacker to upload arbitrary files, caused by the improper validation of file extensions. By sending a specially-crafted HTTP request, a remote attacker could exploit this vulnerability to upload a malicious file, which could allow the attacker to execute arbitrary code on the vulnerable system. IBM X-Force ID: 184979. | [] |
|
CVE-2017-8972 | A clickjacking vulnerability in HPE Matrix Operating Environment version 7.6 LR1 was found. | [
"cpe:2.3:a:hp:matrix_operating_environment:7.6:lr1:*:*:*:*:*:*"
] |
|
GHSA-3q8x-6m7c-5p98 | Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine. | [] |
|
GHSA-x8g9-h939-cmr5 | E6878-370 with versions of 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP1C00), 10.0.3.1(H563SP1C233) has a use after free vulnerability. The software references memory after it has been freed in certain scenario, the attacker does a series of crafted operations through web portal, successful exploit could cause a use after free condition which may lead to malicious code execution. | [] |
|
GHSA-7p7m-q926-gvc3 | The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.5.0 via the download_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary log files on the server, which can contain sensitive information. | [] |
|
GHSA-79xc-2343-62m7 | Cross-site scripting (XSS) vulnerability in the Control Center in Symantec Brightmail Gateway Appliance before 8.0.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2025-47725 | Out-of-bounds Write in CNCSoft | Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process. | [] |
GHSA-47j7-228r-59cw | MediaWiki before 1.19.6 and 1.20.x before 1.20.5 allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a CDATA section containing valid UTF-7 encoded sequences in a SVG file, which is then incorrectly interpreted as UTF-8 by Chrome and Firefox. | [] |
|
CVE-2018-3900 | An exploitable code execution vulnerability exists in the QR code scanning functionality of Yi Home Camera 27US 1.8.7.0D. A specially crafted QR Code can cause a buffer overflow, resulting in code execution. An attacker can make the camera scan a QR code to trigger this vulnerability. Alternatively, a user could be convinced to display a QR code from the internet to their camera, which could exploit this vulnerability. | [
"cpe:2.3:o:yitechnology:yi_home_camera_firmware:1.8.7.0d:*:*:*:*:*:*:*",
"cpe:2.3:h:yitechnology:yi_home_camera:-:*:*:*:*:*:*:*",
"cpe:2.3:a:yitechnology:yi_home:-:*:*:*:*:*:*:*"
] |
|
CVE-2007-3061 | Cactushop 6 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for (1) cactushop6.mdb or (2) cactushop5.mdb. | [
"cpe:2.3:a:cactusoft:cactushop:*:*:*:*:*:*:*:*"
] |
|
GHSA-8fmq-pc5w-mqrv | An issue was discovered in Adobe Digital Editions 4.5.6 and earlier versions. An exploitable memory corruption vulnerability exists, which could lead to disclosure of memory addresses. | [] |
|
GHSA-j6mr-cm6x-h6jg | OpenStack Glance Server-Side Request Forgery (SSRF) | An SSRF issue was discovered in OpenStack Glance before Newton. The 'copy_from' feature in the Image Service API v1 allowed an attacker to perform masked network port scans. With v1, it is possible to create images with a URL such as 'http://localhost:22'. This could then allow an attacker to enumerate internal network details while appearing masked, since the scan would appear to originate from the Glance Image service. | [] |
GHSA-78w2-qm8v-7wr9 | Integer overflow in Microsoft Windows Media Player (WMP) 11.0.5721.5260 allows remote attackers to cause a denial of service (application crash) via a crafted .mid file, as demonstrated by crash.mid. | [] |
|
CVE-2008-5542 | Sunbelt VIPRE 3.1.1832.2 and possibly 3.1.1633.1, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. | [
"cpe:2.3:a:sunbeltsoftware:vipre:3.1.1633.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sunbeltsoftware:vipre:3.1.1832.2:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*"
] |
|
CVE-2022-22097 | Memory corruption in graphic driver due to use after free while calling multiple threads application to driver. in Snapdragon Consumer IOT | [
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-9784 | Multiple buffer overflows in drivers/char/diag/diag_debugfs.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices allow attackers to gain privileges via a crafted application, aka Android internal bug 28442449 and Qualcomm internal bug CR585147. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-1003047 | A missing permission check in Jenkins Fortify on Demand Uploader Plugin 3.0.10 and earlier allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. | [
"cpe:2.3:a:jenkins:fortify_on_demand_uploader:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-9hf2-x6cm-637r | Multiple SQL injection vulnerabilities in WX-Guestbook 1.1.208 allow remote attackers to execute arbitrary SQL commands via the (1) QUERY parameter to search.php and (2) USERNAME parameter to login.php. NOTE: some of these details are obtained from third party information. | [] |
|
GHSA-364w-fgc6-8xr3 | Authenticated remote command injection vulnerabilities exist in the ArubaOS web-based management interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS. | [] |
|
CVE-2012-5799 | The Canada Post (aka CanadaPost) module in PrestaShop does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the PHP fsockopen function. | [
"cpe:2.3:a:prestashop:prestashop:-:*:*:*:*:*:*:*",
"cpe:2.3:a:presto-changeo:canadapost:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-2296 | PHP remote file inclusion vulnerability in include/bbs.lib.inc.php in Rgboard 3.0.12 allows remote attackers to execute arbitrary PHP code via a URL in the site_path parameter. | [
"cpe:2.3:a:rgboard:rgboard:3.0.12:*:*:*:*:*:*:*"
] |
|
GHSA-v95m-j7gp-qgr2 | An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation. | [] |
|
GHSA-3p26-6f92-v9vg | In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. | [] |
|
GHSA-4g2w-mjfj-p2m9 | An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). A remote file inclusion has been identified in the Connectors module allowing authenticated users to include remotely accessible system files via a module=CallRest&url= query string. Proper input validation has been added to mitigate this issue. | [] |
|
GHSA-2mwr-5rv2-5mxh | Unspecified vulnerability in the pollwakeup function in Sun Solaris 10, and OpenSolaris before snv_51, allows local users to cause a denial of service (panic) via unknown vectors. | [] |
|
CVE-2021-40394 | An out-of-bounds write vulnerability exists in the RS-274X aperture macro variables handling functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit 71493260). A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:gerbv_project:gerbv:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-14989 | A use-after-free in RenderFreetype in MagickCore/annotate.c in ImageMagick 7.0.7-4 Q16 allows attackers to crash the application via a crafted font file, because the FT_Done_Glyph function (from FreeType 2) is called at an incorrect place in the ImageMagick code. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.7-4:*:*:*:*:*:*:*"
] |
|
GHSA-49mm-8468-22hq | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Themeisle Otter Blocks PRO.This issue affects Otter Blocks PRO: from n/a through 2.6.11. | [] |
|
GHSA-5j3j-rq5g-q8c8 | Software Center in Ubuntu 11.10, 11.04 10.10 does not properly validate server certificates, which allows remote attackers to execute arbitrary code or obtain sensitive information via a man-in-the-middle (MITM) attack. | [] |
|
CVE-2018-5096 | A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Thunderbird < 52.6. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-7676 | A weak password vulnerability was discovered in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password for the admin account. | [
"cpe:2.3:a:enphase:envoy:*:*:*:*:*:*:*:*"
] |
|
GHSA-9v5x-c64h-25w9 | SQL injection vulnerability in user_read_links.php in Addalink 1.0 beta 4 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the category_id parameter. | [] |
|
GHSA-v77r-xjxp-g9v2 | Dolphin Browser 2.5.0 on the HTC Hero allows remote attackers to cause a denial of service (application crash) via JavaScript that writes <marquee> sequences in an infinite loop. | [] |
|
CVE-2011-2407 | Unspecified vulnerability in HP OpenView Performance Insight 5.3, 5.31, 5.4, 5.41, 5.41.001, and 5.41.002 allows remote attackers to obtain access via unknown vectors. | [
"cpe:2.3:a:hp:openview_performance_insight:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_performance_insight:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_performance_insight:5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_performance_insight:5.41:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_performance_insight:5.41.001:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_performance_insight:5.41.002:*:*:*:*:*:*:*"
] |
|
CVE-2006-5378 | Unspecified vulnerability in JD Edwards HTML Server in JD Edwards EnterpriseOne SP23_O2, 8.95.P1, and 8.96.D1 has unknown impact and remote authenticated attack vectors, aka Vuln# JDE01. | [
"cpe:2.3:a:oracle:enterpriseone:8.95.p1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterpriseone:8.96.d1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterpriseone:sp23_o2:*:*:*:*:*:*:*"
] |
|
GHSA-j656-gjx8-2337 | Reflected XSS in wordpress plugin pondol-formmail v1.1 | [] |
|
CVE-2023-2719 | SupportCandy < 3.1.7 - Subscriber+ SQLi | The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber. | [
"cpe:2.3:a:supportcandy:supportcandy:*:*:*:*:*:wordpress:*:*"
] |
CVE-2008-2022 | Mulatiple cross-site scripting (XSS) vulnerabilities in PD9 Software MegaBBS 2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) toid parameter to send-private-message.asp and the (2) redirect parameter to admin/impersonate.asp. NOTE: vector 2 requires authentication. | [
"cpe:2.3:a:pd9_software:megabbs:2.2:*:*:*:*:*:*:*"
] |
|
CVE-2013-6481 | libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read. | [
"cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*"
] |
|
CVE-2024-43318 | WordPress E2Pdf – Export To Pdf Tool for WordPress plugin <= 1.25.05 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in E2Pdf.Com allows Stored XSS.This issue affects e2pdf: from n/a through 1.25.05. | [
"cpe:2.3:a:e2pdf:e2pdf:*:*:*:*:*:wordpress:*:*"
] |
CVE-2023-42063 | PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20943. | [
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:9.5.368.0:*:*:*:*:*:*:*"
] |
CVE-2014-8025 | The API in the Guest Server in Cisco Jabber, when HTML5 is used, allows remote attackers to obtain sensitive information by sniffing the network during an HTTP (1) GET or (2) POST response, aka Bug ID CSCus19801. | [
"cpe:2.3:a:cisco:jabber_guest:*:*:*:*:*:*:*:*"
] |
|
GHSA-7gxp-888w-8h8j | data/interfaces/default/history.html in Tautulli 2.1.26 has XSS via a crafted Plex username that is mishandled when constructing the History page. | [] |
|
GHSA-7hfg-46m3-rhv2 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] |
|
CVE-2000-0325 | The Microsoft Jet database engine allows an attacker to execute commands via a database query, aka the "VBA Shell" vulnerability. | [
"cpe:2.3:a:microsoft:jet:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:jet:3.5.1:*:*:*:*:*:*:*"
] |
|
CVE-2014-5000 | The login function in lib/lawn.rb in the lawn-login gem 0.0.7 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process. | [
"cpe:2.3:a:lawn-login_project:lawn-login:0.0.7:*:*:*:*:ruby:*:*"
] |
|
GHSA-gx4f-976g-7g6v | XWiki Platform vulnerable to data leak via Improper Restriction of XML External Entity Reference | ImpactAny user with edit rights on a document can trigger a XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host.Example to reproduce:Create a forget XAR file and inside it, have the following `package.xml` content:Upload it onto a wiki page (e.g. `XXE`) as an attachment (e.g. `test.xar`).Call the page using `http://localhost:8080/xwiki/bin/view/Main/XXE?sheet=XWiki.AdminImportSheet&file=test.xar`You'll then notice that the displayed UI contains the content of the `/etc/passwd` file.PatchesThe vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1.WorkaroundsYou'd need to get XWiki Platform sources and apply the changes from https://github.com/xwiki/xwiki-platform/commit/e3527b98fdd8dc8179c24dc55e662b2c55199434 to the `XarPackage` java class and then copy the modified version to your `WEB-INF/classes` directory (or rebuild the `xwiki-platform-xar-model` maven module and replace the one found in `WEB-INF/lib/`).Referenceshttps://github.com/xwiki/xwiki-platform/commit/e3527b98fdd8dc8179c24dc55e662b2c55199434https://jira.xwiki.org/browse/XWIKI-20320For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected]) | [] |
GHSA-4p62-89gc-qx2w | Adobe Media Encoder version 15.2 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2025-1214 | pihome-shc PiHome Role-Based Access Control user_accounts.php authorization | A vulnerability classified as critical has been found in pihome-shc PiHome 2.0. This affects an unknown part of the file /user_accounts.php?uid of the component Role-Based Access Control. The manipulation leads to missing authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
CVE-2012-0740 | Cross-site scripting (XSS) vulnerability in the Web Admin Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.22 and 6.3 before 6.3.0.11 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:ibm:tivoli_directory_server:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.10:*:*:*:*:*:*:*"
] |
|
CVE-2018-13723 | The mintToken function of a smart contract implementation for SERVVIZIOToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:servviziotoken_project:servviziotoken:-:*:*:*:*:*:*:*"
] |
|
CVE-2003-0695 | Multiple "buffer management errors" in OpenSSH before 3.7.1 may allow attackers to cause a denial of service or execute arbitrary code using (1) buffer_init in buffer.c, (2) buffer_free in buffer.c, or (3) a separate function in channels.c, a different vulnerability than CVE-2003-0693. | [
"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-3640 | Untrusted search path vulnerability in Mozilla Network Security Services (NSS), as used in Google Chrome before 17 on Windows and Mac OS X, might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory. NOTE: the vendor's response was "Strange behavior, but we're not treating this as a security bug." | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-qhpw-xfc5-j23j | Multiple cross-site scripting (XSS) vulnerabilities in CQ Web in IBM Rational ClearQuest 7.0.0 before 7.0.0.4 and 7.0.1 before 7.0.1.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2022-21422 | Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Connection Manager). Supported versions that are affected are 12.0.0.4 and 12.0.0.5. Difficult to exploit vulnerability allows low privileged attacker with network access via TCP to compromise Oracle Communications Billing and Revenue Management. Successful attacks of this vulnerability can result in takeover of Oracle Communications Billing and Revenue Management. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-7fjp-x968-hg59 | There is an insufficient integrity check vulnerability in Huawei Sound X Product. The system does not check certain software package's integrity sufficiently. Successful exploit could allow an attacker to load a crafted software package to the device. Affected product versions include:AIS-BW80H-00 versions 9.0.3.1(H100SP13C00),9.0.3.1(H100SP18C00),9.0.3.1(H100SP3C00),9.0.3.1(H100SP9C00),9.0.3.2(H100SP1C00),9.0.3.2(H100SP2C00),9.0.3.2(H100SP5C00),9.0.3.2(H100SP8C00),9.0.3.3(H100SP1C00). | [] |
|
GHSA-wr2x-hp98-m8g3 | Dell PowerScale OneFS contains an Unsynchronized Access to Shared Data in a Multithreaded Context in SMB CA handling. An authenticated user of SMB on a cluster with CA could potentially exploit this vulnerability, leading to a denial of service over SMB. | [] |
|
CVE-2016-3861 | LibUtils in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 mishandles conversions between Unicode character encodings with different encoding widths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted file, aka internal bug 29250543. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-32509 | WordPress WP Cost Estimation & Payment Forms Builder plugin <= 10.1.76 - Broken Access Control vulnerability | Missing Authorization vulnerability in Loopus WP Cost Estimation & Payment Forms Builder.This issue affects WP Cost Estimation & Payment Forms Builder: from n/a through 10.1.76.
| [] |
CVE-2021-44491 | An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause a calculation of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c to result in an extremely large value in order to cause a segmentation fault and crash the application. This is a digs-- calculation. | [
"cpe:2.3:a:fisglobal:gt.m:*:*:*:*:*:*:*:*",
"cpe:2.3:a:yottadb:yottadb:*:*:*:*:*:*:*:*"
] |
|
GHSA-cgh3-c9p3-pqwq | Clipcomm CPW-100E VoIP 802.11b Wireless Handset Phone running firmware 1.1.12 (051129) and CP-100E VoIP 802.11b Wireless Phone running firmware 1.1.60 allows remote attackers to gain unauthorized access via the debug service on TCP port 60023. | [] |
|
CVE-2025-23787 | WordPress Easy Bet Plugin <= 1.0.7 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy Bet allows Reflected XSS. This issue affects Easy Bet: from n/a through 1.0.7. | [] |
GHSA-x2hg-rgmp-3453 | The SOCKS4 Proxy in Microsoft Internet Security and Acceleration (ISA) Server 2004 SP1 and SP2 allows remote attackers to obtain potentially sensitive information (the destination IP address of another user's session) via an empty packet. | [] |
|
CVE-2012-2085 | The exec_command function in common/helpers.py in Gajim before 0.15 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in an href attribute. | [
"cpe:2.3:a:gajim:gajim:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.12.5:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.12.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gajim:gajim:0.14.3:*:*:*:*:*:*:*"
] |
|
GHSA-97rf-r5hv-frfc | NetApp OnCommand Unified Manager for 7-mode (core package) versions prior to 5.2.1 are susceptible to a clickjacking or "UI redress attack" which could be used to cause a user to perform an unintended action in the user interface. | [] |
|
GHSA-2mff-8r7p-g487 | Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.