id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2016-10884 | The simple-membership plugin before 3.3.3 for WordPress has multiple CSRF issues. | [
"cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2018-6705 | McAfee Agent (MA) for Linux Privilege Escalation vulnerability | Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions. | [
"cpe:2.3:a:mcafee:agent:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:mcafee:agent:5.5.0:*:*:*:*:linux:*:*",
"cpe:2.3:a:mcafee:agent:5.5.1:*:*:*:*:linux:*:*"
] |
GHSA-vg3r-vq2c-rgpg | In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453560; Issue ID: ALPS07453560. | [] |
|
CVE-2010-0285 | gnome-screensaver 2.14.3, 2.22.2, 2.27.x, 2.28.0, and 2.28.3, when the X configuration enables the extend screen option, allows physically proximate attackers to bypass screen locking, access an unattended workstation, and view half of the GNOME desktop by attaching an external monitor. | [
"cpe:2.3:a:gnome:screensaver:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:screensaver:2.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:screensaver:2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:screensaver:2.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:screensaver:2.28.3:*:*:*:*:*:*:*"
] |
|
CVE-2019-5970 | Cross-site scripting vulnerability in Attendance Manager 0.5.6 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:sukimalab:attendance_manager:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2014-0641 | Cross-site request forgery (CSRF) vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to hijack the authentication of arbitrary users. | [
"cpe:2.3:a:emc:rsa_archer_egrc:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.4:sp1:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.5:*:*:*:*:*:*:*"
] |
|
CVE-2018-5219 | In K7 Antivirus 15.1.0306, the driver file (K7FWHlpr.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x83002168. | [
"cpe:2.3:a:k7computing:antivirus:15.1.0306:*:*:*:*:*:*:*"
] |
|
GHSA-fv2g-q5cc-8667 | Stack-based buffer overflow in the sub_read_line_sami function in subreader.c in MPlayer, as used in SMPlayer 0.6.9, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a SAMI subtitle file. | [] |
|
GHSA-g778-c6cg-9fmw | Improper access due to socket opened by the logging application without specifying localhost address in Snapdragon Consumer IOT, Snapdragon Mobile in APQ8053, Rennell, SDX20 | [] |
|
CVE-2023-20133 | A vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because of insufficient validation of user-supplied input in Webex Events (classic) programs, email templates, and survey questions. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. | [
"cpe:2.3:a:cisco:webex_meetings:39.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:39.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:40.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:40.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:40.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:40.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:40.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:40.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:42.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:42.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:42.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:42.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:42.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:42.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:42.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:43.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:43.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:43.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:43.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:43.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:43.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:43.5.0:*:*:*:*:*:*:*"
] |
|
GHSA-2w5j-qfvw-2hf5 | ZITADEL's User Grant Deactivation not Working | ImpactZITADEL's user grants deactivation mechanism did not work correctly. Deactivated user grants were still provided in token, which could lead to unauthorized access to applications and resources.
Additionally, the management and auth API always returned the state as active or did not provide any information about the state.Patches2.x versions are fixed on >= [2.62.1](https://github.com/zitadel/zitadel/releases/tag/v2.62.1)
2.61.x versions are fixed on >= [2.61.1](https://github.com/zitadel/zitadel/releases/tag/v2.61.1)
2.60.x versions are fixed on >= [2.60.2](https://github.com/zitadel/zitadel/releases/tag/v2.60.2)
2.59.x versions are fixed on >= [2.59.3](https://github.com/zitadel/zitadel/releases/tag/v2.59.3)
2.58.x versions are fixed on >= [2.58.5](https://github.com/zitadel/zitadel/releases/tag/v2.58.5)
2.57.x versions are fixed on >= [2.57.5](https://github.com/zitadel/zitadel/releases/tag/v2.57.5)
2.56.x versions are fixed on >= [2.56.6](https://github.com/zitadel/zitadel/releases/tag/v2.56.6)
2.55.x versions are fixed on >= [2.55.8](https://github.com/zitadel/zitadel/releases/tag/v2.55.8)
2.54.x versions are fixed on >= [2.54.10](https://github.com/zitadel/zitadel/releases/tag/v2.54.10)WorkaroundsUnpatched versions can explicitly remove the user grants to make sure the user does not get access anymore.QuestionsIf you have any questions or comments about this advisory, please email us at [[email protected]](mailto:[email protected]) | [] |
CVE-2024-7682 | code-projects Job Portal rw_i_nat.php sql injection | A vulnerability was found in code-projects Job Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file rw_i_nat.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:code-projects:job_portal:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fabianros:job_portal:1.0:*:*:*:*:*:*:*"
] |
GHSA-rfrx-wp2r-q456 | Default permissions for a properties file were too permissive. Local system users could read potentially sensitive information. We updated the default permissions for noreply.properties set during package installation. No publicly available exploits are known. | [] |
|
GHSA-q9fr-r9vg-8qvh | Directory traversal vulnerability in download.php in EZWebAlbum allows remote attackers to read arbitrary files via the dlfilename parameter. | [] |
|
GHSA-5www-9f53-p4h6 | The (1) arq_updater, (2) arqcommitter, (3) standardrestorer, (4) arqglacierrestorer, and (5) arqs3glacierrestorer helper apps in Arq 5.x before 5.10 for Mac allow local users to gain root privileges via a crafted data packet. | [] |
|
GHSA-j2jx-q7gc-p3wp | An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "CFNetwork Session" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [] |
|
GHSA-hrwv-325w-f6ch | XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The attacker must physically disconnect many video outputs. | [] |
|
GHSA-c662-cq7c-gxxm | in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds write. | [] |
|
GHSA-jq64-pj79-mg78 | Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses non-random default credentials of: ftp/ftp or intellian:12345678. A remote network attacker can gain elevated access to a vulnerable device. | [] |
|
CVE-2016-10247 | Buffer overflow in the my_getline function in jstest_main.c in Mujstest in Artifex Software, Inc. MuPDF before 1.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file. | [
"cpe:2.3:a:artifex:mupdf:*:rc2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2008-4470 | Stack-based buffer overflow in Numark CUE 5.0 rev2 allows user-assisted attackers to cause a denial of service (application crash) or execute arbitrary code via an M3U playlist file that contains a long absolute pathname. | [
"cpe:2.3:a:numark:cue:5.0:rev2:*:*:*:*:*:*"
] |
|
GHSA-72g2-p7rm-v72h | Multiple stack-based buffer overflows in cgi/close_window.cgi in the web interface in the Intelligent Platform Management Interface (IPMI) with firmware before 3.15 (SMT_X9_315) on Supermicro X9 generation motherboards allow remote attackers to execute arbitrary code via the (1) sess_sid or (2) ACT parameter. | [] |
|
GHSA-f6x5-2qpg-4r8j | Vulnerability in the Oracle Payables product of Oracle E-Business Suite (component: Invoice Approvals). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Payables. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Payables accessible data as well as unauthorized access to critical data or complete access to all Oracle Payables accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [] |
|
CVE-2014-3293 | Cisco IOS 15.4(3)S0b on ASR901 devices makes incorrect decisions to use the CPU for IPv4 packet processing, which allows remote attackers to cause a denial of service (BGP neighbor flapping) by sending many crafted IPv4 packets, aka Bug ID CSCuo29736. | [
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s0b:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr901:-:*:*:*:*:*:*:*"
] |
|
CVE-2006-4297 | SQL injection vulnerability in shopping_cart.php in osCommerce before 2.2 Milestone 2 060817 allows remote attackers to execute arbitrary SQL commands via id array parameters. | [
"cpe:2.3:a:oscommerce:oscommerce:2.2_ms2_2006-08-17:*:*:*:*:*:*:*"
] |
|
GHSA-qhrg-rwr6-hrvj | Cross-site scripting (XSS) vulnerability in photos/index.php in TCW PHP Album 1.0 allows remote attackers to inject arbitrary web script or HTML via the album parameter. | [] |
|
GHSA-63v4-vr74-c4cq | The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.x and 11.x before 11.0 FP4 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 allows remote authenticated users to inject links via unspecified vectors. | [] |
|
CVE-2005-4867 | Stack-based buffer overflow in the SATENCRYPT function in IBM DB2 8.1, when Satellite Administration (SATADMIN) is enabled, allows remote attackers to execute arbitrary code via a long parameter. | [
"cpe:2.3:a:ibm:db2_universal_database:7.0:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.0:*:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.0:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.0:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.1:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.1:*:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.1:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.2:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.2:*:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.2:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.2:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:7.2:*:windows:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.0:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.0:*:hp-ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.0:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.0:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.0:*:windows:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.1:*:aix:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.1:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.1:*:solaris:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_universal_database:8.1:*:windows:*:*:*:*:*"
] |
|
GHSA-2c44-c825-pqp7 | ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** Out-of-bounds Write vulnerability in Hitachi EH-VIEW (Designer) allows local attackers to potentially execute arbitray code on affected EH-VIEW installations. User interaction is required to exploit the vulnerabilities in that the user must open a malicious file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [] |
|
GHSA-qqg3-vq27-3xvx | Windows Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24474. | [] |
|
CVE-2010-4261 | Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.01:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.02:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.03:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.05:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.14:pre:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.60p:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.67-1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.68.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.70:rc:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.75.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80:rc4:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.80_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.81:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.84:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.85.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.86.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.87.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.4:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.5:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.6:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.88.7_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc1.1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90:rc3:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.1_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.2_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.90.3_p1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.91.2_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.92_p0:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.93.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.94.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:src1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95:src2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.95.3:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96:rc1:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96:rc2:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96.1:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96.2:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:0.96.3:*:*:*:*:*:*:*"
] |
|
GHSA-rfjp-9qrh-wm56 | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [] |
|
CVE-2025-47562 | WordPress MapSVG <= 8.5.34 - Content Injection Vulnerability | Improper Control of Generation of Code ('Code Injection') vulnerability in RomanCode MapSVG allows Code Injection. This issue affects MapSVG: from n/a through 8.5.34. | [] |
CVE-2021-21870 | A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.4.37651. A specially crafted PDF document can trigger the reuse of previously free memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening a malicious file or site to trigger this vulnerability if the browser plugin extension is enabled. | [
"cpe:2.3:a:foxit:pdf_reader:10.1.4.37651:*:*:*:*:*:*:*"
] |
|
GHSA-w8q7-623v-pvjv | A vulnerability based on insecure user/password encryption in the JOE (job editor) component of SOS JobScheduler 1.12 and 1.13 allows attackers to decrypt the user/password that is optionally stored with a user's profile. | [] |
|
GHSA-p3jf-39f4-gqr8 | In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix use-after-free in ksmbd_free_work_struct->interim_entry of ksmbd_work could be deleted after oplock is freed.
We don't need to manage it with linked list. The interim request could be
immediately sent whenever a oplock break wait is needed. | [] |
|
GHSA-99rx-2f4j-q27g | A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1126, CVE-2020-1136, CVE-2020-1150. | [] |
|
CVE-2021-24923 | Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue < 3.1.25 - Reflected XSS | The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.25 does not escape the sib-statistics-date parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue | [
"cpe:2.3:a:brevo:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*"
] |
GHSA-3724-jcfq-mvfc | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Miguel Peixe WP Feature Box allows Stored XSS.This issue affects WP Feature Box: from n/a through 0.1.3. | [] |
|
GHSA-fv4q-wm8c-wjg4 | Keycloak Authentication Error | A vulnerability was found in Keycloak 7.x where the user federation LDAP bind type is none (LDAP anonymous bind), any password, invalid or valid will be accepted. | [] |
CVE-2023-3762 | Intergard SGS sensitive information in memory | A vulnerability was found in Intergard SGS 8.7.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to cleartext storage of sensitive information in memory. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-234447. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:intergard:smartgard_silver_with_matrix_keyboard:8.7.0:*:*:*:*:*:*:*"
] |
GHSA-94hw-5cx8-g994 | An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file. | [] |
|
GHSA-chp3-8jq7-78c6 | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server. | [] |
|
CVE-2022-41224 | Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*"
] |
|
GHSA-g385-472x-mccv | PHP remote file inclusion vulnerability in espaces/communiques/annotations.php in C-Arbre 0.6PR7 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter, a different vector than CVE-2007-1721. | [] |
|
GHSA-hfm2-fffh-v47v | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197. | [] |
GHSA-gvqm-hqhp-9mhq | A Cross-Frame Scripting vulnerability in IBM InfoSphere Information Server 11.3, 11.5, and 11.7 can allow an attacker to load the vulnerable application inside an HTML iframe tag on a malicious page. IBM X-Force ID: 159419. | [] |
|
CVE-2014-6159 | IBM DB2 9.7 before FP10, 9.8 through FP5, 10.1 through FT4, and 10.5 through FP4 on Linux, UNIX, and Windows, when immediate AUTO_REVAL is enabled, allows remote authenticated users to cause a denial of service (daemon crash) via a crafted ALTER TABLE statement. | [
"cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*"
] |
|
CVE-2011-4002 | HP no Mawashimono Nikki 6.6 and earlier allows remote attackers to execute arbitrary commands via unspecified vectors, related to a "command injection vulnerability." | [
"cpe:2.3:a:mawashimono:nikki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.62:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.71:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:2.81:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.41:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.42:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.43:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.44:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.51:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.52:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.71:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.72:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.73:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:4.74:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.41:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.42:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.43:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.51:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.52:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.53:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.54:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.55:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.56:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.57:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.58:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.59:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.111:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.141:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.142:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.143:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.144:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.145:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.146:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.147:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.148:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.149:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.151:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.152:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.153:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.154:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.155:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.156:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.157:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.158:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.159:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.161:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.162:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.163:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:5.231:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.00:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.07:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.08:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.09:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.25:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.26:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.27:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.28:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.29:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.31:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.32:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.33:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.34:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.51:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.52:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.53:*:*:*:*:*:*:*",
"cpe:2.3:a:mawashimono:nikki:6.54:*:*:*:*:*:*:*"
] |
|
GHSA-p6jh-65c7-8r26 | A post-authentication command injection vulnerability in the file upload binary in Zyxel ATP series firmware versions from 4.32 through 5.37 Patch 1, USG FLEX series firmware versions from 4.50 through 5.37 Patch 1, USG FLEX 50(W) series firmware versions from 4.16 through 5.37 Patch 1, USG20(W)-VPN series firmware versions from 4.16 through 5.37 Patch 1, NWA50AX firmware versions through 6.29(ABYW.3), WAC500 firmware versions through 6.65(ABVS.1), WAX300H firmware versions through 6.60(ACHF.1), and WBE660S firmware versions through 6.65(ACGG.1) could allow an authenticated attacker with administrator privileges to execute some operating system (OS) commands on an affected device via FTP. | [] |
|
CVE-2019-8762 | A validation issue was addressed with improved logic. This issue is fixed in Safari 13.0.1, iOS 13.1 and iPadOS 13.1, iCloud for Windows 10.7, tvOS 13, iCloud for Windows 7.14, iTunes 12.10.1 for Windows. Processing maliciously crafted web content may lead to universal cross site scripting. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-5212 | The Simple Download Monitor plugin before 3.5.4 for WordPress has XSS via the sdm_upload_thumbnail (aka File Thumbnail) parameter in an edit action to wp-admin/post.php. | [
"cpe:2.3:a:simple_download_monitor_project:simple_download_monitor:3.5.4:*:*:*:*:wordpress:*:*"
] |
|
GHSA-9hq5-xh26-hcx9 | A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks. | [] |
|
CVE-2016-3205 | The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3206 and CVE-2016-3207. | [
"cpe:2.3:a:microsoft:jscript:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:vbscript:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
] |
|
GHSA-m6q3-2qv4-4mgx | Windows GDI+ on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT 8.1, allows information disclosure by the way it discloses kernel memory addresses, aka "Windows GDI+ Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8685 and CVE-2017-8688. | [] |
|
GHSA-9749-2mfq-hv49 | An issue was discovered in Veritas NetBackup IT Analytics 11 before 11.2.0. The application upgrade process included unsigned files that could be exploited and result in a customer installing unauthentic components. A malicious actor could install rogue Collector executable files (aptare.jar or upgrademanager.zip) on the Portal server, which might then be downloaded and installed on collectors. | [] |
|
GHSA-p6rc-jf56-hhrr | In the Linux kernel, the following vulnerability has been resolved:net/mlx5: LAG, fix logic over MLX5_LAG_FLAG_NDEVS_READYOnly set MLX5_LAG_FLAG_NDEVS_READY if both netdevices are registered.
Doing so guarantees that both ldev->pf[MLX5_LAG_P0].dev and
ldev->pf[MLX5_LAG_P1].dev have valid pointers when
MLX5_LAG_FLAG_NDEVS_READY is set.The core issue is asymmetry in setting MLX5_LAG_FLAG_NDEVS_READY and
clearing it. Setting it is done wrongly when both
ldev->pf[MLX5_LAG_P0].dev and ldev->pf[MLX5_LAG_P1].dev are set;
clearing it is done right when either of ldev->pf[i].netdev is cleared.Consider the following scenario:PF0 loads and sets ldev->pf[MLX5_LAG_P0].dev to a valid pointerPF1 loads and sets both ldev->pf[MLX5_LAG_P1].dev and
ldev->pf[MLX5_LAG_P1].netdev with valid pointers. This results in
MLX5_LAG_FLAG_NDEVS_READY is set.PF0 is unloaded before setting dev->pf[MLX5_LAG_P0].netdev.
MLX5_LAG_FLAG_NDEVS_READY remains set.Further execution of mlx5_do_bond() will result in null pointer
dereference when calling mlx5_lag_is_multipath()This patch fixes the following call trace actually encountered:[ 1293.475195] BUG: kernel NULL pointer dereference, address: 00000000000009a8
[ 1293.478756] #PF: supervisor read access in kernel mode
[ 1293.481320] #PF: error_code(0x0000) - not-present page
[ 1293.483686] PGD 0 P4D 0
[ 1293.484434] Oops: 0000 [#1] SMP PTI
[ 1293.485377] CPU: 1 PID: 23690 Comm: kworker/u16:2 Not tainted 5.18.0-rc5_for_upstream_min_debug_2022_05_05_10_13 #1
[ 1293.488039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[ 1293.490836] Workqueue: mlx5_lag mlx5_do_bond_work [mlx5_core]
[ 1293.492448] RIP: 0010:mlx5_lag_is_multipath+0x5/0x50 [mlx5_core]
[ 1293.494044] Code: e8 70 40 ff e0 48 8b 14 24 48 83 05 5c 1a 1b 00 01 e9 19 ff ff ff 48 83 05 47 1a 1b 00 01 eb d7 0f 1f 44 00 00 0f 1f 44 00 00 <48> 8b 87 a8 09 00 00 48 85 c0 74 26 48 83 05 a7 1b 1b 00 01 41 b8
[ 1293.498673] RSP: 0018:ffff88811b2fbe40 EFLAGS: 00010202
[ 1293.500152] RAX: ffff88818a94e1c0 RBX: ffff888165eca6c0 RCX: 0000000000000000
[ 1293.501841] RDX: 0000000000000001 RSI: ffff88818a94e1c0 RDI: 0000000000000000
[ 1293.503585] RBP: 0000000000000000 R08: ffff888119886740 R09: ffff888165eca73c
[ 1293.505286] R10: 0000000000000018 R11: 0000000000000018 R12: ffff88818a94e1c0
[ 1293.506979] R13: ffff888112729800 R14: 0000000000000000 R15: ffff888112729858
[ 1293.508753] FS: 0000000000000000(0000) GS:ffff88852cc40000(0000) knlGS:0000000000000000
[ 1293.510782] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1293.512265] CR2: 00000000000009a8 CR3: 00000001032d4002 CR4: 0000000000370ea0
[ 1293.514001] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1293.515806] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 | [] |
|
GHSA-qpr8-7f25-4h2q | The Media Library Assistant WordPress plugin before 3.06 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. | [] |
|
CVE-2019-8158 | An XPath entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An attacker can craft a GET request to page cache block rendering module that gets passed to XML data processing engine without validation. The crafted key/value GET request data allows an attacker to limited access to underlying XML data. | [
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.2:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.2:-:*:*:open_source:*:*:*"
] |
|
CVE-2024-8088 | Infinite loop when iterating over zip archive entry names from zipfile.Path | There is a HIGH severity vulnerability affecting the CPython "zipfile"
module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.
When iterating over names of entries in a zip archive (for example, methods
of "zipfile.Path" like "namelist()", "iterdir()", etc)
the process can be put into an infinite loop with a maliciously crafted
zip archive. This defect applies when reading only metadata or extracting
the contents of the zip archive. Programs that are not handling
user-controlled zip archives are not affected. | [
"cpe:2.3:a:python_software_foundation:cpython:*:*:*:*:*:*:*:*"
] |
CVE-2004-1530 | SQL injection vulnerability in the Event Calendar module 2.13 for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the (1) eid or (2) cid parameters. | [
"cpe:2.3:a:rob_sutton:php-nuke_event_calendar:2.13:*:*:*:*:*:*:*"
] |
|
CVE-2024-7472 | Email Injection Vulnerability in lunary-ai/lunary | lunary-ai/lunary v1.2.26 contains an email injection vulnerability in the Send email verification API (/v1/users/send-verification) and Sign up API (/auth/signup). An unauthenticated attacker can inject data into outgoing emails by bypassing the extractFirstName function using a different whitespace character (e.g., \xa0). This vulnerability can be exploited to conduct phishing attacks, damage the application's brand, cause legal and compliance issues, and result in financial impact due to unauthorized email usage. | [
"cpe:2.3:a:lunary-ai:lunary:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lunary:lunary:1.2.26:*:*:*:*:*:*:*"
] |
CVE-2022-28109 | Selenium Selenium Grid (formerly Selenium Standalone Server) Fixed in 4.0.0-alpha-7 is affected by: DNS rebinding. The impact is: execute arbitrary code (remote). The component is: WebDriver endpoint of Selenium Grid / Selenium Standalone Server. The attack vector is: Triggered by browsing to to a malicious remote web server. The WebDriver endpoint of Selenium Server (Grid) is vulnerable to DNS rebinding. This can be used to execute arbitrary code on the machine. | [
"cpe:2.3:a:selenium:selenium_grid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha6:*:*:*:*:*:*"
] |
|
CVE-2023-22516 | This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 8.1.0, 8.2.0, 9.0.0, 9.1.0, 9.2.0, and 9.3.0 of Bamboo Data Center and Server.
This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.5, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.
Atlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
Bamboo Data Center and Server 9.2: Upgrade to a release greater than or equal to 9.2.7.
JDK 1.8u121+ should be used in case Java 8 used to run Bamboo Data Center and Server. See Bamboo 9.2 Upgrade notes (https://confluence.atlassian.com/bambooreleases/bamboo-9-2-upgrade-notes-1207179212.html)
Bamboo Data Center and Server 9.3: Upgrade to a release greater than or equal to 9.3.4
See the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives]).
This vulnerability was discovered by a private user and reported via our Bug Bounty program | [
"cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*"
] |
|
GHSA-mhh3-44xm-j3qf | Multiple cross-site scripting (XSS) vulnerabilities in the WP Google Maps plugin before 6.0.27 for WordPress allow remote attackers to inject arbitrary web script or HTML via the poly_id parameter in an (1) edit_poly, (2) edit_polyline, or (3) edit_marker action in the wp-google-maps-menu page to wp-admin/admin.php. | [] |
|
CVE-2025-0798 | MicroWorld eScan Antivirus Quarantine rtscanner os command injection | A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been rated as critical. This issue affects some unknown processing of the file rtscanner of the component Quarantine Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
CVE-2021-31646 | Gestsup before 3.2.10 allows account takeover through the password recovery functionality (remote). The affected component is the file forgot_pwd.php - it uses a weak algorithm for the generation of password recovery tokens (the PHP uniqueid function), allowing a brute force attack. | [
"cpe:2.3:a:gestsup:gestsup:*:*:*:*:*:*:*:*"
] |
|
GHSA-6wwp-p7c5-p9pm | The cdf_check_stream_offset function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, relies on incorrect sector-size data, which allows remote attackers to cause a denial of service (application crash) via a crafted stream offset in a CDF file. | [] |
|
GHSA-468q-q36v-q9gc | Cross-site request forgery (CSRF) vulnerability in the Admin:hover module for Drupal allows remote attackers to hijack the authentication of administrators for requests that unpublish all nodes, and possibly other actions, via unspecified vectors. | [] |
|
GHSA-qfx3-m2xp-3pcp | Deserialization of untrusted data in the agent portal of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution. | [] |
|
GHSA-c67w-6vrc-3748 | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | [] |
|
GHSA-9g49-vh67-7f26 | IBM Guardium Data Encryption (GDE) 4.0.0.4 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 196217. | [] |
|
GHSA-jr7q-wv4c-3c65 | A vulnerability was found in IROAD Dash Cam FX2 up to 20250308. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /etc/passwd of the component Password Hash Handler. The manipulation leads to password hash with insufficient computational effort. Access to the local network is required for this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2024-6977 | Cato Networks Windows SDP Client Sensitive data in trace logs can lead to account takeover | A vulnerability in Cato Networks SDP Client on Windows allows the insertion of sensitive information into the log file, which can lead to an account takeover. However, the attack requires bypassing protections on modifying the tunnel token on a the attacker's system.This issue affects SDP Client: before 5.10.34. | [
"cpe:2.3:a:catonetworks:cato_client:*:*:*:*:*:windows:*:*"
] |
GHSA-8vh6-m67f-4h33 | VyOS 1.3 through 1.5 or any Debian-based system using dropbear in combination with live-build has the same Dropbear private host keys across different installations. Thus, an attacker can conduct active man-in-the-middle attacks against SSH connections if Dropbear is enabled as the SSH daemon. I n VyOS, this is not the default configuration for the system SSH daemon, but is for the console service. To mitigate this, one can run "rm -f /etc/dropbear/*key*" and/or "rm -f /etc/dropbear-initramfs/*key*" and then dropbearkey -t rsa -s 4096 -f /etc/dropbear_rsa_host_key and reload the service or reboot the system before using Dropbear as the SSH daemon (this clears out all keys mistakenly built into the release image) or update to the latest version of VyOS 1.4 or 1.5. Note that this vulnerability is not unique to VyOS and may appear in any Debian-based Linux distribution that uses Dropbear in combination with live-build, which has a safeguard against this behavior in OpenSSH but no equivalent one for Dropbear. | [] |
|
CVE-2018-20814 | An XSS issue was found with Psaldownload.cgi in Pulse Secure Pulse Connect Secure (PCS) 8.3R2 before 8.3R2 and Pulse Policy Secure (PPS) 5.4RX before 5.4R2. This is not applicable to PCS 8.1RX or PPS 5.2RX. | [
"cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:*",
"cpe:2.3:a:pulsesecure:pulse_policy_secure:5.4:r1:*:*:*:*:*:*"
] |
|
GHSA-x5h2-7246-rqqh | A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. This affects an unknown part of the file /dashboard/admin/viewdetailroutine.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-9773-3fqg-8w25 | OpenStack Neutron's unsupported dport option prevents applying security groups | An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.) | [] |
GHSA-2ph6-gc2m-75x2 | Unspecified vulnerability in Oracle Database Server 8.1.7.4, 9.0.1.5, 9.0.1.5 FIPS, 9.2.0.7, and 10.1.0.5, Application Server 1.0.2.2, 9.0.4.2, and 10.1.2.0.2, and Collaboration Suite Release 2, version 9.0.4.2 (Oracle9i) has unspecified impact and attack vectors, as identified by Oracle Vuln# DBC01 in the Protocol Support component. | [] |
|
GHSA-cm9h-5j6h-gr93 | TP-Link Archer C1200 1.13 Build 2018/01/24 rel.52299 EU devices have XSS via the PATH_INFO to the /webpages/data URI. | [] |
|
GHSA-gr66-xjx6-r3jm | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV320 and RV325 Series Routers and Cisco Small Business RV016, RV042, and RV082 Routers could allow an authenticated, remote attacker with administrative privileges to execute arbitrary commands on an affected device. The vulnerabilities exist because the web-based management interface does not properly validate user-supplied input to scripts. An attacker with administrative privileges that are sufficient to log in to the web-based management interface could exploit each vulnerability by sending malicious requests to an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system. | [] |
|
GHSA-5fp6-4xw3-xqq3 | @keystone-6/core's bundled cuid package known to be insecure | SummaryThe `cuid` package used by `@keystone-6/*` and upstream dependencies is deprecated and [marked as insecure by the author](https://github.com/paralleldrive/cuid#status-deprecated-due-to-security-use-cuid2-instead).As reported by the authorCuid and other k-sortable and non-cryptographic ids (Ulid, ObjectId, KSUID, all UUIDs) are all insecure. Use @paralleldrive/cuid2 instead.What are doing about this?[We are waiting on Prisma](https://github.com/keystonejs/keystone/issues/8282) to add support for [`cuid2`](https://github.com/paralleldrive/cuid2)Alternatively, we might default to a random string ourselvesWhat can I do about this?We have added a work-around for users who want to provide custom identifiers in https://github.com/keystonejs/keystone/pull/8645What if I need a `cuid`?The features marked as a security vulnerability by @paralleldrive are sometimes actually needed ([as written in the README of `cuid`](https://github.com/paralleldrive/cuid#motivation)) - the problem is the inherent risks that features like this can have.You might actually want the features of a monotonically increasing (auto-increment, k-sortable), and timestamp-based id as part of your application, and keystone should support that - but you might not want them by _default_.
This is why this security advisory has been accepted by me (@dcousens), we currently use cuid identifiers by default, and that should change.ImpactI have accepted this security advisory on the basis that we don't need this kind of identifier typically, and the need for them should be driven by an application's requirements, not a convenient default. | [] |
GHSA-pg9c-x6hj-pgx5 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
GHSA-4344-rjcf-rjfg | SQL injection vulnerability in Aimluck Aipo before 5.1.1, and Aipo for ASP before 5.1.1, allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | [] |
|
GHSA-9g75-854j-jwmx | Apache VCL versions 2.1 through 2.5 do not properly validate cookie input when determining what node (if any) was previously selected in the privilege tree. The cookie data is then used in an SQL statement. This allows for an SQL injection attack. Access to this portion of a VCL system requires admin level rights. Other layers of security seem to protect against malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech. | [] |
|
GHSA-qw5p-q588-qcq2 | PHP remote file inclusion vulnerability in CaLogic Calendars 1.2.2 allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS["CLPath"] parameter to (1) reconfig.php and (2) srxclr.php. NOTE: this might be due to a globals overwrite issue. | [] |
|
GHSA-mxwg-58m3-frx5 | Possible buffer overflow due to lack of buffer length check during management frame Rx handling lead to denial of service in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity | [] |
|
GHSA-9xw9-4ffg-hrqp | Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8513 and CVE-2014-8514. NOTE: this may be clarified later based on details provided by researchers. | [] |
|
GHSA-whwj-f6f6-552j | Microsoft Windows 2000 telnet service allows attackers to cause a denial of service (crash) via a long logon command that contains a backspace. | [] |
|
CVE-2012-5319 | Cross-site request forgery (CSRF) vulnerability in setup/security.cgi in D-Link DCS-900, DCS-2000, and DCS-5300 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via the rootpass parameter. | [
"cpe:2.3:h:dlink:dcs-2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-5300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-900:-:*:*:*:*:*:*:*"
] |
|
GHSA-4cgg-mfwm-v63x | An XPath Injection vulnerability due to Improper Input Validation in the J-Web component of Juniper Networks Junos OS allows an authenticated attacker to add an XPath command to the XPath stream, which may allow chaining to other unspecified vulnerabilities, leading to a partial loss of confidentiality. This issue affects Juniper Networks Junos OS: all versions prior to 19.1R3-S9; 19.2 versions prior to 19.2R3-S6; 19.3 versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R2-S7, 19.4R3-S8; 20.1 versions prior to 20.1R3-S5; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S5; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S1, 22.1R2. | [] |
|
CVE-2019-19489 | SMPlayer 19.5.0 has a buffer overflow via a long .m3u file. | [
"cpe:2.3:a:smplayer:smplayer:19.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-rjqj-6hvh-jvv6 | A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to perform a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the web-based management interface to click a link that is designed to submit malicious input to the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information on the targeted device. Cisco Bug IDs: CSCvg51264. | [] |
|
CVE-2017-7866 | FFmpeg before 2017-01-23 has an out-of-bounds write caused by a stack-based buffer overflow related to the decode_zbuf function in libavcodec/pngdec.c. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-56019 | WordPress Inline Footnotes Plugin <= 2.3.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Gavin Rehkemper Inline Footnotes allows Stored XSS.This issue affects Inline Footnotes: from n/a through 2.3.0. | [] |
CVE-2022-23513 | Pi-Hole/AdminLTE vulnerable due to improper access control in queryads endpoint | Pi-Hole is a network-wide ad blocking via your own Linux hardware, AdminLTE is a Pi-hole Dashboard for stats and more. In case of an attack, the threat actor will obtain the ability to perform an unauthorized query for blocked domains on `queryads` endpoint. In the case of application, this vulnerability exists because of a lack of validation in code on a root server path:
`/admin/scripts/pi-hole/phpqueryads.php.` Potential threat actor(s) are able to perform an unauthorized query search in blocked domain lists. This could lead to the disclosure for any victims' personal blacklists. | [
"cpe:2.3:a:pi-hole:adminlte:*:*:*:*:*:*:*:*"
] |
GHSA-94xg-qm4r-9r7c | libpng before 1.6.32 does not properly check the length of chunks against the user limit. | [] |
|
GHSA-85c5-q3p2-9qp4 | Stack-based buffer overflow in IBM Domino 8.5 before 8.5.3 FP6 IF7 and 9.0 before 9.0.1 FP3 IF3 allows remote attackers to execute arbitrary code via a crafted BMP image, aka SPR KLYH9TSMLA. | [] |
|
GHSA-cpc9-q9p6-8g9x | The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read. | [] |
|
GHSA-7gqc-frj2-q3gr | Dmx Forum 2.1a allows remote attackers to obtain username and password information via a direct request to pops/edit.php with a modified membre parameter. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.