id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2014-0877 | IBM Cognos TM1 10.2.0.2 before IF1 and 10.2.2.0 before IF1 allows remote attackers to bypass intended access restrictions by visiting the Rights page and then following a generated link. | [
"cpe:2.3:a:ibm:cognos_tm1:10.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_tm1:10.2.2.0:*:*:*:*:*:*:*"
] |
|
GHSA-fg4r-f9j2-36mw | Jenkins Cross-Site Request Forgery vulnerabilities | Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of binaries to a Maven repository via unspecified vectors. | [] |
CVE-2016-6620 | An issue was discovered in phpMyAdmin. Some data is passed to the PHP unserialize() function without verification that it's valid serialized data. The unserialization can result in code execution because of the interaction with object instantiation and autoloading. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.4.15.7:*:*:*:*:*:*:*"
] |
|
CVE-2017-16826 | The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file. | [
"cpe:2.3:a:gnu:binutils:2.29.1:*:*:*:*:*:*:*"
] |
|
GHSA-fw26-r382-xg5p | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jinwen js allows Reflected XSS.This issue affects js paper: from n/a through 2.5.7. | [] |
|
GHSA-33jw-8g2v-hrp6 | The default configuration of Apache Maven 3.0.4, when using Maven Wagon 2.1, disables SSL certificate checks, which allows remote attackers to spoof servers via a man-in-the-middle (MITM) attack. | [] |
|
CVE-2020-27558 | Use of an undocumented user in BASETech GE-131 BT-1837836 firmware 20180921 allows remote attackers to view the video stream. | [
"cpe:2.3:o:basetech:ge-131_bt-1837836_firmware:20180921:*:*:*:*:*:*:*",
"cpe:2.3:h:basetech:ge-131_bt-1837836:-:*:*:*:*:*:*:*"
] |
|
GHSA-wg94-424h-gj5g | A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /inventory/suppliers_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | [] |
|
GHSA-3wwg-wvhq-f8q7 | Buffer Overflow vulnerability in Redis RedisGraph v.2.x through v.2.12.8 and fixed in v.2.12.9 allows an attacker to execute arbitrary code via the code logic after valid authentication. | [] |
|
CVE-2016-4491 | The d_print_comp function in cp-demangle.c in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, which triggers infinite recursion and a buffer overflow, related to a node having "itself as ancestor more than once." | [
"cpe:2.3:a:gnu:libiberty:*:*:*:*:*:*:*:*"
] |
|
CVE-1999-0275 | Denial of service in Windows NT DNS servers by flooding port 53 with too many characters. | [
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-28867 | WordPress Frontpage category filter plugin <= 1.0.2 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in stesvis Frontpage category filter allows Cross Site Request Forgery. This issue affects Frontpage category filter: from n/a through 1.0.2. | [] |
GHSA-688c-3x49-6rqj | rack-protection gem timing attack vulnerability when validating CSRF token | Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0. | [] |
CVE-2005-3926 | Direct static code injection vulnerability in error.php in GuppY 4.5.9 and earlier, when register_globals is disabled, allows remote attackers to execute arbitrary PHP code via the _SERVER[REMOTE_ADDR] parameter, which is injected into a .inc script that is later included by the main script. | [
"cpe:2.3:a:guppy:guppy:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:guppy:guppy:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:guppy:guppy:4.5.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:guppy:guppy:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:guppy:guppy:4.5.9:*:*:*:*:*:*:*"
] |
|
GHSA-5hxw-hj35-72m2 | SQL injection vulnerability in the Wir ber uns [sic] (fsmi_people) extension 0.0.24 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [] |
|
GHSA-6f9p-g466-f8v8 | blamer vulnerable to Arbitrary Argument Injection via the blameByFile() API | Versions of the package blamer before 1.0.4 are vulnerable to Arbitrary Argument Injection via the blameByFile() API. The library does not sanitize for user input or validate the given file path conforms to a specific schema, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options. | [] |
GHSA-3492-v7j6-2xgv | An issue was discovered in GitLab CE/EE affecting all versions starting from 16.1 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows non-project member to promote key results to objectives. | [] |
|
CVE-2006-4075 | Multiple PHP remote file inclusion vulnerabilities in Wim Fleischhauer docpile: wim's edition (docpile:we) 0.2.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the INIT_PATH parameter to (1) lib/folder.class.php, (2) lib/email.inc.php, (3) lib/document.class.php or (4) lib/auth.inc.php. | [
"cpe:2.3:a:wim_fleischhauer:docpile_we:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-4181 | Use-after-free vulnerability in the nsSMILAnimationController::DoSample function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-6826 | The ff_rv34_decode_init_thread_copy function in libavcodec/rv34.c in FFmpeg before 2.7.2 does not initialize certain structure members, which allows remote attackers to cause a denial of service (invalid pointer access) or possibly have unspecified other impact via crafted (1) RV30 or (2) RV40 RealVideo data. | [
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] |
|
GHSA-8xgx-75qw-6268 | Improper privilege management in pyftpdlib | The ftp_PORT function in FTPServer.py in pyftpdlib before 0.2.0 does not prevent TCP connections to privileged ports if the destination IP address matches the source IP address of the connection from the FTP client, which might allow remote authenticated users to conduct FTP bounce attacks via crafted FTP data, as demonstrated by an FTP bounce attack against a NAT server, a related issue to CVE-1999-0017. | [] |
CVE-2015-0149 | The developer portal in IBM API Management 3.0 before 3.0.4.1 does not properly restrict access to the public and private APIs, which allows remote authenticated users to obtain sensitive information or modify data via unspecified API calls. | [
"cpe:2.3:a:ibm:api_management:3.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:api_management:3.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:api_management:3.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:api_management:3.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:api_management:3.0.4.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-4646 | (1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input. | [
"cpe:2.3:a:squashfs_project:squashfs:*:*:*:*:*:*:*:*"
] |
|
GHSA-89vw-mgg8-jw84 | MDaemon Webmail 14.x through 18.x before 18.5.2 has XSS (issue 2 of 2). | [] |
|
CVE-2024-26001 | PHOENIX CONTACT: Out of bounds write only memory access | An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization. | [
"cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:*"
] |
CVE-2025-31218 | This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.5. An app may be able to observe the hostnames of new network connections. | [] |
|
GHSA-p8fg-cfcq-5gpc | Multiple SQL injection vulnerabilities in admin_login.asp in BlogMe 3.0 allow remote attackers to execute arbitrary SQL commands via the (1) Username or (2) Password field. NOTE: some of these details are obtained from third party information. | [] |
|
GHSA-7chq-pmg6-6mv3 | Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13 does not properly restrict access to private callback components, which allows remote attackers to have an unspecified impact via a direct request. | [] |
|
CVE-2023-51297 | A lack of rate limiting in the 'Email Settings' feature of PHPJabbers Hotel Booking System v4.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages. | [] |
|
GHSA-qghg-2qh6-5v9j | NETGEAR RAX40 devices before 1.0.3.80 are affected by incorrect configuration of security settings. | [] |
|
GHSA-vgc4-g2ff-j2wj | IPSec in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles encryption negotiation, which allows remote authenticated users to cause a denial of service (system hang) via crafted IP traffic, aka "Windows IPSec Denial of Service Vulnerability." | [] |
|
GHSA-5pv7-hx9m-8jh3 | Missing permission checks in Jenkins Publish Over FTP Plugin | Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials. | [] |
GHSA-r9xf-wjgv-hmjp | FusionSphere OpenStack V100R006C00 has an information exposure vulnerability. The software uses hard-coded cryptographic key to encrypt messages between certain components, which significantly increases the possibility that encrypted data may be recovered and results in information exposure. | [] |
|
CVE-2025-46687 | quickjs-ng through 0.9.0 has a missing length check in JS_ReadString for a string, leading to a heap-based buffer overflow. QuickJS before 2025-04-26 is also affected. | [] |
|
GHSA-ff9m-5565-gwrj | Multiple cross-site scripting (XSS) vulnerabilities in Prestashop before 1.5 allow remote attackers to inject arbitrary web script or HTML via the (1) address or (2) relativ_base_dir parameter to modules/mondialrelay/googlemap.php; the (3) relativ_base_dir, (4) Pays, (5) Ville, (6) CP, (7) Poids, (8) Action, or (9) num parameter to prestashop/modules/mondialrelay/googlemap.php; (10) the num_mode parameter to modules/mondialrelay/kit_mondialrelay/RechercheDetailPointRelais_ajax.php; (11) the Expedition parameter to modules/mondialrelay/kit_mondialrelay/SuiviExpedition_ajax.php; or the (12) folder or (13) name parameter to admin/ajaxfilemanager/ajax_save_text.php. | [] |
|
CVE-2007-1238 | Microsoft Office 2003 allows user-assisted remote attackers to cause a denial of service (application crash) by attempting to insert a corrupted WMF file. | [
"cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:*"
] |
|
CVE-2020-13561 | An out-of-bounds write vulnerability exists in the TIFF parser of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:accusoft:imagegear:19.8:*:*:*:*:*:*:*"
] |
|
CVE-2021-28026 | jpeg-xl v0.3.2 is affected by a heap buffer overflow in /lib/jxl/coeff_order.cc ReadPermutation. When decoding a malicous jxl file using djxl, an attacker can trigger arbitrary code execution or a denial of service. | [
"cpe:2.3:a:jpeg:jpeg-xl:0.3.2:*:*:*:*:*:*:*"
] |
|
CVE-2018-18319 | An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because api.php has an eval call, as demonstrated by the /6/api.php?function=command&class=remote&Cc='ls' URI. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution | [
"cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac68uf_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac68uf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac87_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac87:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac1900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac1900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac86u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac86u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac2900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac2900:-:*:*:*:*:*:*:*"
] |
|
GHSA-pwjp-r4cj-h394 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sevenspark Bellows Accordion Menu allows Stored XSS. This issue affects Bellows Accordion Menu: from n/a through 1.4.3. | [] |
|
CVE-2025-3330 | codeprojects Online Restaurant Management System reservation_save.php sql injection | A vulnerability classified as critical was found in codeprojects Online Restaurant Management System 1.0. This vulnerability affects unknown code of the file /reservation_save.php. The manipulation of the argument first leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [] |
CVE-2018-16303 | PDF-XChange Editor through 7.0.326.1 allows remote attackers to cause a denial of service (resource consumption) via a crafted x:xmpmeta structure, a related issue to CVE-2003-1564. | [
"cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-2844 | Google Chrome before 14.0.835.163 does not properly process MP3 files, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-q8m7-5gp8-mgvg | The WooCommerce EnvioPack WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the dataid parameter found in the ~/includes/functions.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2. | [] |
|
GHSA-jgxm-pq42-x2j8 | Incorrect access control in Xinference before v1.4.0 allows attackers to access the Web GUI without authentication. | [] |
|
GHSA-rrxr-p69x-ghh9 | Unauthorized node injection vulnerability in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. | [] |
|
CVE-2015-8854 | The marked package before 0.3.4 for Node.js allows attackers to cause a denial of service (CPU consumption) via unspecified vectors that trigger a "catastrophic backtracking issue for the em inline rule," aka a "regular expression denial of service (ReDoS)." | [
"cpe:2.3:a:marked_project:marked:*:*:*:*:*:node.js:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
] |
|
GHSA-qmw9-5q6h-hjxj | The System Dashboard WordPress plugin before 2.8.10 does not sanitize and escape some parameters, which could allow administrators in multisite WordPress configurations to perform Cross-Site Scripting attacks | [] |
|
CVE-2015-4357 | Cross-site scripting (XSS) vulnerability in the Webform module before 6.x-3.22, 7.x-3.x before 7.x-3.22, and 7.x-4.x before 7.x-4.4 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via a node title, which is used as the default title of a webform block. | [
"cpe:2.3:a:webform_project:webform:*:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.2:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.3:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.4:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.5:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.6:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.7:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.8:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.9:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.10:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.11:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.12:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.13:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.14:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.15:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.16:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.17:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.18:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.19:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.20:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-3.21:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-4.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-4.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-4.2:*:*:*:*:drupal:*:*",
"cpe:2.3:a:webform_project:webform:7.x-4.3:*:*:*:*:drupal:*:*"
] |
|
CVE-2010-2850 | Directory traversal vulnerability in productionnu2/fileuploader.php in nuBuilder 10.04.20, and possibly other versions before 10.07.12, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the dir parameter. | [
"cpe:2.3:a:nusoftware:nubuilder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nusoftware:nubuilder:09.06.10:*:*:*:*:*:*:*",
"cpe:2.3:a:nusoftware:nubuilder:09.06.26:*:*:*:*:*:*:*",
"cpe:2.3:a:nusoftware:nubuilder:09.07.24:*:*:*:*:*:*:*",
"cpe:2.3:a:nusoftware:nubuilder:09.08.20:*:*:*:*:*:*:*",
"cpe:2.3:a:nusoftware:nubuilder:09.09.23:*:*:*:*:*:*:*"
] |
|
CVE-2021-3586 | A flaw was found in servicemesh-operator. The NetworkPolicy resources installed for Maistra do not properly specify which ports may be accessed, allowing access to all ports on these resources from any pod. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [
"cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:servicemesh-operator:2.0.5.1:*:*:*:*:*:*:*"
] |
|
GHSA-vrhv-32q9-93jj | Advancecomp v2.3 was discovered to contain a heap buffer overflow via le_uint32_read at /lib/endianrw.h. | [] |
|
CVE-2021-21948 | A heap-based buffer overflow vulnerability exists in the readDatHeadVec functionality of AnyCubic Chitubox AnyCubic Plugin 1.0.0. A specially-crafted GF file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:chitubox:chitubox_basic:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:anycubic:chitubox:1.0.0:*:*:*:*:anycubic:*:*"
] |
|
GHSA-rcf2-qf65-j8cp | The UDP process in Cisco IOS XR 4.3.1 does not free packet memory upon detecting full packet queues, which allows remote attackers to cause a denial of service (memory consumption) via UDP packets to listening ports, aka Bug ID CSCue69413. | [] |
|
CVE-2017-14415 | D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) devices have XSS in the action parameter to htdocs/web/sitesurvey.php. | [
"cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-850l_firmware:fw114wwb07_h2ab:beta1:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-38067 | Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability | Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] |
CVE-2003-0117 | Buffer overflow in the HTTP receiver function (BizTalkHTTPReceive.dll ISAPI) of Microsoft BizTalk Server 2002 allows attackers to execute arbitrary code via a certain request to the HTTP receiver. | [
"cpe:2.3:a:microsoft:biztalk_server:2002:*:developer:*:*:*:*:*",
"cpe:2.3:a:microsoft:biztalk_server:2002:*:enterprise:*:*:*:*:*"
] |
|
GHSA-w96p-g4xq-chrg | An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF with an object encoded w/ multiple encoding types terminating with an LZW encoded type, an overflow may occur due to a lack of bounds checking by the LZW decoder. This can lead to code execution under the context of the account of the user running it. | [] |
|
CVE-2002-0629 | The Telnet service for Polycom ViewStation before 7.2.4 allows remote attackers to cause a denial of service (crash) via multiple connections to the server. | [
"cpe:2.3:h:polycom:viewstation_128:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_128:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_512:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_512:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_dcp:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_dcp:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_fx_vs4000:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_h.323:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_h.323:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_mp:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_mp:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_sp_384:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_sp_384:7.2:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_v.35:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:viewstation_v.35:7.2:*:*:*:*:*:*:*"
] |
|
CVE-2017-17544 | A privilege escalation vulnerability in Fortinet FortiOS 6.0.0 to 6.0.6, 5.6.0 to 5.6.10, 5.4 and below allows admin users to elevate their profile to super_admin via restoring modified configurations. | [
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"
] |
|
GHSA-wp35-336h-g4rc | NVIDIA GeForce Experience contains a vulnerability in the NVContainer component, where a user without administrator privileges can create a symbolic link to a file that requires elevated privileges to write to or modify, which may lead to denial of service, escalation of privilege or limited data tampering. | [] |
|
CVE-2024-3888 | tagDiv Composer <= 4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via button Shortcode | The tagDiv Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's button shortcode in all versions up to, and including, 4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: The vulnerable code in this plugin is specifically tied to the tagDiv Newspaper theme. If another theme is installed (e.g., NewsMag), this code may not be present. | [] |
CVE-2016-10864 | NETGEAR EX7000 V1.0.0.42_1.0.94 devices allow XSS via the SSID. | [
"cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-14717 | Verifone Verix OS on VerixV Pinpad Payment Terminals with QT000530 have a Buffer Overflow via the Run system call. | [
"cpe:2.3:o:verifone:verix_os:qt000530:*:*:*:*:*:*:*",
"cpe:2.3:h:verifone:vx520:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-39378 | Displaying user badges can leak topic titles to users that have no access to the topic | Discourse is a platform for community discussion. Under certain conditions, a user badge may have been awarded based on a user's activity in a topic with restricted access. Before this vulnerability was disclosed, the topic title of the topic associated with the user badge may be viewed by any user. If there are sensitive information in the topic title, it will therefore have been exposed. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. There are currently no known workarounds available. | [
"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta9:*:*:*:*:*:*"
] |
CVE-2025-25616 | Unifiedtransform 2.0 is vulnerable to Incorrect Access Control, which allows students to modify rules for exams. The affected endpoint is /exams/edit-rule?exam_rule_id=1. | [] |
|
CVE-2022-21341 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | [
"cpe:2.3:a:oracle:graalvm:20.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*",
"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update311:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update321:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:17.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2014-0296 | The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
] |
|
GHSA-37jw-9hhw-q8w8 | An elevation of privilege vulnerability exists when the Windows Picker Platform improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Picker Platform Elevation of Privilege Vulnerability'. | [] |
|
GHSA-pwh8-58vv-vw48 | Jetty's OpenId Revoked authentication allows one request | If a Jetty `OpenIdAuthenticator` uses the optional nested `LoginService`, and that `LoginService` decides to revoke an already authenticated user, then the current request will still treat the user as authenticated. The authentication is then cleared from the session and subsequent requests will not be treated as authenticated.So a request on a previously authenticated session could be allowed to bypass authentication after it had been rejected by the `LoginService`.ImpactThis impacts usages of the jetty-openid which have configured a nested `LoginService` and where that `LoginService` will is capable of rejecting previously authenticated users.Original Reportworking on a custom OpenIdAuthenticator, I discovered the following:https://github.com/eclipse/jetty.project/blob/jetty-10.0.14/jetty-openid/src/main/java/org/eclipse/jetty/security/openid/OpenIdAuthenticator.java#L505In the case where the LoginService does return that the authentication has been revoked (from the validate() call on line 463), the OpenIdAuthenticator removes the authentication from the session; however the current request still proceeds as if authenticated, since it falls through to "return authentication" on line 505.This is fixed by moving the line 505 (and associated debug log) inside the else block that ends on line 502, instead of outside it. Then the revocation case will run through to line 517 and will trigger a new OpenId authentication which I think is correct.I think this revocation can only occur if you do attach a separate LoginService to the OpenIdLoginService, but in that case the revoked authentication will still let the next request through (and possibly more than one if they are very close to simultaneous).Technically I think this is a security vulnerability, if a very minor one, so I'm sending this off-list.Patched VersionsFixed in Jetty Versions:9.4.52 - fixed in PR https://github.com/eclipse/jetty.project/pull/966010.0.16 - fixed in PR https://github.com/eclipse/jetty.project/pull/952811.0.16 - fixed in PR https://github.com/eclipse/jetty.project/pull/952812.0.0 - not impacted (already has fix)WorkaroundUpgrade your version of Jetty.Referenceshttps://github.com/eclipse/jetty.project/pull/9528https://github.com/eclipse/jetty.project/pull/9660 | [] |
CVE-2024-2503 | The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Post Grid Widget in all versions up to, and including, 2.6.9.2 due to insufficient input sanitization and output escaping on user supplied tags. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. CVE-2024-32557 is likely a duplicate of this issue. | [] |
|
GHSA-49rj-992g-44xv | Unspecified vulnerability in CarbonCore in Apple Mac OS X 10.4.11 and 10.5.6 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted resource fork that triggers memory corruption. | [] |
|
GHSA-x38m-486c-2wr9 | Denial-of-service possibility in logout() view by filling session store | The (1) `contrib.sessions.backends.base.SessionBase.flush` and (2) `cache_db.SessionStore.flush` functions in Django 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions create empty sessions in certain circumstances, which allows remote attackers to cause a denial of service (session store consumption) via unspecified vectors. | [] |
GHSA-2q2q-7pmr-fgp2 | SQL injection vulnerability in index.php in XeoPort 0.81, and possibly earlier, allows remote attackers to execute arbitrary SQL commands via the xp_body_text parameter. | [] |
|
CVE-2020-29163 | PacsOne Server (PACS Server In One Box) below 7.1.1 is affected by SQL injection. | [
"cpe:2.3:a:rainbowfishsoftware:pacsone_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-21130 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*"
] |
|
GHSA-9f3j-rqx7-6cfc | An information disclosure vulnerability in AOSP Messaging could enable a local malicious application to bypass operating system protections that isolate application data from other applications. This issue is rated as High because it could be used to gain access to data that the application does not have access to. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32807795. | [] |
|
GHSA-ffhv-q28c-fp4h | A vulnerability has been identified in TeleControl Server Basic < V3.1. An attacker with access to the TeleControl Server Basic's webserver (port 80/tcp or 443/tcp) could cause a Denial-of-Service condition on the web server. The remaining functionality of the TeleControl Server Basic is not affected by the Denial-of-Service condition. | [] |
|
GHSA-jg7x-2whq-4cvh | Citrix ShareFile through 19.1 allows User Enumeration. It is possible to enumerate application username based on different server responses using the request to check the otp code. No authentication is required. | [] |
|
CVE-2009-5095 | PHP remote file inclusion vulnerability in index_inc.php in ea gBook 0.1 and 0.1.4 allows remote attackers to execute arbitrary PHP code via a URL in the inc_ordner parameter. | [
"cpe:2.3:a:ea-style:gbook:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ea-style:gbook:0.1.4:*:*:*:*:*:*:*"
] |
|
CVE-2019-1984 | Cisco Enterprise Network Functions Virtualization Infrastructure Software Arbitrary File Write Vulnerability | A vulnerability in Cisco Enterprise Network Functions Virtualization Infrastructure Software (NFVIS) could allow an authenticated, remote attacker with administrator privileges to overwrite files on the underlying operating system (OS) of an affected device. The vulnerability is due to improper input validation in an NFVIS file-system command. An attacker could exploit this vulnerability by using crafted variables during the execution of an affected command. A successful exploit could allow the attacker to overwrite arbitrary files on the underlying OS. | [
"cpe:2.3:a:cisco:enterprise_network_function_virtualization_infrastructure_sofware:*:*:*:*:*:*:*:*"
] |
GHSA-8mf7-p7xv-mq52 | Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field in an esds chunk in MPEG-4 video data, a related issue to CVE-2015-1539. | [] |
|
CVE-2024-36922 | wifi: iwlwifi: read txq->read_ptr under lock | In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: read txq->read_ptr under lock
If we read txq->read_ptr without lock, we can read the same
value twice, then obtain the lock, and reclaim from there
to two different places, but crucially reclaim the same
entry twice, resulting in the WARN_ONCE() a little later.
Fix that by reading txq->read_ptr under lock. | [] |
CVE-2016-10782 | cPanel before 60.0.25 allows self stored XSS in postgres API1 listdbs (SEC-181). | [
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
GHSA-c3rp-4cjh-cp38 | Zope does not properly verify the access for objects with proxy roles | Zope 2.2.0 through 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration. | [] |
CVE-2001-0401 | Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. | [
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*"
] |
|
CVE-2008-1497 | Stack-based buffer overflow in the IMAP service in NetWin SurgeMail 38k4-4 and earlier allows remote authenticated users to execute arbitrary code via long arguments to the LSUB command. | [
"cpe:2.3:a:netwin:surgemail:1.8g3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:1.9b2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:2.0a2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:2.0c:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:2.0e:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:2.0g2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:2.1c7:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:2.2a6:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:2.2c10:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:2.2g2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:2.2g3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.0c2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.2e:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.5b3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.6f3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.6f5:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.6f7:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.7b:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.7b3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.7b5:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.7b6:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.7b7:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.7b8:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8b:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8d:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8f:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8f2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8f3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8i:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8i2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8i3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8k:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8k2:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8k3:*:*:*:*:*:*:*",
"cpe:2.3:a:netwin:surgemail:3.8m:*:*:*:*:*:*:*"
] |
|
CVE-2022-41099 | BitLocker Security Feature Bypass Vulnerability | BitLocker Security Feature Bypass Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*"
] |
CVE-2004-1973 | DiGi Web Server allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request that contains a large number of / (slash) characters, which consumes resources when DiGi converts the slashes to \ (backslash) characters. | [
"cpe:2.3:a:digi:www_server:compieuw:*:*:*:*:*:*:*",
"cpe:2.3:a:digi:www_server:compieuw:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digi:www_server:compieuw:beta2:*:*:*:*:*:*"
] |
|
CVE-2017-2698 | The ddr_devfreq driver in versions earlier than GRA-UL00C00B197 has buffer overflow vulnerability. An attacker with the root privilege of the Android system can tricks a user into installing a malicious application on the smart phone, and send given parameter to smart phone to crash the system or escalate privilege. | [
"cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*"
] |
|
GHSA-r2gg-p76x-g7qv | phpMyAdmin 2.2.0rc3 and earlier allows remote attackers to execute arbitrary commands by inserting them into (1) the strCopyTableOK argument in tbl_copy.php, or (2) the strRenameTableOK argument in tbl_rename.php. | [] |
|
CVE-2019-18281 | An out-of-bounds memory access in the generateDirectionalRuns() function in qtextengine.cpp in Qt qtbase 5.11.x and 5.12.x before 5.12.5 allows attackers to cause a denial of service by crashing an application via a text file containing many directional characters. | [
"cpe:2.3:a:qt:qtbase:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-2258 | Vulnerability in the Oracle Projects product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Projects. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Projects accessible data as well as unauthorized access to critical data or complete access to all Oracle Projects accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:projects:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-5452 | Unspecified vulnerability in Oracle Sun Solaris 11.3 allows local users to affect confidentiality via vectors related to Verified Boot. | [
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
] |
|
GHSA-fmhg-h6vw-qwgj | Race condition in the mounting process in vmware-mount in VMware Workstation 7.x before 7.1.2 build 301548 on Linux, VMware Player 3.1.x before 3.1.2 build 301548 on Linux, VMware Server 2.0.2 on Linux, and VMware Fusion 3.1.x before 3.1.2 build 332101 allows host OS users to gain privileges via vectors involving temporary files. | [] |
|
GHSA-cc54-3ghq-hp7j | Possible system denial of service in case of arbitrary changing Firefox browser parameters. An attacker could change specific Firefox browser parameters file in a certain way and then reboot the system to make the system unbootable. | [] |
|
GHSA-rf7q-xqm3-6923 | Apache Ranger allows remote authenticated administrators to inject arbitrary web script or HTML | Cross-site scripting (XSS) vulnerability in the create user functionality in the policy admin tool in Apache Ranger before 0.6.1 allows remote authenticated administrators to inject arbitrary web script or HTML via vectors related to policies. | [] |
CVE-2017-2277 | WG-C10 v3.0.79 and earlier allows an attacker to bypass access restrictions to obtain or alter information stored in the external storage connected to the product via unspecified vectors. | [
"cpe:2.3:o:sony:wg-c10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sony:wg-c10:-:*:*:*:*:*:*:*"
] |
|
GHSA-pqfc-h2m7-5p9p | On Windows, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12. | [] |
|
CVE-2017-14513 | Directory traversal vulnerability in MetInfo 5.3.17 allows remote attackers to read information from any ini format file via the f_filename parameter in a fingerprintdo action to admin/app/physical/physical.php. | [
"cpe:2.3:a:metinfo:metinfo:5.3.17:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.