id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2011-5027 | Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler. | [
"cpe:2.3:a:zabbix:zabbix:*:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.3:rc4:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.10:rc1:*:*:*:*:*:*"
] |
|
GHSA-pmwp-jmr4-5jjh | A Local File Inclusion vulnerability in the Site Editor plugin through 1.1.1 for WordPress allows remote attackers to retrieve arbitrary files via the ajax_path parameter to editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php, aka absolute path traversal. | [] |
|
GHSA-5f35-pq34-c87q | Apache Airflow missing Certificate Validation | Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP Provider before 3.3.0, and Apache Airflow before 2.7.0 are affected by the Validation of OpenSSL Certificate vulnerability.The default SSL context with SSL library did not check a server's X.509 certificate. Instead, the code accepted any certificate, which could result in the disclosure of mail server credentials or mail contents when the client connects to an attacker in a MITM position.Users are strongly advised to upgrade to Apache Airflow version 2.7.0 or newer, Apache Airflow IMAP Provider version 3.3.0 or newer, and Apache Airflow SMTP Provider version 1.3.0 or newer to mitigate the risk associated with this vulnerability | [] |
GHSA-mwj2-q2rm-26c8 | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities. | [] |
|
CVE-2025-26304 | A memory leak has been identified in the parseSWF_EXPORTASSETS function in util/parser.c of libming v0.4.8. | [] |
|
GHSA-cg25-vp3w-94mw | Certain patches for kpdf do not include all relevant patches from xpdf that were associated with CVE-2005-3627, which allows context-dependent attackers to exploit vulnerabilities that were present in CVE-2005-3627. | [] |
|
CVE-2006-3660 | Unspecified vulnerability in Microsoft PowerPoint 2003 has unknown impact and user-assisted attack vectors related to powerpnt.exe. NOTE: due to the lack of available details as of 20060717, it is unclear how this is related to CVE-2006-3655, CVE-2006-3656, and CVE-2006-3590, although it is possible that they are all different. | [
"cpe:2.3:a:microsoft:powerpoint:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2003:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2003:sp2:*:*:*:*:*:*"
] |
|
GHSA-qw7m-3wrp-h96f | Format string vulnerability in pw_error function in BSD libutil library allows local users to gain root privileges via a malformed password in commands such as chpass or passwd. | [] |
|
GHSA-rqq7-2qjm-35hj | WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1. | [] |
|
CVE-2017-16170 | liuyaserver is a static file server. liuyaserver is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. | [
"cpe:2.3:a:liuyaserver_project:liuyaserver:1.0.0:*:*:*:*:node.js:*:*"
] |
|
CVE-2017-6420 | The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression. | [
"cpe:2.3:a:clamav:clamav:0.99.2:*:*:*:*:*:*:*"
] |
|
CVE-2008-3740 | Cross-site scripting (XSS) vulnerability in the output filter in Drupal 5.x before 5.10 and 6.x before 6.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*"
] |
|
GHSA-7p78-g262-f9rp | LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.3. | [] |
|
GHSA-2ffh-54r5-v5h5 | SQL injection vulnerability in cat.php in SMSPages 1.0 in Mr.Saphp Arabic Script Mobile (aka Messages Library) 2.0 allows remote attackers to execute arbitrary SQL commands via the CatID parameter. | [] |
|
CVE-2018-6250 | NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where a NULL pointer dereference occurs which may lead to denial of service or possible escalation of privileges. | [
"cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-w946-xrfr-63w7 | Exponent CMS 2.3.9 suffers from a SQL injection vulnerability in "/framework/modules/help/controllers/helpController.php" affecting the version parameter. Impact is Information Disclosure. | [] |
|
GHSA-fvg8-xwx7-9x5m | GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page. | [] |
|
CVE-2018-1000547 | coreBOS version 7.0 and earlier contains a Incorrect Access Control vulnerability in Module: Contacts that can result in The error allows you to access records that you have no permissions to. . | [
"cpe:2.3:a:corebos:corebos:*:*:*:*:*:*:*:*"
] |
|
GHSA-crxj-hrmp-4rwf | Labstack Echo Open Redirect vulnerability | Labstack Echo v4.8.0 was discovered to contain an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF). Version 4.9.0 contains a patch for the issue. | [] |
GHSA-rhm4-pxh6-wp23 | A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6, macOS Big Sur 11.7. An app may be able to gain elevated privileges. | [] |
|
GHSA-x27v-x225-gq8g | Recurly gem Server-Side Request Forgery in Resource#find method | The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource#find` method that could result in compromise of API keys or other critical resources. | [] |
GHSA-49q4-89v2-j76r | inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. | [] |
|
CVE-2016-6317 | Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155. | [
"cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:4.2.7:rc1:*:*:*:*:*:*"
] |
|
GHSA-c85c-q2q3-96c6 | IBM Security Guardium Big Data Intelligence (SonarG) 3.1 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 136818. | [] |
|
GHSA-hxfh-2m8q-x5fv | A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/users_import.php URI. | [] |
|
GHSA-gw93-hfxx-5pfv | Directory traversal vulnerability in Lysias Lidik web server 0.7b allows remote attackers to list directories via an HTTP request with a ... (modified dot dot). | [] |
|
CVE-2024-50804 | Insecure Permissions vulnerability in Micro-star International MSI Center Pro 2.1.37.0 allows a local attacker to execute arbitrary code via the Device_DeviceID.dat.bak file within the C:\ProgramData\MSI\One Dragon Center\Data folder | [
"cpe:2.3:a:micro-star_international:msi_center_pro:*:*:*:*:*:*:*:*"
] |
|
CVE-1999-1294 | Office Shortcut Bar (OSB) in Windows 3.51 enables backup and restore permissions, which are inherited by programs such as File Manager that are started from the Shortcut Bar, which could allow local users to read folders for which they do not have permission. | [
"cpe:2.3:o:microsoft:windows_nt:3.51:*:*:*:*:*:*:*"
] |
|
GHSA-g4v5-f3x8-hh5w | Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property. | [] |
|
CVE-2005-0632 | PHP remote file inclusion vulnerability in auth.php in PHPNews 1.2.4 and possibly 1.2.3, allows remote attackers to execute arbitrary PHP code via the path parameter. | [
"cpe:2.3:a:phpnews:phpnews:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpnews:phpnews:1.2.4:*:*:*:*:*:*:*"
] |
|
GHSA-q5jg-rmvf-mrxc | Exemys Telemetry Web Server relies on an HTTP Location header to indicate that a client is unauthorized, which allows remote attackers to bypass intended access restrictions by disregarding this header and processing the response body. | [] |
|
CVE-2002-0808 | Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, when performing a mass change, sets the groupset of all bugs to the groupset of the first bug, which could inadvertently cause insecure groupset permissions to be assigned to some bugs. | [
"cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*"
] |
|
GHSA-6j6m-gqwx-34j8 | A vulnerability, which was classified as problematic, was found in Zylon PrivateGPT up to 0.6.2. This affects an unknown part of the file settings.yaml. The manipulation of the argument allow_origins leads to permissive cross-domain policy with untrusted domains. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-5fvp-953q-q2rj | N.V.K.INTER CO., LTD. (NVK) iBSG v3.5 was discovered to contain a command injection vulnerability via the system_hostname parameter at /manage/network-basic.php. | [] |
|
CVE-2008-6319 | SQL injection vulnerability in calendarevent.cfm in CF_Calendar allows remote attackers to execute arbitrary SQL commands via the calid parameter. | [
"cpe:2.3:a:cfmsource:cf_calendar:-:*:*:*:*:*:*:*"
] |
|
GHSA-v725-c588-h936 | OpenStack Nova Changing vnic_type breaks compute service restart | An issue was discovered in OpenStack Nova before 23.2.2, 24.x before 24.1.2, and 25.x before 25.0.2. By creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap, an authenticated user may cause the compute service to fail to restart, resulting in a possible denial of service. Only Nova deployments configured with SR-IOV are affected. | [] |
GHSA-68w5-wwh2-7923 | The Threadflip : Buy, Sell Fashion (aka com.threadflip.android) application 1.1.11 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2021-46893 | Vulnerability of unstrict data verification and parameter check. Successful exploitation of this vulnerability may affect integrity. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-23694 |
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
| [
"cpe:2.3:a:dell:vxrail_hyperconverged_infrastructure:*:*:*:*:*:*:*:*"
] |
|
GHSA-6ph5-gf8v-wvm9 | Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c. | [] |
|
CVE-2020-35037 | Events Manager < 5.9.8 - Cross-Site Scripting (XSS) | The Events Manager WordPress plugin before 5.9.8 does not sanitise and escape some search parameter before outputing them in pages, which could lead to Cross-Site Scripting issues | [
"cpe:2.3:a:pixelite:events_manager:*:*:*:*:*:wordpress:*:*"
] |
CVE-2017-2865 | An exploitable vulnerability exists in the firmware update functionality of Circle with Disney. Specially crafted network packets can cause the product to run an attacker-supplied shell script. An attacker can intercept and alter network traffic to trigger this vulnerability. | [
"cpe:2.3:o:meetcircle:circle_with_disney_firmware:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:meetcircle:circle_with_disney:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-23593 | Segfault in `simplifyBroadcast` in Tensorflow | Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow is vulnerable to a segfault (hence, denial of service), if called with scalar shapes. If all shapes are scalar, then `maxRank` is 0, so we build an empty `SmallVector`. The fix will be included in TensorFlow 2.8.0. This is the only affected version. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] |
GHSA-6hfm-9hrf-689c | In Quest KACE Systems Management Appliance (SMA) through 12.0, predictable token generation occurs when appliance linking is enabled. | [] |
|
CVE-2018-12041 | An issue was discovered on the MediaTek AWUS036NH wireless USB adapter through 5.1.25.0. Attackers can remotely deny service by sending specially constructed 802.11 frames. | [
"cpe:2.3:o:mediatek:awus036nh_firmware:5.1.25.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:awus036nh:-:*:*:*:*:*:*:*"
] |
|
GHSA-vx6j-975v-q7xp | The Sandbox Profiles subsystem in Apple iOS before 8.1.1 does not properly implement the debugserver sandbox, which allows attackers to bypass intended binary-execution restrictions via a crafted application that is run during a time period when debugging is not enabled. | [] |
|
CVE-2024-49589 | Foundry artifacts denial of service | Foundry Artifacts was found to be vulnerable to a Denial Of Service attack due to disk being potentially filled up based on an user supplied argument (size). | [] |
CVE-2024-8925 | Erroneous parsing of multipart form data | In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php-fpm:php-fpm:*:*:*:*:*:*:*:*"
] |
CVE-2019-10095 | bash command injection in spark interpreter | bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions. | [
"cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:*"
] |
GHSA-hw73-x968-4vhm | An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an attacker to obtain a user's session cookie and then impersonate that user via POST controller parameter. | [] |
|
GHSA-q9c2-hcj4-555h | Multiple cross-site scripting (XSS) vulnerabilities in osCommerce 2.2 Milestone 2 Update 060817 allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter in the (a) banner_manager.php, (b) banner_statistics.php, (c) countries.php, (d) currencies.php, (e) languages.php, (f) manufacturers.php, (g) newsletters.php, (h) orders_status.php, (i) products_attributes.php, (j) products_expected.php, (k) reviews.php, (l) specials.php, (m) stats_products_purchased.php, (n) stats_products_viewed.php, (o) tax_classes.php, (p) tax_rates.php, or (q) zones.php scripts in /admin, and the (2) zpage parameter in (r) admin/geo_zones.php. | [] |
|
GHSA-x2c5-cm4v-4x63 | IBM Sterling Secure Proxy 3.2.0 and 3.3.01 before 3.3.01.23 Interim Fix 1, 3.4.0 before 3.4.0.6 Interim Fix 1, and 3.4.1 before 3.4.1.7 provides web-server version data in (1) an unspecified page title and (2) an unspecified HTTP header field, which allows remote attackers to obtain potentially sensitive information by reading a version string. | [] |
|
CVE-2019-15488 | Ignite Realtime Openfire before 4.4.1 has reflected XSS via an LDAP setup test. | [
"cpe:2.3:a:igniterealtime:openfire:*:*:*:*:*:*:*:*"
] |
|
GHSA-p3mr-f49r-753g | IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 184433. | [] |
|
GHSA-gv4m-rwq2-3qhw | A vulnerability in the Session Initiation Protocol (SIP) ingress packet processing of Cisco Unified IP Phone software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms in the software. An attacker could exploit this vulnerability by sending high volumes of SIP INVITE traffic to the targeted device. Successful exploitation could allow the attacker to cause a disruption of services on the targeted IP phone. Cisco Bug IDs: CSCve10064, CSCve14617, CSCve14638, CSCve14683, CSCve20812, CSCve20926, CSCve20945. | [] |
|
GHSA-c5f3-pmwj-p3j9 | A vulnerability was found in osCommerce 4. It has been classified as problematic. This affects an unknown part of the file /b2b-supermarket/catalog/all-products. The manipulation of the argument keywords with the input %27%22%3E%3Cimg%2Fsrc%3D1+onerror%3Dalert%28document.cookie%29%3E leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247245 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2015-9322 | The erident-custom-login-and-dashboard plugin before 3.5 for WordPress has CSRF. | [
"cpe:2.3:a:erident_custom_login_and_dashboard_project:erident_custom_login_and_dashboard:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2017-1000047 | rbenv (all current versions) is vulnerable to Directory Traversal in the specification of Ruby version resulting in arbitrary code execution | [
"cpe:2.3:a:rbenv_project:rbenv:*:*:*:*:*:*:*:*"
] |
|
GHSA-mq55-rphv-c5m9 | HashiCorp Terraform Enterprise up to v202102-2 failed to enforce an organization-level setting that required users within an organization to have two-factor authentication enabled. Fixed in v202103-1. | [] |
|
GHSA-j77q-57r3-74g7 | An issue discovered in com.samourai.wallet.PinEntryActivity.java in Streetside Samourai Wallet 0.99.96i allows attackers to view sensitive information and decrypt data via a brute force attack that uses a recovered samourai.dat file. The PIN is 5 to 8 digits, which may be insufficient in this situation. | [] |
|
CVE-2015-5746 | AppleFileConduit in Apple iOS before 8.4.1 allows attackers to bypass intended restrictions on filesystem access via an afc command that leverages symlink mishandling. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-3x3h-5m6c-8hcx | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brice Capobianco WP Plugin Info Card allows DOM-Based XSS. This issue affects WP Plugin Info Card: from n/a through 5.2.5. | [] |
|
GHSA-799h-8vpw-vp7q | There is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 – 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.Mitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities. | [] |
|
CVE-2022-22653 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.4 and iPadOS 15.4. A malicious website may be able to access information about the user and their devices. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-9251 | jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. | [
"cpe:2.3:a:jquery:jquery:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:agile_product_lifecycle_management_for_process:6.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_process_management_suite:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_process_management_suite:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_interactive_session_recorder:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_interactive_session_recorder:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_interactive_session_recorder:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_services_gatekeeper:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:endeca_information_discovery_studio:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_operations_monitor:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_operations_monitor:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_asset_liability_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_data_integration_hub:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_liquidity_risk_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_profitability_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_reconciliation_framework:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_reconciliation_framework:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:healthcare_foundation:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:healthcare_foundation:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:healthcare_translational_research:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_cruise_fleet_management:9.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_materials_control:18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_reporting_and_analytics:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_insbridge_rating_and_underwriting:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdeveloper:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdeveloper:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oss_support_tools:19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_gateway:15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_gateway:17.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:real-time_scheduler:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_allocation:15.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_customer_insights:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_customer_insights:16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_invoice_matching:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_sales_audit:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_workforce_management_software:1.60.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_workforce_management_software:1.64.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:service_bus:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:service_bus:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_ui_framework:18.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_ui_framework:18.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_mobile_workforce_management:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3:*:*:*:*:*:*:*"
] |
|
CVE-2018-12027 | An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain socket, if any of the parent directories of said socket are writable by a normal user that is not the application's user, then that non-application user can swap that directory with something else, resulting in traffic being redirected to a non-application user's process through an alternative Unix domain socket. | [
"cpe:2.3:a:phusion:passenger:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-11200 | Dolibarr ERP/CRM 9.0.1 provides a web-based functionality that backs up the database content to a dump file. However, the application performs insufficient checks on the export parameters to mysqldump, which can lead to execution of arbitrary binaries on the server. (Malicious binaries can be uploaded by abusing other functionalities of the application.) | [
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:9.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2018-19240 | Buffer overflow in network.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). | [
"cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.64:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.65:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tv-ip121wn_firmware:1.2.2.28:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tv-ip121wn:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-4731 | Campcodes Legal Case Management System role cross site scripting | A vulnerability classified as problematic was found in Campcodes Legal Case Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/role. The manipulation of the argument slug leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263809 was assigned to this vulnerability. | [] |
GHSA-h7wh-8cwv-qqm6 | Zoho ManageEngine ServiceDesk Plus through 14104 allows admin users to conduct an XXE attack. | [] |
|
CVE-2018-7728 | An issue was discovered in Exempi through 2.4.4. XMPFiles/source/FileHandlers/TIFF_Handler.cpp mishandles a case of a zero length, leading to a heap-based buffer over-read in the MD5Update() function in third-party/zuid/interfaces/MD5.cpp. | [
"cpe:2.3:a:exempi_project:exempi:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2025-45779 | Tenda AC10 V1.0re_V15.03.06.46 is vulnerable to Buffer Overflow in the formSetPPTPUserList handler via the list POST parameter. | [] |
|
CVE-2011-3721 | concrete 5.4.0.5, 5.4.1, and 5.4.1.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by tools/spellchecker_service.php and certain other files. | [
"cpe:2.3:a:concrete5:concrete:5.4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:concrete5:concrete:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:concrete5:concrete:5.4.1.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-38361 | Permissions processing error in spacedb | Spicedb is an Open Source, Google Zanzibar-inspired permissions database to enable fine-grained authorization for customer applications. Use of an exclusion under an arrow that has multiple resources may resolve to `NO_PERMISSION` when permission is expected. If the resource exists under *multiple* folders and the user has access to view more than a single folder, SpiceDB may report the user does not have access due to a failure in the exclusion dispatcher to request that *all* the folders in which the user is a member be returned. Permission is returned as `NO_PERMISSION` when `PERMISSION` is expected on the `CheckPermission` API. This issue has been addressed in version 1.33.1. All users are advised to upgrade. There are no known workarounds for this issue. | [
"cpe:2.3:a:authzed:spicedb:*:*:*:*:*:*:*:*"
] |
CVE-2023-29544 | If multiple instances of resource exhaustion occurred at the incorrect time, the garbage collector could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*",
"cpe:2.3:a:mozilla:focus:*:*:*:*:*:android:*:*"
] |
|
GHSA-xhj8-35xv-vj3p | Use after free in WebAudio in Google Chrome prior to 76.0.3809.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] |
|
CVE-2013-4343 | Use-after-free vulnerability in drivers/net/tun.c in the Linux kernel through 3.11.1 allows local users to gain privileges by leveraging the CAP_NET_ADMIN capability and providing an invalid tuntap interface name in a TUNSETIFF ioctl call. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*"
] |
|
CVE-2020-15970 | Use after free in NFC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-8361 | DoS caused due to wrong hash length returned for SHA2/224 algorithm | In SiWx91x devices, the SHA2/224 algorithm returns a hash of 256 bits instead of 224 bits. This incorrect hash length triggers a software assertion, which subsequently causes a Denial of Service (DoS).
If a watchdog is implemented, device will restart after watch dog expires. If watchdog is not implemented, device can be recovered only after a hard reset | [] |
GHSA-9w56-p5q4-69pw | A cross-site scripting (XSS) in Cosmetics and Beauty Product Online Store v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the First Name parameter. | [] |
|
GHSA-4849-x279-v4q2 | A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, and CVE-2017-0186. | [] |
|
GHSA-3fqw-j7x8-g75j | Jenkins Delphix Plugin missing permission check | Jenkins Delphix Plugin 3.0.2 and earlier does not perform a permission check in an HTTP endpoint.This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.An enumeration of credentials IDs in Delphix Plugin 3.0.3 requires the appropriate permissions. | [] |
CVE-2021-0569 | In onStart of ContactsDumpActivity.java, there is possible access to contacts due to a tapjacking/overlay attack. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174045870 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-16896 | In K7 Ultimate Security 16.0.0117, the module K7BKCExt.dll (aka the backup module) improperly validates the administrative privileges of the user, allowing an arbitrary file write via a symbolic link attack with file restoration functionality. | [
"cpe:2.3:a:k7computing:k7_ultimate_security:16.0.0117:*:*:*:*:*:*:*"
] |
|
GHSA-p2jw-xr8p-fh9v | Heap-based buffer overflow in URLMON.DLL in Microsoft Internet Explorer 6 SP1 on Windows 2000 and XP SP1, with versions the MS06-042 patch before 20060912, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long URL in a GZIP-encoded website that was the target of an HTTP redirect, due to an incomplete fix for CVE-2006-3869. | [] |
|
CVE-2018-13077 | The mintToken function of a smart contract implementation for CTB, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:ctb_project:ctb:-:*:*:*:*:*:*:*"
] |
|
CVE-2009-4433 | Multiple cross-site scripting (XSS) vulnerabilities in IDevSpot iSupport 1.8 and earlier allow remote attackers to inject arbitrary web script or HTML via the (a) 5 or (b) 9 field in a post action to ticket_function.php, reachable through ticket_submit.php and index.php; (c) the which parameter to function.php, or (d) the which parameter to index.php, related to knowledgebase_list.php. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:idevspot:isupport:*:*:*:*:*:*:*:*",
"cpe:2.3:a:idevspot:isupport:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:idevspot:isupport:1.06:*:*:*:*:*:*:*"
] |
|
GHSA-cx6w-mcjq-qmq3 | SQL injection vulnerability in the GetMember function in functions.php in MyReview 1.9.4 allows remote attackers to execute arbitrary SQL commands via the email parameter to Admin.php. | [] |
|
GHSA-82ch-g5h5-7x39 | In libIEC61850 1.4.0, MmsValue_newOctetString in mms/iso_mms/common/mms_value.c has an integer signedness error that can lead to an attempted excessive memory allocation. | [] |
|
CVE-2021-27182 | An issue was discovered in MDaemon before 20.0.4. There is an IFRAME injection vulnerability in Webmail (aka WorldClient). It can be exploited via an email message. It allows an attacker to perform any action with the privileges of the attacked user. | [
"cpe:2.3:a:altn:mdaemon:*:*:*:*:*:*:*:*"
] |
|
GHSA-qvvw-rm7q-75fx | Open OnDemand before 1.5.7 and 1.6.x before 1.6.22 allows CSRF. | [] |
|
GHSA-83qh-x9wc-qf66 | The server in mubu note 2018-11-11 has XSS by configuring an account with a crafted name value (along with an arbitrary username value), and then creating and sharing a note. | [] |
|
CVE-2021-31913 | In JetBrains TeamCity before 2020.2.3, insufficient checks of the redirect_uri were made during GitHub SSO token exchange. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] |
|
GHSA-c3wr-wrc5-mqg4 | scilab-bin 4.1.2 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/SciLink#####1, (b) /tmp/SciLink#####2, (c) /tmp/SciLink#####3, (d) /tmp/*.#####, (e) /tmp/*.#####.res, (f) /tmp/*.#####.err, and (g) /tmp/*.#####.diff temporary files, related to the (1) scilink, (2) scidoc, and (3) scidem scripts. | [] |
|
GHSA-mg5r-2j47-f62m | An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of the JPEG2000 codec. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure. | [] |
|
GHSA-9x88-4jg8-4vf7 | Improper authorization in zenml | An improper authorization vulnerability exists in the zenml-io/zenml repository, specifically within the API PUT /api/v1/users/id endpoint. This vulnerability allows any authenticated user to modify the information of other users, including changing the `active` status of user accounts to false, effectively deactivating them. This issue affects version 0.55.3 and was fixed in version 0.56.2. The impact of this vulnerability is significant as it allows for the deactivation of admin accounts, potentially disrupting the functionality and security of the application. | [] |
GHSA-6mx3-m2xg-8wr8 | Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Jonk @ Follow me Darling Sp*tify Play Button for WordPress plugin <= 2.05 versions. | [] |
|
CVE-2015-0731 | The ISDN implementation in Cisco IOS 15.3S allows remote attackers to cause a denial of service (device reload) via malformed Q931 SETUP messages, aka Bug ID CSCut37890. | [
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3s:*:*:*:*:*:*:*"
] |
|
GHSA-qrj6-wx6r-8jmc | The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.0. This is due to missing or incorrect nonce validation on the counter_access_key_setup() function. This makes it possible for unauthenticated attackers to update social login provider settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
CVE-2024-23514 | WordPress Click To Tweet Plugin <= 2.0.14 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ClickToTweet.Com Click To Tweet allows Stored XSS.This issue affects Click To Tweet: from n/a through 2.0.14.
| [
"cpe:2.3:a:clicktotweet:click_to_tweet:*:*:*:*:*:wordpress:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.