Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-jrxq-f8wf-pgjr
A vulnerability was found in SourceCodester Grade Point Average GPA Calculator 1.0 and classified as problematic. Affected by this issue is the function get_scale of the file Master.php. The manipulation of the argument perc leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224672.
[]
GHSA-q48q-r88f-6j34
Unspecified vulnerability in the Oracle Internet Directory component in Oracle Database 9.2.0.8, 9.2.0.8, and DV; and Oracle Fusion Middleware 10.1.2.3 and 10.1.4.0.1; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
[]
CVE-2024-47412
Animate | Use After Free (CWE-416)
Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2013-4221
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML.
[ "cpe:2.3:a:restlet:restlet:*:*:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:milestone1:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:milestone2:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:milestone3:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:milestone4:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:milestone5:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:milestone6:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:rc4:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:rc5:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1:rc6:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:restlet:restlet:2.1.2:*:*:*:*:*:*:*" ]
CVE-2022-49236
bpf: Fix UAF due to race between btf_try_get_module and load_module
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix UAF due to race between btf_try_get_module and load_module While working on code to populate kfunc BTF ID sets for module BTF from its initcall, I noticed that by the time the initcall is invoked, the module BTF can already be seen by userspace (and the BPF verifier). The existing btf_try_get_module calls try_module_get which only fails if mod->state == MODULE_STATE_GOING, i.e. it can increment module reference when module initcall is happening in parallel. Currently, BTF parsing happens from MODULE_STATE_COMING notifier callback. At this point, the module initcalls have not been invoked. The notifier callback parses and prepares the module BTF, allocates an ID, which publishes it to userspace, and then adds it to the btf_modules list allowing the kernel to invoke btf_try_get_module for the BTF. However, at this point, the module has not been fully initialized (i.e. its initcalls have not finished). The code in module.c can still fail and free the module, without caring for other users. However, nothing stops btf_try_get_module from succeeding between the state transition from MODULE_STATE_COMING to MODULE_STATE_LIVE. This leads to a use-after-free issue when BPF program loads successfully in the state transition, load_module's do_init_module call fails and frees the module, and BPF program fd on close calls module_put for the freed module. Future patch has test case to verify we don't regress in this area in future. There are multiple points after prepare_coming_module (in load_module) where failure can occur and module loading can return error. We illustrate and test for the race using the last point where it can practically occur (in module __init function). An illustration of the race: CPU 0 CPU 1 load_module notifier_call(MODULE_STATE_COMING) btf_parse_module btf_alloc_id // Published to userspace list_add(&btf_mod->list, btf_modules) mod->init(...) ... ^ bpf_check | check_pseudo_btf_id | btf_try_get_module | returns true | ... ... | module __init in progress return prog_fd | ... ... V if (ret < 0) free_module(mod) ... close(prog_fd) ... bpf_prog_free_deferred module_put(used_btf.mod) // use-after-free We fix this issue by setting a flag BTF_MODULE_F_LIVE, from the notifier callback when MODULE_STATE_LIVE state is reached for the module, so that we return NULL from btf_try_get_module for modules that are not fully formed. Since try_module_get already checks that module is not in MODULE_STATE_GOING state, and that is the only transition a live module can make before being removed from btf_modules list, this is enough to close the race and prevent the bug. A later selftest patch crafts the race condition artifically to verify that it has been fixed, and that verifier fails to load program (with ENXIO). Lastly, a couple of comments: 1. Even if this race didn't exist, it seems more appropriate to only access resources (ksyms and kfuncs) of a fully formed module which has been initialized completely. 2. This patch was born out of need for synchronization against module initcall for the next patch, so it is needed for correctness even without the aforementioned race condition. The BTF resources initialized by module initcall are set up once and then only looked up, so just waiting until the initcall has finished ensures correct behavior.
[]
CVE-2021-28858
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 does not use SSL by default. Attacker on the local network can monitor traffic and capture the cookie and other sensitive information.
[ "cpe:2.3:o:tp-link:tl-wpa4220_firmware:4.0.2:build_20180308_rel.37064:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-wpa4220:4.0:*:*:*:*:*:*:*" ]
GHSA-x227-wfq2-5jxp
The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data.
[]
CVE-2008-0822
Directory traversal vulnerability in index.php in Scribe 0.2 allows remote attackers to read arbitrary local files via a .. (dot dot) in the page parameter.
[ "cpe:2.3:a:scribe:scribe:0.2:*:*:*:*:*:*:*" ]
GHSA-5f29-9332-frq6
The Pulsating Chat Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.6. This is due to missing or incorrect nonce validation on the amin_chat_button_settings_page() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
CVE-2006-6982
3proxy 0.5 to 0.5.2 does not offer NTLM authentication before basic authentication, which might cause browsers with incomplete RFC2616/RFC2617 support to use basic cleartext authentication even if NTLM is available, which makes it easier for attackers to steal credentials.
[ "cpe:2.3:a:3proxy:3proxy:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:3proxy:3proxy:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:3proxy:3proxy:0.5.2:*:*:*:*:*:*:*" ]
CVE-2010-3616
ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
[ "cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*" ]
CVE-2017-12582
Unprivileged user can access all functions in the Surveillance Station component in QNAP TS212P devices with firmware 4.2.1 build 20160601. Unprivileged user cannot login at front end but with that unprivileged user SID, all function can access at Surveillance Station.
[ "cpe:2.3:o:qnap:ts-212p_firmware:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:h:qnap:ts-212p:-:*:*:*:*:*:*:*" ]
CVE-2024-47337
WordPress Joy Of Text Lite plugin <= 2.3.1 - Broken Access Control vulnerability
Missing Authorization vulnerability in Stuart Wilson Joy Of Text Lite.This issue affects Joy Of Text Lite: from n/a through 2.3.1.
[]
GHSA-2gv7-cc99-m2pr
IBM Security Verify Governance 10.0.2 Identity Manageruses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the product does not also use a salt as part of the input.
[]
GHSA-9p7f-7v7j-rq7j
The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
[]
GHSA-h5fx-pwfx-5925
Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access.
[]
CVE-2022-3566
Linux Kernel TCP tcp_setsockopt race condition
A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.
[ "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
CVE-2017-9861
An issue was discovered in SMA Solar Technology products. The SIP implementation does not properly use authentication with encryption: it is vulnerable to replay attacks, packet injection attacks, and man in the middle attacks. An attacker is able to successfully use SIP to communicate with the device from anywhere within the LAN. An attacker may use this to crash the device, stop it from communicating with the SMA servers, exploit known SIP vulnerabilities, or find sensitive information from the SIP communications. Furthermore, because the SIP communication channel is unencrypted, an attacker capable of understanding the protocol can eavesdrop on communications. For example, passwords can be extracted. NOTE: the vendor's position is that authentication with encryption is not required on an isolated subnetwork. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected
[ "cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*", "cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*" ]
CVE-2020-12850
The following vulnerability applies only to the Pydio Cells Enterprise OVF version 2.0.4. Prior versions of the Pydio Cells Enterprise OVF (such as version 2.0.3) have a looser policy restriction allowing the “pydio” user to execute any privileged command using sudo. In version 2.0.4 of the appliance, the user pydio is responsible for running all the services and binaries that are contained in the Pydio Cells web application package, such as mysqld, cells, among others. This user has privileges restricted to run those services and nothing more.
[ "cpe:2.3:a:pydio:cells:2.0.4:*:*:*:enterprise:*:*:*" ]
GHSA-jrp8-rcj4-qwj2
Verydows v2.0 was discovered to contain an arbitrary file deletion vulnerability via \backend\database_controller.php.
[]
CVE-2014-9474
Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.
[ "cpe:2.3:a:mpfr:gnu_mpfr:*:p10:*:*:*:*:*:*" ]
GHSA-7c8f-c5jx-87w6
An issue was discovered in Logitech Options. The OAuth 2.0 state parameter was not properly validated. This leaves applications vulnerable to CSRF attacks during authentication and authorization operations.
[]
CVE-2024-42480
Kamaji's RBAC Roles for `etcd` are not disjunct
Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an "open at the top" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2.
[ "cpe:2.3:a:clastix:kamaji:*:*:*:*:*:*:*:*" ]
GHSA-wvvr-qwjx-m9v3
Cisco WebEx Meetings Server (WMS) 2.5 allows remote attackers to trigger the download of arbitrary files via a crafted URL, aka Bug ID CSCup10343.
[]
GHSA-q8xv-9qcc-5wr2
.In srtd service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
[]
CVE-2004-2351
Cross-site scripting (XSS) vulnerability in GBook for Php-Nuke 1.0 allows remote attackers to inject arbitrary web script or HTML via multiple parameters, including (1) name, (2) email, (3) city, and (4) message, which do not use the <script> and <style> tags, which are filtered by PHP-Nuke.
[ "cpe:2.3:a:martin_bauer:gbook:*:*:*:*:*:*:*:*", "cpe:2.3:a:martin_bauer:gbook:1.4:*:*:*:*:*:*:*" ]
GHSA-w88m-x3f4-8fp7
A passback vulnerability which relates to production printers and office multifunction printers.
[]
CVE-2023-1651
ChatBot < 4.4.9 - Subscriber+ OpenAI Settings Update to Stored XSS
The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in the AJAX action responsible to update the OpenAI settings, allowing any authenticated users, such as subscriber to update them. Furthermore, due to the lack of escaping of the settings, this could also lead to Stored XSS
[ "cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*" ]
GHSA-425v-6qh8-hmjx
Missing Authorization vulnerability in cedcommerce Ship Per Product allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Ship Per Product: from n/a through 2.1.0.
[]
CVE-2021-29567
Lack of validation in `SparseDenseCwiseMul`
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of validation in `tf.raw_ops.SparseDenseCwiseMul`, an attacker can trigger denial of service via `CHECK`-fails or accesses to outside the bounds of heap allocated data. Since the implementation(https://github.com/tensorflow/tensorflow/blob/38178a2f7a681a7835bb0912702a134bfe3b4d84/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L68-L80) only validates the rank of the input arguments but no constraints between dimensions(https://www.tensorflow.org/api_docs/python/tf/raw_ops/SparseDenseCwiseMul), an attacker can abuse them to trigger internal `CHECK` assertions (and cause program termination, denial of service) or to write to memory outside of bounds of heap allocated tensor buffers. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*" ]
GHSA-wx33-9hcf-h8wc
IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to manipulate output written to log files. IBM X-Force ID: 260576.
[]
GHSA-g6vq-wc8w-4g69
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
[]
CVE-2004-1504
The displaycontent function in config.php for Just Another Flat file (JAF) CMS 3.0RC allows remote attackers to gain sensitive information via a blank show parameter, which reveals the installation path in an error message, as demonstrated using index.php.
[ "cpe:2.3:a:salims_softhouse:jaf_cms:3.0:rc:*:*:*:*:*:*" ]
CVE-2024-31185
NULL Pointer Dereference in libfluid_msg library
Unchecked Return Value to NULL Pointer Dereference vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of13::MeterBandList::unpack. This issue affects libfluid: 0.1.0.
[ "cpe:2.3:a:open_networking_foundation:libfluid:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:opennetworking:libfluid_msg:0.1.0:*:*:*:*:*:*:*" ]
GHSA-5g2m-vp9w-hprq
The option-tree plugin before 2.6.0 for WordPress has XSS via an add_list_item or add_social_links AJAX request.
[]
GHSA-wgjr-h635-jgcv
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formWifiWpsStart.
[]
GHSA-pxx2-jxr9-c92g
SQL Server Native Client Remote Code Execution Vulnerability
[]
CVE-2023-41974
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
CVE-2014-2665
includes/specials/SpecialChangePassword.php in MediaWiki before 1.19.14, 1.20.x and 1.21.x before 1.21.8, and 1.22.x before 1.22.5 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account, as demonstrated by tracking the victim's activity, related to a "login CSRF" issue.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19:beta_2:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.8:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.9:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.10:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.11:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.12:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.8:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.22.4:*:*:*:*:*:*:*" ]
GHSA-vr64-4m52-33x2
Stack-based buffer overflow in Device Type Manager (DTM) 3.1.6 and earlier for Schneider Electric Invensys SRD Control Valve Positioner devices 960 and 991 allows local users to gain privileges via a malformed DLL file.
[]
CVE-2020-12077
The mappress-google-maps-for-wordpress plugin before 2.53.9 for WordPress does not correctly implement AJAX functions with nonces (or capability checks), leading to remote code execution.
[ "cpe:2.3:a:mappresspro:mappress:*:*:*:*:*:wordpress:*:*" ]
CVE-2010-2214
Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2216.
[ "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_linux:9.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_linux:9.0.48.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_linux:9.0.115.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_linux:9.0.124.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_linux:9.0.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_linux:10.0.12.36:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player_for_linux:10.0.15.3:*:*:*:*:*:*:*" ]
GHSA-m2j3-fr23-v3jf
3D Viewer Remote Code Execution Vulnerability
[]
CVE-2024-4080
Memory Corruption Due to Improper Length Checks in LabVIEW tdcore.dll
A memory corruption issue due to an improper length check in LabVIEW tdcore.dll may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.
[ "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*", "cpe:2.3:a:ni:labview:2021:-:*:*:*:*:*:*", "cpe:2.3:a:ni:labview:2021:sp1:*:*:*:*:*:*", "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*", "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*", "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*", "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*", "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*", "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*" ]
CVE-2020-24401
Incorrect permissions following the deletion of a user role or deactivation of a user
Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect authorization vulnerability. A user can still access resources provisioned under their old role after an administrator removes the role or disables the user's account.
[ "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*", "cpe:2.3:a:magento:magento:2.3.5:-:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.3.5:-:*:*:open_source:*:*:*", "cpe:2.3:a:magento:magento:2.3.5:p1:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.3.5:p1:*:*:open_source:*:*:*", "cpe:2.3:a:magento:magento:2.4.0:*:*:*:commerce:*:*:*", "cpe:2.3:a:magento:magento:2.4.0:*:*:*:open_source:*:*:*" ]
CVE-2013-1801
The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156.
[ "cpe:2.3:a:john_nunemaker:httparty:*:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:john_nunemaker:httparty:0.8.3:*:*:*:*:*:*:*" ]
CVE-2022-36867
Improper access control vulnerability in Editor Lite prior to version 4.0.40.14 allows attackers to access sensitive information.
[ "cpe:2.3:a:samsung:editor_lite:*:*:*:*:*:*:*:*" ]
CVE-2015-0420
Unspecified vulnerability in the Oracle Forms component in Oracle Fusion Middleware 11.1.1.7 and 11.1.2.2 allows remote attackers to affect confidentiality via unknown vectors related to Forms Services.
[ "cpe:2.3:a:oracle:fusion_middleware:11.1.1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.2.2.0:*:*:*:*:*:*:*" ]
GHSA-cg3q-ffg6-3wcg
A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input, aka 'Microsoft Speech API Remote Code Execution Vulnerability'.
[]
GHSA-pxhx-2v5w-x5mg
Multiple SQL injection vulnerabilities in project alumni 1.0.9 and earlier allow remote attackers to execute arbitrary SQL commands via the year parameter to (1) view.page.inc.php, which is reachable through a view action to index.php; or (2) the year parameter to news.page.inc.php, which is reachable through a news action to index.php.
[]
CVE-2009-1463
Static code injection vulnerability in razorCMS before 0.4 allows remote attackers to inject arbitrary PHP code into any page by saving content as a .php file.
[ "cpe:2.3:a:razorcms:razorcms:*:*:*:*:*:*:*:*", "cpe:2.3:a:razorcms:razorcms:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:razorcms:razorcms:0.3:rc2:*:*:*:*:*:*" ]
CVE-2023-0091
A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.
[ "cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*" ]
GHSA-c3pw-ww68-wpx6
Multiple unspecified vulnerabilities in HTTP Server in Oracle Database Server 8i up to 10.1.0.4.2 and Application Server 1.0.2.2 up to 10.1.2.0 have unknown impact and attack vectors, aka Oracle Vuln# (1) DB30 and AS03 or (2) DB31 and AS05.
[]
GHSA-h72g-579j-rqrx
There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization.
[]
GHSA-5xr6-mfp2-pfhc
An attacker with basic privileges in SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, can get access to lcmbiar file and further decrypt the file. After this attacker can gain access to BI user’s passwords and depending on the privileges of the BI user, the attacker can perform operations that can completely compromise the application.
[]
GHSA-c88m-wqpr-4q68
Unspecified vulnerability in System Administration Manager (SAM) in EMS before A.04.20.11.04_01 on HP HP-UX B.11.11, B.11.23, and B.11.31 allows local users to gain privileges via unknown vectors.
[]
CVE-2014-9697
Huawei USG9560/9520/9580 before V300R001C01SPC300 allows remote attackers to cause a memory leak or denial of service (memory exhaustion, reboot and MPU switchover) via a crafted website.
[ "cpe:2.3:o:huawei:usg9560_firmware:v300r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9560_firmware:v300r001c01spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9520_firmware:v300r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9580_firmware:v300r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9580_firmware:v300r001c01spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*" ]
GHSA-jg23-5vq6-r245
Buffer overflow in the meta_read_flac function in meta_decoder.c for Aqualung 0.9beta5 and earlier, and CVS 0.193.2 and earlier, allows user-assisted attackers to execute arbitrary code via a long Vorbis comment in a Free Lossless Audio Codec (FLAC) file.
[]
CVE-2013-0926
Google Chrome before 26.0.1410.43 does not properly handle active content in an EMBED element during a copy-and-paste operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:26.0.1410.41:*:*:*:*:*:*:*" ]
CVE-2021-42309
Microsoft SharePoint Server Remote Code Execution Vulnerability
Microsoft SharePoint Server Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*" ]
GHSA-w6vh-q47r-3xgq
JetBrains TeamCity before 2020.2 was vulnerable to reflected XSS on several pages.
[]
GHSA-2595-5937-8f4h
Domoticz 4.10717 has XSS via item.Name.
[]
GHSA-cv78-f6r2-g223
Capturix ScanShare 1.06 build 50 stores sensitive information such as the password in cleartext in capturixss_cfg.ini, which is readable by local users.
[]
CVE-2025-26056
A command injection vulnerability exists in the Infinxt iEdge 100 2.1.32 in the Troubleshoot module "MTR" functionality. The vulnerability is due to improper validation of user-supplied input in the mtrIp parameter. An attacker can exploit this flaw to execute arbitrary operating system commands on the underlying system with the same privileges as the web application process.
[]
GHSA-qvmf-36h5-3f5v
Improper Input Validation in Jenkins Script Security Plugin
Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations.
[]
CVE-2007-3470
Multiple unspecified vulnerabilities in the KSSL kernel module in Sun Solaris 10, when configured with the KSSL proxy, allow remote attackers to cause a denial of service (kernel panic) via unspecified vectors related to "memory buffers" of Secure Socket Layer (SSL) records.
[ "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*" ]
CVE-1999-0028
root privileges via buffer overflow in login/scheme command on SGI IRIX systems.
[ "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*" ]
GHSA-m8fv-p543-wxqw
SQL injection vulnerability in loadorder.php in NKInFoWeb 2.5 and 5.2.2.0 allows remote attackers to execute arbitrary SQL commands via the id_sp parameter.
[]
GHSA-687j-vcxj-vhqv
The com_rss option (rss.php) in (1) Mambo and (2) Joomla! allows remote attackers to obtain sensitive information via an invalid feed parameter, which reveals the path in an error message.
[]
GHSA-rfp5-46jp-rcjc
A vulnerability was found in Linksys WRT54GL 4.30.18 and classified as problematic. Affected by this issue is some unknown functionality of the file /SysInfo.htm of the component Web Management Interface. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-253328. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-74w7-cr4v-wf2v
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction.
[]
CVE-2018-0218
A vulnerability in the web-based user interface of the Cisco Secure Access Control Server prior to 5.8 patch 9 could allow an unauthenticated, remote attacker to gain read access to certain information in the affected system. The vulnerability is due to improper handling of XML External Entities (XXEs) when parsing an XML file. An attacker could exploit this vulnerability by convincing the administrator of an affected system to import a crafted XML file. Cisco Bug IDs: CSCve70616.
[ "cpe:2.3:a:cisco:secure_access_control_server_solution_engine:5.8\\(0.8\\):*:*:*:*:*:*:*" ]
GHSA-7gc4-r5jr-9hxv
Gin-vue-admin subject to Remote Code Execution via file upload vulnerability
ImpactGin-vue-admin < 2.5.4 has File upload vulnerabilities。 File upload vulnerabilities are when a web server allows users to upload files to its filesystem without sufficiently validating things like their name, type, contents, or size. Failing to properly enforce restrictions on these could mean that even a basic image upload function can be used to upload arbitrary and potentially dangerous files instead. This could even include server-side script files that enable remote code execution.Patcheshttps://github.com/flipped-aurora/gin-vue-admin/pull/1264Workaroundshttps://github.com/flipped-aurora/gin-vue-admin/pull/1264References#1263For more informationThe plugin installation function of Gin-Vue-Admin allows users to download zip packages from the plugin market and upload them for installation. This function has an arbitrary file upload vulnerability. A malicious attacker can upload a constructed zip package to traverse the directory and upload or overwrite arbitrary files on the server side.The affected code https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/service/system/sys_auto_code.go line 880 called the `utils.Unzip` methodThe https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/utils/zip.go code defines the `utils.Unzip` methodIt can be analyzed that after uploading a zip compressed file, the `Unzip` method will be called to decompress the compressed file, and then judge whether the compressed file contains the fixed directory structure of server, web, and plugin.Whether the zip file is correct or not, it will be decompressed first. If the directory does not exist, it will be created automatically. Therefore, malicious zip packages can be constructed, and directory traversal can be performed during automatic decompression to upload or overwrite any file.Use the Zip Slip vulnerability to construct a malicious zip package with `../../../../` filenames, and upload the malicious zip package to trigger the vulnerability.![1](https://user-images.githubusercontent.com/113822259/197387942-e40c188d-cff0-4da3-84ba-7ca670d9bf72.png) ![2](https://user-images.githubusercontent.com/113822259/197387956-cef8fd0d-978a-47ae-a65e-e28367f6a0b8.png)
[]
CVE-2003-0013
The default .htaccess scripts for Bugzilla 2.14.x before 2.14.5, 2.16.x before 2.16.2, and 2.17.x before 2.17.3 do not include filenames for backup copies of the localconfig file that are made from editors such as vi and Emacs, which could allow remote attackers to obtain a database password by directly accessing the backup file.
[ "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*" ]
CVE-2009-4457
Multiple unspecified vulnerabilities in the Vsftpd Webmin module before 1.3b for the Vsftpd server have unknown impact and attack vectors related to "Some security issues."
[ "cpe:2.3:a:provider4u:vsftpd_webmin_module:*:*:*:*:*:*:*:*", "cpe:2.3:a:provider4u:vsftpd_webmin_module:1.2a:*:*:*:*:*:*:*" ]
GHSA-hf64-x4gq-p99h
Pillow Out-of-bounds Read
In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.
[]
GHSA-g7xc-4c2r-qj7r
Cross-site scripting vulnerability in Intel Security McAfee Endpoint Security (ENS) Web Control before 10.2.0.408.10 allows attackers to inject arbitrary web script or HTML via a crafted web site.
[]
CVE-2019-14940
In Storage Performance Development Kit (SPDK) before 19.07, a user of a vhost can cause a crash if the target is sent invalid input.
[ "cpe:2.3:a:spdk:storage_performance_development_kit:*:*:*:*:*:*:*:*" ]
CVE-2006-0272
Unspecified vulnerability in the XML Database component of Oracle Database server 9.2.0.7 and 10.1.0.4 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB29. NOTE: based on mutual credits by the relevant sources, it is highly likely that this issue is a buffer overflow in the (a) DBMS_XMLSCHEMA and (b) DBMS_XMLSCHEMA_INT packages, as exploitable via long arguments to (1) XDB.DBMS_XMLSCHEMA.GENERATESCHEMA or (2) XDB.DBMS_XMLSCHEMA.GENERATESCHEMAS.
[ "cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:personal_10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:oracle9i:standard_9.2.0.7:*:*:*:*:*:*:*" ]
GHSA-gr3q-2hph-p758
XnView Classic 2.48 has a User Mode Write AV starting at xnview+0x000000000032e808.
[]
CVE-2023-2375
Ubiquiti EdgeRouter X Web Management Interface command injection
A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. This issue affects some unknown processing of the component Web Management Interface. The manipulation of the argument src leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227651.
[ "cpe:2.3:o:ui:er-x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x_firmware:2.0.9:-:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix2:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix3:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix4:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix5:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix6:*:*:*:*:*:*", "cpe:2.3:h:ui:er-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x-sfp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:-:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix2:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix3:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix4:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix5:*:*:*:*:*:*", "cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix6:*:*:*:*:*:*", "cpe:2.3:h:ui:er-x-sfp:-:*:*:*:*:*:*:*" ]
GHSA-mxr5-j46q-jg86
xterm, including 192-7.el4 in Red Hat Enterprise Linux and 208-3.1 in Debian GNU/Linux, sets the wrong group ownership of tty devices, which allows local users to write data to other users' terminals.
[]
GHSA-7crv-7m84-5mjv
Directory traversal vulnerability in language.php in phpAlbum 0.4.1 Beta 6 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to include and execute arbitrary local files or obtain sensitive information via a .. (dot dot) in the pa_lang[include_file] parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php.
[]
GHSA-8585-x3v3-r54f
The default configuration of Serv-U 2.5d and earlier allows remote attackers to determine the real pathname of the server by requesting a URL for a directory or file that does not exist.
[]
CVE-2024-27254
IBM Db2 for Linux, UNIX and Windows denial of service
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 federated server is vulnerable to denial of service with a specially crafted query under certain conditions. IBM X-Force ID: 283813.
[]
GHSA-27p6-p8xf-5cxf
Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N).
[]
GHSA-hjpm-vq95-vrqg
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in weDevs ReCaptcha Integration for WordPress allows Stored XSS.This issue affects ReCaptcha Integration for WordPress: from n/a through 1.2.5.
[]
GHSA-vqh2-672q-h5xp
An exploitable code execution vulnerability exists in the rendering functionality of Nitro Pro 13.13.2.242 and 13.16.2.300. When drawing the contents of a page and selecting the stroke color from an 'ICCBased' colorspace, the application will read a length from the file and use it as a loop sentinel when writing data into the member of an object. Due to the object member being a buffer of a static size allocated on the heap, this can result in a heap-based buffer overflow. A specially crafted document must be loaded by a victim in order to trigger this vulnerability.
[]
CVE-2012-1479
Unspecified vulnerability in the AContact (com.movester.quickcontact) application 1.8.2 for Android has unknown impact and attack vectors.
[ "cpe:2.3:a:movesti:acontact:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
GHSA-6x63-wxj7-22mm
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stack-based Buffer Overflow vulnerability, which can be triggered by authenticated users via a crafted POST request.
[]
CVE-2022-39890
Improper Authorization in Samsung Billing prior to version 5.0.56.0 allows attacker to get sensitive information.
[ "cpe:2.3:a:samsung:billing:*:*:*:*:*:*:*:*" ]
GHSA-jx3h-pqmp-6jqh
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/import-html.php by adding a question mark (?) followed by the payload.
[]
GHSA-qfcg-vg7r-j9m5
The Easy Video Downloader (aka com.simon.padillar.EasyVideo) application 4.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-c3q2-mqcc-5vxq
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Login Watchdog allows Stored XSS. This issue affects Login Watchdog: from n/a through 1.0.4.
[]
GHSA-f3p3-3pq5-xp8x
Product Name and Product Code in the 'Add Product' section of Sourcecodester Product Inventory with Export to Excel 1.0 are vulnerable to XSS attacks.
[]
CVE-2025-31199
A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.4 and iPadOS 18.4, visionOS 2.4, macOS Sequoia 15.4. An app may be able to access sensitive user data.
[]
GHSA-mgh8-h8qf-wr9q
A denial of service vulnerability in Tremolo/dpen.s in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31647370.
[]
CVE-2020-7730
Command Injection
The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param.
[ "cpe:2.3:a:bestzip_project:bestzip:*:*:*:*:*:node.js:*:*" ]
CVE-2019-8004
Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2016-7429
NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.
[ "cpe:2.3:a:ntp:ntp:*:p8:*:*:*:*:*:*" ]