id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-2hw2-7jq8-w9vp | The wcfm_ajax_controller AJAX action of the WCFM Marketplace WordPress plugin before 3.4.12, available to unauthenticated and authenticated user, does not properly sanitise multiple parameters before using them in SQL statements, leading to SQL injections | [] |
|
CVE-2023-22881 | Denial of Service in Zoom Clients | Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service. | [
"cpe:2.3:a:zoom:zoom:*:*:*:*:*:*:*:*"
] |
GHSA-cqxr-3xmh-c26p | Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability via the page parameter in the fromDhcpListClient function. | [] |
|
CVE-2001-0877 | Universal Plug and Play (UPnP) on Windows 98, 98SE, ME, and XP allows remote attackers to cause a denial of service via (1) a spoofed SSDP advertisement that causes the client to connect to a service on another machine that generates a large amount of traffic (e.g., chargen), or (2) via a spoofed SSDP announcement to broadcast or multicast addresses, which could cause all UPnP clients to send traffic to a single target system. | [
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*"
] |
|
GHSA-2gqg-96r8-5h58 | Wrap-around error in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2009-4619 | SQL injection vulnerability in the Lucy Games (com_lucygames) component 1.5.4 for Joomla! allows remote attackers to execute arbitrary SQL commands via the gameid parameter in a game action to index.php. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:lucygames:com_lucygames:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-25086 | IET-OU Open Media Player timedtext.php webvtt cross site scripting | A vulnerability was found in IET-OU Open Media Player up to 1.5.0. It has been declared as problematic. This vulnerability affects the function webvtt of the file application/controllers/timedtext.php. The manipulation of the argument ttml_url leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.5.1 is able to address this issue. The name of the patch is 3f39f2d68d11895929c04f7b49b97a734ae7cd1f. It is recommended to upgrade the affected component. VDB-216862 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:open:open_media_player:*:*:*:*:*:*:*:*"
] |
CVE-2024-31902 | IBM InfoSphere Information Server cross-site request forgery | IBM InfoSphere Information Server 11.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 289234. | [
"cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*"
] |
CVE-2013-0090 | Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-12667 | Cisco IOS XE Software Stored Cross-Site Scripting Vulnerability | A vulnerability in the web framework code of Cisco IOS XE Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected software. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected software. An attacker could exploit this vulnerability by convincing a user of the web interface to access a malicious link or by intercepting a user request for the affected web interface and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. | [
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*"
] |
GHSA-m45q-r6x2-5q77 | D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges. | [] |
|
CVE-2019-2986 | Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: LLVM Interpreter). The supported version that is affected is 19.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle GraalVM Enterprise Edition. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*"
] |
|
CVE-2006-1372 | Multiple SQL injection vulnerabilities in 1WebCalendar 4.0 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) EventID parameter in viewEvent.cfm, (2) NewsID parameter in newsView.cfm, or (3) ThisDate parameter in mainCal.cfm. | [
"cpe:2.3:a:benson_it_solutions:1webcalendar:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-0322 | SAP Commerce Cloud (previously known as SAP Hybris Commerce), (HY_COM, versions 6.3, 6.4, 6.5, 6.6, 6.7, 1808, 1811), allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. | [
"cpe:2.3:a:sap:commerce_cloud:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce_cloud:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce_cloud:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce_cloud:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce_cloud:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce_cloud:1808:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:commerce_cloud:1811:*:*:*:*:*:*:*"
] |
|
GHSA-m3j4-fvh4-rfgm | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
|
GHSA-h22p-jg8c-6gmf | An issue, also known as DW201703-002, was discovered in libdwarf 2017-03-21. In _dwarf_decode_s_leb128_chk() a byte pointer was dereferenced just before it was checked for being in bounds, leading to a heap-based buffer over-read. | [] |
|
CVE-2020-9646 | Adobe Media Encoder versions 14.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-21516 | XSS vulnerability from InstantPlay in Galaxy Store prior to version 4.5.49.8 allows attackers to execute javascript API to install APK from Galaxy Store. | [
"cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*"
] |
|
GHSA-mg24-x4vw-rcgh | onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Admin Group module. | [] |
|
CVE-2019-13246 | FastStone Image Viewer 7.0 has a User Mode Write AV starting at image00400000+0x00000000001a9601. | [
"cpe:2.3:a:faststone:image_viewer:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-fr64-537p-wvw4 | Multiple cross-site scripting (XSS) vulnerabilities in Adrenalin's ASP Chat allow remote attackers to inject arbitrary web script or HTML (1) via the psuedo (pseudo) field or (2) during chat. | [] |
|
CVE-2017-8071 | drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 uses a spinlock without considering that sleeping is possible in a USB HID request callback, which allows local users to cause a denial of service (deadlock) via unspecified vectors. | [
"cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.8:*:*:*:*:*:*:*"
] |
|
CVE-2013-4813 | The Agent (aka AgentController) servlet in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 allows remote attackers to execute arbitrary commands via a HEAD request, aka ZDI-CAN-1745. | [
"cpe:2.3:a:hp:identity_driven_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:procurve_manager:3.20:*:*:*:*:plus:*:*",
"cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:procurve_manager:4.0:*:*:*:*:plus:*:*"
] |
|
CVE-2020-2201 | Jenkins Sonargraph Integration Plugin 3.0.0 and earlier does not escape the file path for the Log file field form validation, resulting in a stored cross-site scripting vulnerability. | [
"cpe:2.3:a:jenkins:sonargraph_integration:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-fv49-5g7c-gh7p | ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 and DAR-8000 up to 20151231. It has been declared as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240244. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | [] |
|
GHSA-x6pj-7792-5gvw | A Directory Traversal Remote Code Execution vulnerability in Trend Micro Control Manager (versions 6.0 and 7.0) could allow an attacker to execute arbitrary code on vulnerable installations. | [] |
|
CVE-2023-28487 | Sudo before 1.9.13 does not escape control characters in sudoreplay output. | [
"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
] |
|
GHSA-mp72-mr55-299x | Windows TCP/IP Remote Code Execution Vulnerability | [] |
|
CVE-2015-0610 | Race condition in the object-group ACL feature in Cisco IOS 15.5(2)T and earlier allows remote attackers to bypass intended access restrictions via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCun21071. | [
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5t:*:*:*:*:*:*:*"
] |
|
GHSA-x8xm-c7p8-2pj2 | Silverstripe cross-site scripting (XSS) attack in elemental "Content blocks in use" report | An elemental block can include an XSS payload, which can be executed when viewing the "Content blocks in use" report.The vulnerability is specific to that report and is a result of failure to cast input prior to including it in the grid field.Referenceshttps://www.silverstripe.org/download/security-releases/CVE-2025-25197 | [] |
CVE-2023-30782 | WordPress Church Admin Plugin <= 3.7.5 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Andy Moyle Church Admin plugin <= 3.7.5 versions. | [
"cpe:2.3:a:churchadminplugin:church_admin:*:*:*:*:*:wordpress:*:*"
] |
CVE-2024-1575 | The improper privilege management vulnerability in the Zyxel WBE660S firmware version 6.70(ACGG.3) and earlier versions could allow an authenticated user to escalate privileges and download the configuration files on a vulnerable device. | [] |
|
GHSA-6v6m-2c33-p39f | dayrui FineCms 5.0.9 has Cross Site Scripting (XSS) in admin/Login.php via a payload in the username field that does not begin with a '<' character. | [] |
|
GHSA-2w8p-mpf2-3mcq | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bamboo Mcr Bamboo Columns allows Stored XSS.This issue affects Bamboo Columns: from n/a through 1.6.1. | [] |
|
GHSA-9m24-j378-4w43 | The popup blocker in Mozilla Firefox before 1.5.0.7 opens the "blocked popups" display in the context of the Location bar instead of the subframe from which the popup originated, which might make it easier for remote user-assisted attackers to conduct cross-site scripting (XSS) attacks. | [] |
|
GHSA-hj95-cvvq-rc83 | Microsoft Internet Explorer 6 does not properly handle errors related to using the componentFromPoint method on xml objects that have been (1) incorrectly initialized or (2) deleted, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Uninitialized Memory Corruption Vulnerability." | [] |
|
CVE-2005-0180 | Multiple integer signedness errors in the sg_scsi_ioctl function in scsi_ioctl.c for Linux 2.6.x allow local users to read or modify kernel memory via negative integers in arguments to the scsi ioctl, which bypass a maximum length check before calling the copy_from_user and copy_to_user functions. | [
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*"
] |
|
GHSA-52m4-99w3-wq27 | VMware ESXi contains a memory corruption vulnerability that exists in the way it handles a network socket. A malicious actor with local access to ESXi may exploit this issue to corrupt memory leading to an escape of the ESXi sandbox. | [] |
|
GHSA-cmw9-8879-29f9 | Buffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted JPEG data in a movie file. | [] |
|
GHSA-7738-whhr-p6q5 | Possible assertion due to improper validation of rank restriction field in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile | [] |
|
GHSA-p8r8-vp69-jf5p | The Timeless Black (aka com.apptive.android.apps.timeless) application 2.10.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-6xmx-57h5-2fhv | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in TaxoPress WordPress Tag Cloud Plugin – Tag Groups.This issue affects WordPress Tag Cloud Plugin – Tag Groups: from n/a through 2.0.3. | [] |
|
CVE-2003-0602 | Multiple cross-site scripting vulnerabilities (XSS) in Bugzilla 2.16.x before 2.16.3 and 2.17.x before 2.17.4 allow remote attackers to insert arbitrary HTML or web script via (1) multiple default German and Russian HTML templates or (2) ALT and NAME attributes in AREA tags as used by the GraphViz graph generation feature for local dependency graphs. | [
"cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*"
] |
|
CVE-2023-0094 | UpQode Google Maps <= 1.0.5 - Contributor+ Stored XSS | The UpQode Google Maps WordPress plugin through 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [
"cpe:2.3:a:qoders:upqode_google_maps:*:*:*:*:*:wordpress:*:*"
] |
CVE-2022-46177 | Discourse password reset link can lead to in account takeover if user changes to a new email | Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting `email_token_valid_hours` which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower `email_token_valid_hours ` as needed. | [
"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta6b:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta13b:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta15:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta16:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta17:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:beta:*:*:*"
] |
GHSA-2pmj-f4x6-6fr2 | Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.49, 8.50, and 8.51 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Security. | [] |
|
CVE-2021-33716 | A vulnerability has been identified in SIMATIC CP 1543-1 (incl. SIPLUS variants) (All versions < V3.0), SIMATIC CP 1545-1 (All versions < V1.1). An attacker with access to the subnet of the affected device could retrieve sensitive information stored in cleartext. | [
"cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_cp_1545-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_cp_1545-1:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-33259 | Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for attackers to obtain users' DNS query history. | [
"cpe:2.3:o:d-link:dir-868lw_firmware:1.12b:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-868lw:-:*:*:*:*:*:*:*"
] |
|
GHSA-7ghc-rmvr-4977 | In the Linux kernel, the following vulnerability has been resolved:wifi: mt76: do not run mt76_unregister_device() on unregistered hwTrying to probe a mt7921e pci card without firmware results in a
successful probe where ieee80211_register_hw hasn't been called. When
removing the driver, ieee802111_unregister_hw is called unconditionally
leading to a kernel NULL pointer dereference.
Fix the issue running mt76_unregister_device routine just for registered
hw. | [] |
|
CVE-2022-49211 | mips: cdmm: Fix refcount leak in mips_cdmm_phys_base | In the Linux kernel, the following vulnerability has been resolved:
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
The of_find_compatible_node() function returns a node pointer with
refcount incremented, We should use of_node_put() on it when done
Add the missing of_node_put() to release the refcount. | [] |
GHSA-4pw7-wf99-mgcj | The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! stores database backup files with predictable names under the web root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to a backup file in administrators/backups/. | [] |
|
CVE-2019-18411 | Zoho ManageEngine ADSelfService Plus 5.x through 5803 has CSRF on the users' profile information page. Users who are attacked with this vulnerability will be forced to modify their enrolled information, such as email and mobile phone, unintentionally. Attackers could use the reset password function and control the system to send the authentication code back to the channel that the attackers own. | [
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5010:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5011:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5020:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5021:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5022:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5030:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5032:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5040:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5041:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5103:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5104:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5105:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5106:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5107:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5108:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5109:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5111:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5112:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5114:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5115:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5200:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5201:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5202:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5203:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5204:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5205:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5206:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5207:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5300:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5301:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5302:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5303:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5304:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5305:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5306:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5307:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5308:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5309:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5310:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5311:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5312:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5313:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5314:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5315:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5316:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5317:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5318:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5319:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5320:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5321:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5322:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5323:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5324:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5325:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5326:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5327:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5328:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5329:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5330:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.4:5400:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5500:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5501:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5502:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5503:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5504:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5505:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5506:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5507:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5508:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5509:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5510:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5511:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5512:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5513:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5514:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5515:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5516:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5517:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5518:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5519:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5520:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5521:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5600:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5601:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5602:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5603:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5604:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5605:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5606:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5607:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5702:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5704:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5705:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5706:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5707:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5708:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5709:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5710:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.8:5800:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.8:5801:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.8:5802:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.8:5803:*:*:*:*:*:*"
] |
|
GHSA-27pw-7wxg-pvx9 | Improper access control vulnerability in Quick Share prior to 13.5.52.0 allows local attacker to access local files. | [] |
|
CVE-2020-5408 | Dictionary attack with Spring Security queryable text encryptor | Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack. | [
"cpe:2.3:a:pivotal_software:spring_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:*"
] |
GHSA-7gpq-38wj-hv97 | Improper access control vulnerability in Samsung Security Supporter prior to version 1.2.40.0 allows attacker to set the arbitrary folder as Secret Folder without Samsung Security Supporter permission | [] |
|
CVE-2019-6462 | An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized. | [
"cpe:2.3:a:cairographics:cairo:1.16.0:*:*:*:*:*:*:*"
] |
|
GHSA-9hgr-v6cx-qmq2 | This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.5-47309. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the IDE virtual device. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-13187. | [] |
|
CVE-2004-0998 | Format string vulnerability in telnetd-ssl 0.17 and earlier allows remote attackers to execute arbitrary code. | [
"cpe:2.3:a:telnetd:telnetd:0.17.18:*:*:*:*:*:*:*",
"cpe:2.3:a:telnetd:telnetd:0.17.25:*:*:*:*:*:*:*",
"cpe:2.3:a:telnetd:telnetd-ssl:0.17.17_0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:telnetd:telnetd-ssl:0.17.17_0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:telnetd:telnetd-ssl:0.17.17_0.1.2:*:woody1:*:*:*:*:*"
] |
|
GHSA-mm6x-3vj3-q4jp | Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values. | [] |
|
GHSA-6865-fwr3-4624 | IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148419. | [] |
|
GHSA-4wj6-2665-qg48 | The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file system entries in FAT file systems and other file systems for which . is not a reserved name, which allows local users to hide activities it more difficult to conduct forensics activities, as demonstrated by Flame. | [] |
|
CVE-2022-45697 | Arbitrary File Delete vulnerability in Razer Central before v7.8.0.381 when handling files in the Accounts directory. | [
"cpe:2.3:a:razer:razer_central:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-14964 | In IKARUS anti.virus before 2.16.18, the ntguard.sys driver contains an Arbitrary Write vulnerability because of not validating input values from IOCtl 0x8300005c. | [
"cpe:2.3:a:ikarussecurity:anti.virus:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-1720 | The nsHtml5TreeBuilder::resetTheInsertionMode function in the HTML5 Tree Builder in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 does not properly maintain the state of the insertion-mode stack for template elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer over-read) by triggering use of this stack in its empty state. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:17.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.11:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.14:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.18:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.18:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.18:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.18:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.19:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.19:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.20:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.20:beta3:*:*:*:*:*:*"
] |
|
GHSA-3vxp-q565-46fp | The TradeKing Forex for iPhone app 1.2.1 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-6rxj-75v5-5pw4 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] |
|
CVE-2025-1945 | picklescan - Zip Flag Bit Exploit Crashes Picklescan But Not PyTorch | picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch's torch.load(). This can lead to arbitrary code execution when loading a compromised model. | [] |
CVE-2019-20461 | An issue was discovered on Alecto IVM-100 2019-11-12 devices. The device uses a custom UDP protocol to start and control video and audio services. The protocol has been partially reverse engineered. Based upon the reverse engineering, no password or username is ever transferred over this protocol. Thus, one can set up the camera connection feed with only the encoded UID. It is possible to set up sessions with the camera over the Internet by using the encoded UID and the custom UDP protocol, because authentication happens at the client side. | [
"cpe:2.3:o:alecto:ivm-100_firmware:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-42850 | A weak default administrator password for the web interface and serial port was reported in some Lenovo Personal Cloud Storage devices that could allow unauthorized device access to an attacker with physical or local network access. | [
"cpe:2.3:o:lenovo:a1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:a1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:t1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:t1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:x1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:x1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:t2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:t2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:t2pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:t2pro:-:*:*:*:*:*:*:*"
] |
|
GHSA-36wp-g3gj-7v3h | IBM Engineering Requirements Quality Assistant On-Premises could allow an authenticated user to obtain sensitive information due to improper input validation. IBM X-Force ID: 186282. | [] |
|
CVE-2024-2078 | Cross-Site Scripting vulnerability in HelpDeskZ | A Cross-Site Scripting (XSS) vulnerability has been found in HelpDeskZ affecting version 2.0.2 and earlier. This vulnerability could allow an attacker to send a specially crafted JavaScript payload within the email field and partially take control of an authenticated user's browser session. | [] |
CVE-2024-11196 | Multi-column Tag Map <= 17.0.33 - Authenticated (Contributor+) Stored Cross-Site Scripting via mctagmap Shortcode | The Multi-column Tag Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mctagmap shortcode in all versions up to, and including, 17.0.33 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
CVE-2021-27935 | An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie. | [
"cpe:2.3:a:adguard:adguard_home:*:*:*:*:*:*:*:*"
] |
|
GHSA-pf6g-9f5m-5mxf | Buffer overflow in log2mail before 0.2.5.1 allows remote attackers to execute arbitrary code via a long log message. | [] |
|
CVE-2024-0325 | Command Injection in Helix Sync | In Helix Sync versions prior to 2024.1, a local command injection was identified. Reported by Bryan Riggins.
| [
"cpe:2.3:a:perforce:helix_sync:*:*:*:*:*:*:*:*"
] |
CVE-2025-21297 | Windows Remote Desktop Services Remote Code Execution Vulnerability | Windows Remote Desktop Services Remote Code Execution Vulnerability | [] |
CVE-2020-2178 | Jenkins Parasoft Findings Plugin 10.4.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | [
"cpe:2.3:a:jenkins:parasoft_findings:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2024-7687 | AZIndex <= 0.8.1 - Stored XSS via CSRF | The AZIndex WordPress plugin through 0.8.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. | [
"cpe:2.3:a:azindex_wordpress_plugin:azindex_wordpress_plugin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:azindex_project:azindex:*:*:*:*:*:wordpress:*:*"
] |
CVE-2022-24061 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Sante DICOM Viewer Pro 11.8.7.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DCM files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15100. | [
"cpe:2.3:a:santesoft:dicom_viewer_pro:11.8.7:*:*:*:*:*:*:*"
] |
|
CVE-2014-0414 | Unspecified vulnerability in the Oracle Containers for J2EE component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality via vectors related to HTTP Request Handling. | [
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.5:*:*:*:*:*:*:*"
] |
|
CVE-2018-14798 | Fuji Electric FRENIC LOADER v3.3 v7.3.4.1a of FRENIC-Mini (C1), FRENIC-Mini (C2), FRENIC-Eco, FRENIC-Multi, FRENIC-MEGA, FRENIC-Ace. The program does not properly parse FNC files that may allow for information disclosure. | [
"cpe:2.3:o:fujielectric:frenic_loader_3.3_firmware:7.3.4.1a:*:*:*:*:*:*:*",
"cpe:2.3:h:fujielectric:frenic-ace:-:*:*:*:*:*:*:*",
"cpe:2.3:h:fujielectric:frenic-eco:-:*:*:*:*:*:*:*",
"cpe:2.3:h:fujielectric:frenic-mega:-:*:*:*:*:*:*:*",
"cpe:2.3:h:fujielectric:frenic-mini\\(c1\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:fujielectric:frenic-mini\\(c2\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:fujielectric:frenic-multi:-:*:*:*:*:*:*:*"
] |
|
GHSA-h6rp-8v4j-hwph | Apache Camel's XSLT component allows remote attackers to execute arbitrary Java methods | The XSLT component in Apache Camel 2.11.x before 2.11.4, 2.12.x before 2.12.3, and possibly earlier versions allows remote attackers to execute arbitrary Java methods via a crafted message. | [] |
CVE-2008-4651 | Multiple SQL injection vulnerabilities in Jetbox CMS 2.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) orderby parameter to admin/cms/images.php and the (2) nav_id parameter in an editrecord action to admin/cms/nav.php. | [
"cpe:2.3:a:jetbox:jetbox_cms:2.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-20095 | In imgsensor, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06479763; Issue ID: ALPS06479763. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] |
|
GHSA-4cr9-w8vr-8665 | OXID eShop Professional Edition before 4.7.13 and 4.8.x before 4.8.7, Enterprise Edition before 5.0.13 and 5.1.x before 5.1.7, and Community Edition before 4.7.13 and 4.8.x before 4.8.7 allow remote attackers to assign users to arbitrary dynamical user groups. | [] |
|
GHSA-jr8x-c265-m3fr | Buffer overflow in mstm in HP-UX allows local users to gain root access. | [] |
|
GHSA-xrj9-h79q-8446 | Xcode Tools before 2.3 for Mac OS X 10.4, when running the WebObjects plugin, allows remote attackers to access or modify WebObjects projects through a network service. | [] |
|
GHSA-4jhj-88x4-5xw5 | A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /ajax.php?action=save_member. The manipulation of the argument umember_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-jhg3-999m-vxmh | Integer overflow in ImageIO in Apple Mac OS X before 10.5.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG2000 image that triggers a heap-based buffer overflow. | [] |
|
GHSA-vp55-fhxx-vcx8 | Maven Extension plugin for Gradle Enterprise vulnerable to Deserialization of Untrusted Data | An issue was discovered in the Maven Extension plugin before 1.6 for Gradle Enterprise. It is vulnerable to, in the worst case, Remote Code Execution, and in the general case, local privilege escalation. Internally, the plugin uses a socket connection to send serialized Java objects that are deserialized by a Java standard library ObjectInputStream. This ObjectInputStream was not restricted to a list of trusted classes, thus allowing an attacker to send a malicious deserialization gadget chain to achieve code execution. The socket was not bound exclusively to localhost. The port this socket is assigned to is randomly selected by the JVM and is not intentionally exposed to the public (either by design or documentation). | [] |
GHSA-7r6c-c52h-pf9p | A maliciously crafted STP file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process. | [] |
|
CVE-2023-42102 | Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability | Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-20409. | [
"cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*"
] |
CVE-2019-12221 | An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a SEGV in the SDL function SDL_free_REAL at stdlib/SDL_malloc.c. | [
"cpe:2.3:a:libsdl:sdl2_image:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libsdl:simple_directmedia_layer:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-f3h4-xw83-8x9c | An issue was discovered in Veritas NetBackup through 10.0 and related Veritas products. The NetBackup Primary server is vulnerable to a SQL Injection attack affecting the NBFSMCLIENT service. | [] |
|
GHSA-96jf-4pq3-qqgx | Heap buffer overflow in Bookmarks in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via specific user gesture. | [] |
|
CVE-2020-0708 | A remote code execution vulnerability exists when the Windows Imaging Library improperly handles memory.To exploit this vulnerability, an attacker would first have to coerce a victim to open a specially crafted file.The security update addresses the vulnerability by correcting how the Windows Imaging Library handles memory., aka 'Windows Imaging Library Remote Code Execution Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-g4r6-j635-4pr7 | A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system. | [] |
|
CVE-2018-10300 | Cross-site scripting (XSS) vulnerability in the Web-Dorado Instagram Feed WD plugin before 1.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML by passing payloads in an Instagram profile's bio. | [
"cpe:2.3:a:web-dorado:wd_instagram_feed:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-m639-9whg-fw97 | Prototype Pollution in object-extend | The package object-extend from 0.0.0 through 0.5.0 is vulnerable to Prototype Pollution via object-extend. | [] |
GHSA-vm9x-4m38-wvhh | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Twitter News Feed allows Reflected XSS. This issue affects Twitter News Feed: from n/a through 1.1.1. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.