Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-2hw2-7jq8-w9vp
The wcfm_ajax_controller AJAX action of the WCFM Marketplace WordPress plugin before 3.4.12, available to unauthenticated and authenticated user, does not properly sanitise multiple parameters before using them in SQL statements, leading to SQL injections
[]
CVE-2023-22881
Denial of Service in Zoom Clients
Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service.
[ "cpe:2.3:a:zoom:zoom:*:*:*:*:*:*:*:*" ]
GHSA-cqxr-3xmh-c26p
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the page parameter in the fromDhcpListClient function.
[]
CVE-2001-0877
Universal Plug and Play (UPnP) on Windows 98, 98SE, ME, and XP allows remote attackers to cause a denial of service via (1) a spoofed SSDP advertisement that causes the client to connect to a service on another machine that generates a large amount of traffic (e.g., chargen), or (2) via a spoofed SSDP announcement to broadcast or multicast addresses, which could cause all UPnP clients to send traffic to a single target system.
[ "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*" ]
GHSA-2gqg-96r8-5h58
Wrap-around error in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
CVE-2009-4619
SQL injection vulnerability in the Lucy Games (com_lucygames) component 1.5.4 for Joomla! allows remote attackers to execute arbitrary SQL commands via the gameid parameter in a game action to index.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:lucygames:com_lucygames:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
CVE-2019-25086
IET-OU Open Media Player timedtext.php webvtt cross site scripting
A vulnerability was found in IET-OU Open Media Player up to 1.5.0. It has been declared as problematic. This vulnerability affects the function webvtt of the file application/controllers/timedtext.php. The manipulation of the argument ttml_url leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.5.1 is able to address this issue. The name of the patch is 3f39f2d68d11895929c04f7b49b97a734ae7cd1f. It is recommended to upgrade the affected component. VDB-216862 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:open:open_media_player:*:*:*:*:*:*:*:*" ]
CVE-2024-31902
IBM InfoSphere Information Server cross-site request forgery
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 289234.
[ "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*" ]
CVE-2013-0090
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*" ]
CVE-2019-12667
Cisco IOS XE Software Stored Cross-Site Scripting Vulnerability
A vulnerability in the web framework code of Cisco IOS XE Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected software. An attacker could exploit this vulnerability by convincing a user of the web interface to access a malicious link or by intercepting a user request for the affected web interface and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information.
[ "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*" ]
GHSA-m45q-r6x2-5q77
D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.
[]
CVE-2019-2986
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: LLVM Interpreter). The supported version that is affected is 19.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*" ]
CVE-2006-1372
Multiple SQL injection vulnerabilities in 1WebCalendar 4.0 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) EventID parameter in viewEvent.cfm, (2) NewsID parameter in newsView.cfm, or (3) ThisDate parameter in mainCal.cfm.
[ "cpe:2.3:a:benson_it_solutions:1webcalendar:*:*:*:*:*:*:*:*" ]
CVE-2019-0322
SAP Commerce Cloud (previously known as SAP Hybris Commerce), (HY_COM, versions 6.3, 6.4, 6.5, 6.6, 6.7, 1808, 1811), allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
[ "cpe:2.3:a:sap:commerce_cloud:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:sap:commerce_cloud:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:sap:commerce_cloud:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:sap:commerce_cloud:6.6:*:*:*:*:*:*:*", "cpe:2.3:a:sap:commerce_cloud:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:sap:commerce_cloud:1808:*:*:*:*:*:*:*", "cpe:2.3:a:sap:commerce_cloud:1811:*:*:*:*:*:*:*" ]
GHSA-m3j4-fvh4-rfgm
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
GHSA-h22p-jg8c-6gmf
An issue, also known as DW201703-002, was discovered in libdwarf 2017-03-21. In _dwarf_decode_s_leb128_chk() a byte pointer was dereferenced just before it was checked for being in bounds, leading to a heap-based buffer over-read.
[]
CVE-2020-9646
Adobe Media Encoder versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*" ]
CVE-2023-21516
XSS vulnerability from InstantPlay in Galaxy Store prior to version 4.5.49.8 allows attackers to execute javascript API to install APK from Galaxy Store.
[ "cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*" ]
GHSA-mg24-x4vw-rcgh
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Admin Group module.
[]
CVE-2019-13246
FastStone Image Viewer 7.0 has a User Mode Write AV starting at image00400000+0x00000000001a9601.
[ "cpe:2.3:a:faststone:image_viewer:7.0:*:*:*:*:*:*:*" ]
GHSA-fr64-537p-wvw4
Multiple cross-site scripting (XSS) vulnerabilities in Adrenalin's ASP Chat allow remote attackers to inject arbitrary web script or HTML (1) via the psuedo (pseudo) field or (2) during chat.
[]
CVE-2017-8071
drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 uses a spinlock without considering that sleeping is possible in a USB HID request callback, which allows local users to cause a denial of service (deadlock) via unspecified vectors.
[ "cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*" ]
CVE-2013-4813
The Agent (aka AgentController) servlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allows remote attackers to execute arbitrary commands via a HEAD request, aka ZDI-CAN-1745.
[ "cpe:2.3:a:hp:identity_driven_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:plus:*:*", "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:plus:*:*" ]
CVE-2020-2201
Jenkins Sonargraph Integration Plugin 3.0.0 and earlier does not escape the file path for the Log file field form validation, resulting in a stored cross-site scripting vulnerability.
[ "cpe:2.3:a:jenkins:sonargraph_integration:*:*:*:*:*:jenkins:*:*" ]
GHSA-fv49-5g7c-gh7p
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 and DAR-8000 up to 20151231. It has been declared as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240244. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
[]
GHSA-x6pj-7792-5gvw
A Directory Traversal Remote Code Execution vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to execute arbitrary code on vulnerable installations.
[]
CVE-2023-28487
Sudo before 1.9.13 does not escape control characters in sudoreplay output.
[ "cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*" ]
GHSA-mp72-mr55-299x
Windows TCP/IP Remote Code Execution Vulnerability
[]
CVE-2015-0610
Race condition in the object-group ACL feature in Cisco IOS 15.5(2)T and earlier allows remote attackers to bypass intended access restrictions via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCun21071.
[ "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5t:*:*:*:*:*:*:*" ]
GHSA-x8xm-c7p8-2pj2
Silverstripe cross-site scripting (XSS) attack in elemental "Content blocks in use" report
An elemental block can include an XSS payload, which can be executed when viewing the "Content blocks in use" report.The vulnerability is specific to that report and is a result of failure to cast input prior to including it in the grid field.Referenceshttps://www.silverstripe.org/download/security-releases/CVE-2025-25197
[]
CVE-2023-30782
WordPress Church Admin Plugin <= 3.7.5 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Andy Moyle Church Admin plugin <= 3.7.5 versions.
[ "cpe:2.3:a:churchadminplugin:church_admin:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-1575
The improper privilege management vulnerability in the Zyxel WBE660S firmware version 6.70(ACGG.3) and earlier versions could allow an authenticated user to escalate privileges and download the configuration files on a vulnerable device.
[]
GHSA-6v6m-2c33-p39f
dayrui FineCms 5.0.9 has Cross Site Scripting (XSS) in admin/Login.php via a payload in the username field that does not begin with a '<' character.
[]
GHSA-2w8p-mpf2-3mcq
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bamboo Mcr Bamboo Columns allows Stored XSS.This issue affects Bamboo Columns: from n/a through 1.6.1.
[]
GHSA-9m24-j378-4w43
The popup blocker in Mozilla Firefox before 1.5.0.7 opens the "blocked popups" display in the context of the Location bar instead of the subframe from which the popup originated, which might make it easier for remote user-assisted attackers to conduct cross-site scripting (XSS) attacks.
[]
GHSA-hj95-cvvq-rc83
Microsoft Internet Explorer 6 does not properly handle errors related to using the componentFromPoint method on xml objects that have been (1) incorrectly initialized or (2) deleted, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Uninitialized Memory Corruption Vulnerability."
[]
CVE-2005-0180
Multiple integer signedness errors in the sg_scsi_ioctl function in scsi_ioctl.c for Linux 2.6.x allow local users to read or modify kernel memory via negative integers in arguments to the scsi ioctl, which bypass a maximum length check before calling the copy_from_user and copy_to_user functions.
[ "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*" ]
GHSA-52m4-99w3-wq27
VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox.
[]
GHSA-cmw9-8879-29f9
Buffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted JPEG data in a movie file.
[]
GHSA-7738-whhr-p6q5
Possible assertion due to improper validation of rank restriction field in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
[]
GHSA-p8r8-vp69-jf5p
The Timeless Black (aka com.apptive.android.apps.timeless) application 2.10.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-6xmx-57h5-2fhv
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in TaxoPress WordPress Tag Cloud Plugin – Tag Groups.This issue affects WordPress Tag Cloud Plugin – Tag Groups: from n/a through 2.0.3.
[]
CVE-2003-0602
Multiple cross-site scripting vulnerabilities (XSS) in Bugzilla 2.16.x before 2.16.3 and 2.17.x before 2.17.4 allow remote attackers to insert arbitrary HTML or web script via (1) multiple default German and Russian HTML templates or (2) ALT and NAME attributes in AREA tags as used by the GraphViz graph generation feature for local dependency graphs.
[ "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*" ]
CVE-2023-0094
UpQode Google Maps <= 1.0.5 - Contributor+ Stored XSS
The UpQode Google Maps WordPress plugin through 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[ "cpe:2.3:a:qoders:upqode_google_maps:*:*:*:*:*:wordpress:*:*" ]
CVE-2022-46177
Discourse password reset link can lead to in account takeover if user changes to a new email
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting `email_token_valid_hours` which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower `email_token_valid_hours ` as needed.
[ "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta6b:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta13b:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta15:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta16:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta17:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:beta:*:*:*" ]
GHSA-2pmj-f4x6-6fr2
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.49, 8.50, and 8.51 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Security.
[]
CVE-2021-33716
A vulnerability has been identified in SIMATIC CP 1543-1 (incl. SIPLUS variants) (All versions < V3.0), SIMATIC CP 1545-1 (All versions < V1.1). An attacker with access to the subnet of the affected device could retrieve sensitive information stored in cleartext.
[ "cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1545-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1545-1:-:*:*:*:*:*:*:*" ]
CVE-2021-33259
Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for attackers to obtain users' DNS query history.
[ "cpe:2.3:o:d-link:dir-868lw_firmware:1.12b:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-868lw:-:*:*:*:*:*:*:*" ]
GHSA-7ghc-rmvr-4977
In the Linux kernel, the following vulnerability has been resolved:wifi: mt76: do not run mt76_unregister_device() on unregistered hwTrying to probe a mt7921e pci card without firmware results in a successful probe where ieee80211_register_hw hasn't been called. When removing the driver, ieee802111_unregister_hw is called unconditionally leading to a kernel NULL pointer dereference. Fix the issue running mt76_unregister_device routine just for registered hw.
[]
CVE-2022-49211
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
In the Linux kernel, the following vulnerability has been resolved: mips: cdmm: Fix refcount leak in mips_cdmm_phys_base The of_find_compatible_node() function returns a node pointer with refcount incremented, We should use of_node_put() on it when done Add the missing of_node_put() to release the refcount.
[]
GHSA-4pw7-wf99-mgcj
The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! stores database backup files with predictable names under the web root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to a backup file in administrators/backups/.
[]
CVE-2019-18411
Zoho ManageEngine ADSelfService Plus 5.x through 5803 has CSRF on the users' profile information page. Users who are attacked with this vulnerability will be forced to modify their enrolled information, such as email and mobile phone, unintentionally. Attackers could use the reset password function and control the system to send the authentication code back to the channel that the attackers own.
[ "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5000:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5001:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5002:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5010:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5011:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5020:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5021:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5022:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5030:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5032:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5040:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5041:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5100:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5101:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5102:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5103:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5104:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5105:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5106:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5107:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5108:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5109:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5110:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5111:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5112:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5113:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5114:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5115:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5200:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5201:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5202:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5203:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5204:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5205:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5206:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5207:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5300:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5301:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5302:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5303:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5304:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5305:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5306:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5307:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5308:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5309:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5310:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5311:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5312:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5313:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5314:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5315:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5316:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5317:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5318:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5319:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5320:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5321:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5322:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5323:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5324:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5325:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5326:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5327:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5328:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5329:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5330:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.4:5400:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5500:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5501:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5502:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5503:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5504:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5505:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5506:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5507:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5508:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5509:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5510:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5511:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5512:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5513:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5514:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5515:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5516:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5517:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5518:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5519:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5520:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5521:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5600:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5601:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5602:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5603:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5604:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5605:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5606:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5607:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5702:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5704:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5705:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5706:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5707:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5708:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5709:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5710:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.8:5800:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.8:5801:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.8:5802:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.8:5803:*:*:*:*:*:*" ]
GHSA-27pw-7wxg-pvx9
Improper access control vulnerability in Quick Share prior to 13.5.52.0 allows local attacker to access local files.
[]
CVE-2020-5408
Dictionary attack with Spring Security queryable text encryptor
Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
[ "cpe:2.3:a:pivotal_software:spring_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:*" ]
GHSA-7gpq-38wj-hv97
Improper access control vulnerability in Samsung Security Supporter prior to version 1.2.40.0 allows attacker to set the arbitrary folder as Secret Folder without Samsung Security Supporter permission
[]
CVE-2019-6462
An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized.
[ "cpe:2.3:a:cairographics:cairo:1.16.0:*:*:*:*:*:*:*" ]
GHSA-9hgr-v6cx-qmq2
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13187.
[]
CVE-2004-0998
Format string vulnerability in telnetd-ssl 0.17 and earlier allows remote attackers to execute arbitrary code.
[ "cpe:2.3:a:telnetd:telnetd:0.17.18:*:*:*:*:*:*:*", "cpe:2.3:a:telnetd:telnetd:0.17.25:*:*:*:*:*:*:*", "cpe:2.3:a:telnetd:telnetd-ssl:0.17.17_0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:telnetd:telnetd-ssl:0.17.17_0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:telnetd:telnetd-ssl:0.17.17_0.1.2:*:woody1:*:*:*:*:*" ]
GHSA-mm6x-3vj3-q4jp
Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.
[]
GHSA-6865-fwr3-4624
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148419.
[]
GHSA-4wj6-2665-qg48
The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file system entries in FAT file systems and other file systems for which . is not a reserved name, which allows local users to hide activities it more difficult to conduct forensics activities, as demonstrated by Flame.
[]
CVE-2022-45697
Arbitrary File Delete vulnerability in Razer Central before v7.8.0.381 when handling files in the Accounts directory.
[ "cpe:2.3:a:razer:razer_central:*:*:*:*:*:*:*:*" ]
CVE-2017-14964
In IKARUS anti.virus before 2.16.18, the ntguard.sys driver contains an Arbitrary Write vulnerability because of not validating input values from IOCtl 0x8300005c.
[ "cpe:2.3:a:ikarussecurity:anti.virus:*:*:*:*:*:*:*:*" ]
CVE-2013-1720
The nsHtml5TreeBuilder::resetTheInsertionMode function in the HTML5 Tree Builder in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 does not properly maintain the state of the insertion-mode stack for template elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer over-read) by triggering use of this stack in its empty state.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:22.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:23.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:17.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:17.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:17.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*" ]
GHSA-3vxp-q565-46fp
The TradeKing Forex for iPhone app 1.2.1 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-6rxj-75v5-5pw4
An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[]
CVE-2025-1945
picklescan - Zip Flag Bit Exploit Crashes Picklescan But Not PyTorch
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch's torch.load(). This can lead to arbitrary code execution when loading a compromised model.
[]
CVE-2019-20461
An issue was discovered on Alecto IVM-100 2019-11-12 devices. The device uses a custom UDP protocol to start and control video and audio services. The protocol has been partially reverse engineered. Based upon the reverse engineering, no password or username is ever transferred over this protocol. Thus, one can set up the camera connection feed with only the encoded UID. It is possible to set up sessions with the camera over the Internet by using the encoded UID and the custom UDP protocol, because authentication happens at the client side.
[ "cpe:2.3:o:alecto:ivm-100_firmware:*:*:*:*:*:*:*:*" ]
CVE-2021-42850
A weak default administrator password for the web interface and serial port was reported in some Lenovo Personal Cloud Storage devices that could allow unauthorized device access to an attacker with physical or local network access.
[ "cpe:2.3:o:lenovo:a1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:a1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:t1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:t1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:x1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:x1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:t2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:t2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:t2pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:t2pro:-:*:*:*:*:*:*:*" ]
GHSA-36wp-g3gj-7v3h
IBM Engineering Requirements Quality Assistant On-Premises could allow an authenticated user to obtain sensitive information due to improper input validation. IBM X-Force ID: 186282.
[]
CVE-2024-2078
Cross-Site Scripting vulnerability in HelpDeskZ
A Cross-Site Scripting (XSS) vulnerability has been found in HelpDeskZ affecting version 2.0.2 and earlier. This vulnerability could allow an attacker to send a specially crafted JavaScript payload within the email field and partially take control of an authenticated user's browser session.
[]
CVE-2024-11196
Multi-column Tag Map <= 17.0.33 - Authenticated (Contributor+) Stored Cross-Site Scripting via mctagmap Shortcode
The Multi-column Tag Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mctagmap shortcode in all versions up to, and including, 17.0.33 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2021-27935
An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie.
[ "cpe:2.3:a:adguard:adguard_home:*:*:*:*:*:*:*:*" ]
GHSA-pf6g-9f5m-5mxf
Buffer overflow in log2mail before 0.2.5.1 allows remote attackers to execute arbitrary code via a long log message.
[]
CVE-2024-0325
Command Injection in Helix Sync
In Helix Sync versions prior to 2024.1, a local command injection was identified. Reported by Bryan Riggins.  
[ "cpe:2.3:a:perforce:helix_sync:*:*:*:*:*:*:*:*" ]
CVE-2025-21297
Windows Remote Desktop Services Remote Code Execution Vulnerability
Windows Remote Desktop Services Remote Code Execution Vulnerability
[]
CVE-2020-2178
Jenkins Parasoft Findings Plugin 10.4.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[ "cpe:2.3:a:jenkins:parasoft_findings:*:*:*:*:*:jenkins:*:*" ]
CVE-2024-7687
AZIndex <= 0.8.1 - Stored XSS via CSRF
The AZIndex WordPress plugin through 0.8.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
[ "cpe:2.3:a:azindex_wordpress_plugin:azindex_wordpress_plugin:*:*:*:*:*:*:*:*", "cpe:2.3:a:azindex_project:azindex:*:*:*:*:*:wordpress:*:*" ]
CVE-2022-24061
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Sante DICOM Viewer Pro 11.8.7.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DCM files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15100.
[ "cpe:2.3:a:santesoft:dicom_viewer_pro:11.8.7:*:*:*:*:*:*:*" ]
CVE-2014-0414
Unspecified vulnerability in the Oracle Containers for J2EE component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality via vectors related to HTTP Request Handling.
[ "cpe:2.3:a:oracle:fusion_middleware:10.1.3.5:*:*:*:*:*:*:*" ]
CVE-2018-14798
Fuji Electric FRENIC LOADER v3.3 v7.3.4.1a of FRENIC-Mini (C1), FRENIC-Mini (C2), FRENIC-Eco, FRENIC-Multi, FRENIC-MEGA, FRENIC-Ace. The program does not properly parse FNC files that may allow for information disclosure.
[ "cpe:2.3:o:fujielectric:frenic_loader_3.3_firmware:7.3.4.1a:*:*:*:*:*:*:*", "cpe:2.3:h:fujielectric:frenic-ace:-:*:*:*:*:*:*:*", "cpe:2.3:h:fujielectric:frenic-eco:-:*:*:*:*:*:*:*", "cpe:2.3:h:fujielectric:frenic-mega:-:*:*:*:*:*:*:*", "cpe:2.3:h:fujielectric:frenic-mini\\(c1\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:fujielectric:frenic-mini\\(c2\\):-:*:*:*:*:*:*:*", "cpe:2.3:h:fujielectric:frenic-multi:-:*:*:*:*:*:*:*" ]
GHSA-h6rp-8v4j-hwph
Apache Camel's XSLT component allows remote attackers to execute arbitrary Java methods
The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message.
[]
CVE-2008-4651
Multiple SQL injection vulnerabilities in Jetbox CMS 2.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) orderby parameter to admin/cms/images.php and the (2) nav_id parameter in an editrecord action to admin/cms/nav.php.
[ "cpe:2.3:a:jetbox:jetbox_cms:2.1:*:*:*:*:*:*:*" ]
CVE-2022-20095
In imgsensor, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06479763; Issue ID: ALPS06479763.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*" ]
GHSA-4cr9-w8vr-8665
OXID eShop Professional Edition before 4.7.13 and 4.8.x before 4.8.7, Enterprise Edition before 5.0.13 and 5.1.x before 5.1.7, and Community Edition before 4.7.13 and 4.8.x before 4.8.7 allow remote attackers to assign users to arbitrary dynamical user groups.
[]
GHSA-jr8x-c265-m3fr
Buffer overflow in mstm in HP-UX allows local users to gain root access.
[]
GHSA-xrj9-h79q-8446
Xcode Tools before 2.3 for Mac OS X 10.4, when running the WebObjects plugin, allows remote attackers to access or modify WebObjects projects through a network service.
[]
GHSA-4jhj-88x4-5xw5
A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /ajax.php?action=save_member. The manipulation of the argument umember_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-jhg3-999m-vxmh
Integer overflow in ImageIO in Apple Mac OS X before 10.5.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG2000 image that triggers a heap-based buffer overflow.
[]
GHSA-vp55-fhxx-vcx8
Maven Extension plugin for Gradle Enterprise vulnerable to Deserialization of Untrusted Data
An issue was discovered in the Maven Extension plugin before 1.6 for Gradle Enterprise. It is vulnerable to, in the worst case, Remote Code Execution, and in the general case, local privilege escalation. Internally, the plugin uses a socket connection to send serialized Java objects that are deserialized by a Java standard library ObjectInputStream. This ObjectInputStream was not restricted to a list of trusted classes, thus allowing an attacker to send a malicious deserialization gadget chain to achieve code execution. The socket was not bound exclusively to localhost. The port this socket is assigned to is randomly selected by the JVM and is not intentionally exposed to the public (either by design or documentation).
[]
GHSA-7r6c-c52h-pf9p
A maliciously crafted STP file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
[]
CVE-2023-42102
Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability
Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-20409.
[ "cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*" ]
CVE-2019-12221
An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a SEGV in the SDL function SDL_free_REAL at stdlib/SDL_malloc.c.
[ "cpe:2.3:a:libsdl:sdl2_image:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:libsdl:simple_directmedia_layer:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
GHSA-f3h4-xw83-8x9c
An issue was discovered in Veritas NetBackup through 10.0 and related Veritas products. The NetBackup Primary server is vulnerable to a SQL Injection attack affecting the NBFSMCLIENT service.
[]
GHSA-96jf-4pq3-qqgx
Heap buffer overflow in Bookmarks in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via specific user gesture.
[]
CVE-2020-0708
A remote code execution vulnerability exists when the Windows Imaging Library improperly handles memory.To exploit this vulnerability, an attacker would first have to coerce a victim to open a specially crafted file.The security update addresses the vulnerability by correcting how the Windows Imaging Library handles memory., aka 'Windows Imaging Library Remote Code Execution Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
GHSA-g4r6-j635-4pr7
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
[]
CVE-2018-10300
Cross-site scripting (XSS) vulnerability in the Web-Dorado Instagram Feed WD plugin before 1.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML by passing payloads in an Instagram profile's bio.
[ "cpe:2.3:a:web-dorado:wd_instagram_feed:*:*:*:*:*:wordpress:*:*" ]
GHSA-m639-9whg-fw97
Prototype Pollution in object-extend
The package object-extend from 0.0.0 through 0.5.0 is vulnerable to Prototype Pollution via object-extend.
[]
GHSA-vm9x-4m38-wvhh
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Twitter News Feed allows Reflected XSS. This issue affects Twitter News Feed: from n/a through 1.1.1.
[]