id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2024-6157 | An attacker who successfully exploited these vulnerabilities could cause the robot to stop.
A vulnerability exists in the PROFINET stack included in the RobotWare versions listed below.
This vulnerability arises under specific condition when specially crafted message is processed by the system.
Below are reported vulnerabilities in the Robot Ware versions.
* IRC5- RobotWare 6 < 6.15.06 except 6.10.10, and 6.13.07 | [] |
|
CVE-2014-9995 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile SD 400 and SD 800, in drmprov_cmd_verify_key(), the variable feature_name_length is not validated. There is a check for feature_name_len + filePathLen but there might be an integer wrap when checking feature_name_len + filePathLen. This leads to a buffer overflow. | [
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-3059 | Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3053, CVE-2015-3054, CVE-2015-3055, and CVE-2015-3075. | [
"cpe:2.3:a:adobe:acrobat:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.10:*:*:*:*:*:*:*"
] |
|
GHSA-wpj5-cw66-j932 | A vulnerability in the Self Care Portal of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to modify data on an affected system without proper authorization. The vulnerability is due to insufficient validation of user-supplied data to the Self Care Portal. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to modify information without proper authorization. | [] |
|
GHSA-pgmp-4x88-8f6r | Under certain circumstances the web interface will accept characters unrelated to the expected input. | [] |
|
CVE-2021-24756 | WP System Log < 1.0.21 - Unauthenticated Stored Cross-Site Scripting | The WP System Log WordPress plugin before 1.0.21 does not sanitise, validate and escape the IP address retrieved from login requests before outputting them in the admin dashboard, which could allow unauthenticated attacker to perform Cross-Site Scripting attacks against admins viewing the logs. | [
"cpe:2.3:a:wp_system_log_project:wp_system_log:*:*:*:*:*:wordpress:*:*"
] |
GHSA-f593-4hhx-9hc7 | IBM AppScan Enterprise Edition 9.0 contains an unspecified vulnerability that could allow an attacker to hijack a valid user's session. IBM X-Force ID: 120257 | [] |
|
CVE-2016-2928 | IBM BigFix Remote Control before 9.1.3 allows remote authenticated users to obtain sensitive information by reading error logs. | [
"cpe:2.3:a:ibm:bigfix_remote_control:*:*:*:*:*:*:*:*"
] |
|
CVE-2002-0232 | Directory traversal vulnerability in Multi Router Traffic Grapher (MRTG) allows remote attackers to read portions of arbitrary files via a .. (dot dot) in the cfg parameter for (1) 14all.cgi, (2) 14all-1.1.cgi, (3) traffic.cgi, or (4) mrtg.cgi. | [
"cpe:2.3:a:mrtg:multi_router_traffic_grapher_cgi:2.9.17:*:unix:*:*:*:*:*",
"cpe:2.3:a:mrtg:multi_router_traffic_grapher_cgi:2.9.17:*:win32:*:*:*:*:*"
] |
|
GHSA-r3vm-mg6f-r634 | This issue was addressed with improved entitlements. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4. An app may be able to access user-sensitive data | [] |
|
GHSA-5wpf-wxvf-787w | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pierre Lebedel Kodex Posts likes allows Reflected XSS.This issue affects Kodex Posts likes: from n/a through 2.5.0. | [] |
|
CVE-2016-4295 | When opening a Hangul Hcell Document (.cell) and processing a particular record within the Workbook stream, an index miscalculation leading to a heap overlow can be made to occur in Hancom Office 2014. The vulnerability occurs when processing data for a formula used to render a chart via the HncChartPlugin.hplg library. Due to a lack of bounds-checking when incrementing an index that is used for writing into a buffer for formulae, the application can be made to write pointer data outside its bounds which can lead to code execution under the context of the application. | [
"cpe:2.3:a:hancom:hancom_office_2014:*:*:*:*:*:*:*:*"
] |
|
GHSA-2q4f-xv44-vmqf | Aria Operations for Networks contains a cross site scripting vulnerability. A malicious actor with admin privileges may be able to inject malicious code into user profile configurations due to improper input sanitization. | [] |
|
CVE-2006-1447 | LaunchServices in Apple Mac OS X 10.4.6 allows remote attackers to cause Safari to launch unsafe content via long file name extensions, which prevents Download Validation from determining which application will be used to open the file. | [
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*"
] |
|
CVE-2022-31215 | In certain Goverlan products, the Windows Firewall is temporarily turned off upon a Goverlan agent update operation. This allows remote attackers to bypass firewall blocking rules for a time period of up to 30 seconds. This affects Goverlan Reach Console before 10.5.1, Reach Server before 3.70.1, and Reach Client Agents before 10.1.11. | [
"cpe:2.3:a:goverlan:client_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:a:goverlan:reach_console:*:*:*:*:*:*:*:*",
"cpe:2.3:a:goverlan:reach_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-11506 | In GraphicsMagick from version 1.3.30 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WriteMATLABImage of coders/mat.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to ExportRedQuantumType in magick/export.c. | [
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.3.31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] |
|
GHSA-w8mg-rr96-52qj | SOPlanning 1.45 has SQL injection via the user_list.php "by" parameter. | [] |
|
GHSA-v8cv-hrxr-vq25 | Cross-site scripting (XSS) vulnerability in news.php in Dimofinf CMS Version 3.0.0 allows remote attackers to inject arbitrary web script or HTML via the id parameter. | [] |
|
CVE-2021-33439 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is Integer overflow in gc_compact_strings() in mjs.c. | [
"cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*"
] |
|
GHSA-c4hf-853m-qmw7 | Websites managed by MegaBIP in versions below 5.15 are vulnerable to Cross-Site Request Forgery (CSRF) as the form available under "/edytor/index.php?id=7,7,0" lacks protection mechanisms.
A user could be tricked into visiting a malicious website, which would send POST request to this endpoint. If the victim is a logged in administrator, this could lead to creation of new accounts and granting of administrative permissions. | [] |
|
CVE-2023-48051 | An issue in /upydev/keygen.py in upydev v0.4.3 allows attackers to decrypt sensitive information via weak encryption padding. | [
"cpe:2.3:a:carglglz:upydev:0.4.3:*:*:*:*:*:*:*"
] |
|
CVE-2020-29282 | SQL injection vulnerability in BloodX 1.0 allows attackers to bypass authentication. | [
"cpe:2.3:a:bloodx_project:bloodx:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2014-8657 | The Compal Broadband Networks (CBN) CH6640E and CG6640E Wireless Gateway 1.0 with firmware CH6640-3.5.11.7-NOSH allows remote attackers to cause a denial of service (disconnect all wifi clients) via a request to wirelessChannelStatus.html. | [
"cpe:2.3:a:compal_broadband_networks:firmware:ch6640-3.5.11.7-nosh:*:*:*:*:*:*:*",
"cpe:2.3:h:compal_broadband_networks:cg6640e_wireless_gateway:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:compal_broadband_networks:ch664oe_wireless_gateway:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2010-2453 | Multiple cross-site scripting (XSS) vulnerabilities in Synology Disk Station 2.x before DSM3.0-1337 allow remote attackers to inject arbitrary web script or HTML by connecting to the FTP server and providing a crafted (1) USER or (2) PASS command, which is written by the FTP logging module to a web-interface log window, related to a "web commands injection" issue. | [
"cpe:2.3:o:synology:dsm:2.2-0942:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:dsm:2.2-1041:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:dsm:2.2-1042:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:dsm:2.2-1045:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:dsm:2.3-1139:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:dsm:2.3-1141:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:dsm:2.3-1144:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:dsm:2.3-1157:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:dsm:2.3-1161:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:dsm:3.0-1334:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds1010\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds109:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds110\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds110j:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds209:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds210\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds210j:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds409slim:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds410:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds410j:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds411\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:disk_station_ds710\\+:*:*:*:*:*:*:*:*"
] |
|
GHSA-6cc9-hqx2-m8hv | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
|
GHSA-cwpp-fm2p-xq67 | Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: NTPD). The supported version that is affected is 11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data. CVSS 3.0 Base Score 3.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). | [] |
|
CVE-2024-40780 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-8920 | The _ar_read_header function in archive_read_support_format_ar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds stack read) via a crafted ar file. | [
"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*"
] |
|
GHSA-cp6h-5pcm-v6v4 | Windows Desktop Bridge Elevation of Privilege Vulnerability | [] |
|
GHSA-v3g7-jggh-wjhg | REST API in Atlassian Jira Server and Jira Data Center before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1 allows remote attackers to enumerate usernames via a Sensitive Data Exposure vulnerability in the `/rest/api/latest/user/avatar/temporary` endpoint. | [] |
|
GHSA-fmm9-3gv8-58f4 | Improper Handling of Missing Values in kaml | ImpactAttackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service.This only affects applications that use polymorphic serialization with the default tagged polymorphism style. Applications using the property polymorphism style are not affected.YAML input for a polymorphic type that provided a tag but no value for the object would trigger the issue, for example:The following is a sample application that demonstrates this issue:On vulnerable versions of kaml, the `decodeFromString()` operation hangs and never returns.PatchesVersion 0.35.3 or later contain the fix for this issue. | [] |
CVE-2024-54300 | WordPress AutoWP plugin <= 2.0.8 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Neuralabz LTD. AutoWP allows Cross Site Request Forgery.This issue affects AutoWP: from n/a through 2.0.8. | [] |
GHSA-wr85-9p6m-8wj8 | The Zygote process in Android 4.0.3 and earlier accepts fork requests from processes with arbitrary UIDs, which allows remote attackers to cause a denial of service (reboot loop) via a crafted application. | [] |
|
CVE-2020-4151 | IBM QRadar SIEM 7.3.0 through 7.3.3 could allow an authenticated attacker to perform unauthorized actions due to improper input validation. IBM X-Force ID: 174201. | [
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-11349 | dataTaker DT8x dEX 1.72.007 allows remote attackers to compose programs or schedules, for purposes such as sending e-mail messages or making outbound connections to FTP servers for uploading data. | [
"cpe:2.3:o:datataker:dt8x_firmware:1.72.007:*:*:*:*:*:*:*",
"cpe:2.3:h:datataker:dt8x:-:*:*:*:*:*:*:*"
] |
|
GHSA-779c-7w4p-2c4g | Silverstripe admin XSS Vulnerability via WYSIWYG editor | It is possible for a bad actor with access to the CMS to make use of onmouseover or onmouseout attributes in the WYSIWYG editor to embed malicious javascript. | [] |
GHSA-762h-vpvw-3rcx | Overflow in `FusedResizeAndPadConv2D` | ImpactWhen [`tf.raw_ops.FusedResizeAndPadConv2D`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/conv_ops_fused_image_transform.cc) is given a large tensor shape, it overflows.PatchesWe have patched the issue in GitHub commit [d66e1d568275e6a2947de97dca7a102a211e01ce](https://github.com/tensorflow/tensorflow/commit/d66e1d568275e6a2947de97dca7a102a211e01ce).The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Neophytos Christou from the Secure Systems Lab (SSL) at Brown University. | [] |
GHSA-hjf8-42pm-336r | Soldner Secret Wars 30830 and earlier does not properly handle the "message too long" socket error, which allows remote attackers to cause a denial of service (socket termination) via a long UDP packet. | [] |
|
GHSA-rvgc-93hr-656r | Cross-Site Request Forgery (CSRF) vulnerability in dilemma123 Recent Posts Slider Responsive allows Stored XSS. This issue affects Recent Posts Slider Responsive: from n/a through 1.0.1. | [] |
|
CVE-2024-24451 | A stack overflow in the sctp_server::sctp_receiver_thread component of OpenAirInterface CN5G AMF (oai-cn5g-amf) up to v2.0.0 allows attackers to cause a Denial of Service (DoS) by repeatedly establishing SCTP connections with the N2 interface. | [] |
|
CVE-2020-10384 | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.6.1. There is a local privilege escalation from the www-data account to the root account. | [
"cpe:2.3:a:mbconnectline:mbconnect24:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mbconnectline:mymbconnect24:*:*:*:*:*:*:*:*"
] |
|
GHSA-29vf-q3vj-x378 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SKT Themes SKT Addons for Elementor allows Stored XSS.This issue affects SKT Addons for Elementor: from n/a through 1.8. | [] |
|
GHSA-wjfm-qxg2-q679 | Certain Liferay products are vulnerable to Cross Site Scripting (XSS) via the Commerce module. This affects Liferay Portal 7.3.5 through 7.4.2 and Liferay DXP 7.3 before update 8. | [] |
|
CVE-2019-12665 | Cisco IOS and IOS XE Software HTTP Client Information Disclosure Vulnerability | A vulnerability in the HTTP client feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to read and modify data that should normally have been sent via an encrypted channel. The vulnerability is due to TCP port information not being considered when matching new requests to existing, persistent HTTP connections. An attacker could exploit this vulnerability by acting as a man-in-the-middle and then reading and/or modifying data that should normally have been sent through an encrypted channel. | [
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:fd-1.5.0:*:*:*:*:*:*:*"
] |
GHSA-4x5v-8mq8-g9hp | Unspecified vulnerability in the CLR stored procedure deployment from IBM Database Add-Ins for Visual Studio in the Visual Studio Net component in IBM DB2 9.1 before Fixpak 5 and 9.5 before Fixpak 2 allows remote authenticated users to execute arbitrary code via unknown vectors. | [] |
|
CVE-2019-5947 | Cross-site scripting vulnerability in Cybozu Garoon 4.6.0 to 4.10.1 allows remote authenticated attackers to inject arbitrary web script or HTML via the application 'Cabinet'. | [
"cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*"
] |
|
GHSA-jw2p-mf2f-vvwp | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] |
|
GHSA-mfm9-9c5w-7f5g | An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. One incorrect handshake could complete with different epoch numbers in the packets Client_Hello, Client_key_exchange, and Change_cipher_spec, which may cause denial of service. | [] |
|
GHSA-f27j-hjx9-2227 | Cross-site scripting (XSS) vulnerability in filemanager/login.php in the File Manager module in Softaculous Webuzo before 2.1.4 allows remote attackers to inject arbitrary web script or HTML via the user parameter. | [] |
|
CVE-2022-25646 | Cross-site Scripting (XSS) | All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells. | [
"cpe:2.3:a:x-data-spreadsheet_project:x-data-spreadsheet:*:*:*:*:*:node.js:*:*"
] |
GHSA-fc8w-q5c3-5m5f | Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM's "Old" HTTPS API. | [] |
|
GHSA-hr4f-jj4v-599v | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, and SD 835, possible buffer overflow if SIM card sends a response greater than 64KB of data for stream APDU command. | [] |
|
CVE-2019-8442 | The CachingResourceDownloadRewriteRule class in Jira before version 7.13.4, and from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check. | [
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-65r4-jffm-gv42 | A logic issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. An app may bypass Gatekeeper checks. | [] |
|
GHSA-c9jr-qq8v-2rvw | The CDsoft (aka com.wCDSOFT) application 0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-cmw3-49qh-hmrx | vulnerability in Uniform Server Zero, version 10.2.5, consisting of an XSS through the /us_extra/phpinfo.php page. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and partially take over their session details. | [] |
|
CVE-2017-1000054 | Rocket.Chat version 0.8.0 and newer is vulnerable to XSS in the markdown link parsing code for messages. | [
"cpe:2.3:a:rocketchat:rocket.chat:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.26.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.27.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.29.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.30.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.32.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.36.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.37.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.37.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.40.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.41.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.43.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.44.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.46.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.47.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.48.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.48.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.49.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.49.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.49.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.49.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.49.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.50.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.50.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.51.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.52.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.53.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.54.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.54.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.54.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.55.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.55.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.56.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.57.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.57.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.57.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.57.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.57.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.57.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketchat:rocket.chat:0.57.2:*:*:*:*:*:*:*"
] |
|
CVE-2013-5029 | phpMyAdmin 3.5.x and 4.0.x before 4.0.5 allows remote attackers to bypass the clickjacking protection mechanism via certain vectors related to Header.class.php. | [
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*"
] |
|
CVE-2013-5511 | The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815. | [
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.35\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.38\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2.34\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2.37\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:interim:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(4.11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1.4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.5\\(1.17\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7\\(1.3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1\\(1.7\\):*:*:*:*:*:*:*"
] |
|
GHSA-66jq-wfrj-9h9w | TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a remote code execution (RCE) vulnerability via the function oal_wan6_setIpAddr. | [] |
|
GHSA-whhx-pr5h-v8mc | Cross-Site Request Forgery (CSRF) vulnerability in David Garcia Domain Sharding allows Stored XSS.This issue affects Domain Sharding: from n/a through 1.2.1. | [] |
|
CVE-2019-15222 | An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] |
|
GHSA-q5gv-8p63-3qrr | Insertion of Sensitive Information into Log File vulnerability in Paid Memberships Pro Paid Memberships Pro – Payfast Gateway Add On.This issue affects Paid Memberships Pro – Payfast Gateway Add On: from n/a through 1.4.1. | [] |
|
GHSA-qwpw-w2v5-h4cw | Buffer overflow in CHttpServer::OnParseError in the ISAPI extension (Isapi.cpp) when built using Microsoft Foundation Class (MFC) static libraries in Visual C++ 5.0, and 6.0 before SP3, as used in multiple products including BadBlue, allows remote attackers to cause a denial of service (access violation and crash) and possibly execute arbitrary code via a long query string that causes a parsing error. | [] |
|
CVE-2023-38565 | A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.6.8, iOS 16.6 and iPadOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to gain root privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-6prm-2vx7-8xwr | An issue in Open Networking Foundations sdran-in-a-box v.1.4.3 and onos-a1t v.0.2.3 allows a remote attacker to cause a denial of service via the onos-a1t component of the sdran-in-a-box, specifically the DeleteWatcher function. | [] |
|
GHSA-w3mh-mch9-v4xr | Multiple cross-site scripting (XSS) vulnerabilities in poMMo Aardvark PR16.1 allow remote attackers to inject arbitrary web script or HTML via (1) the referer parameter to index.php, (2) the site_name parameter to admin/setup/config/general.php, (3) the group_name parameter to admin/subscribers/subscribers_groups.php, or (4) the field_name parameter to admin/setup/setup_fields.php. | [] |
|
GHSA-qq47-m3m9-4w5j | An issue was discovered in tp5cms through 2017-05-25. admin.php/system/set.html has XSS via the title parameter. | [] |
|
GHSA-59wr-x3f6-83f2 | Unspecified vulnerability in the Authentication component in Oracle Database 10.2.0.3 and 11.1.0.7 allows remote attackers to affect confidentiality via unknown vectors. | [] |
|
CVE-2012-3243 | Cross-site scripting (XSS) vulnerability in the SEOgento plugin for Magento allows remote attackers to inject arbitrary web script or HTML via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:seogento:seogento:*:*:*:*:*:magento:*:*"
] |
|
CVE-2020-15417 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. A crafted gui_region in a string table file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-9756. | [
"cpe:2.3:o:netgear:r6700_firmware:1.0.4.84_10.0.58:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-2229 | Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons, resulting in a stored cross-site scripting (XSS) vulnerability. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] |
|
CVE-2022-21992 | Windows Mobile Device Management Remote Code Execution Vulnerability | Windows Mobile Device Management Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
GHSA-r8qp-cm8p-5ph7 | Stack-based overflow vulnerability in the logMess function in Open TFTP Server SP 1.66 and earlier allows remote attackers to perform a denial of service or execute arbitrary code via a long TFTP error packet, a different vulnerability than CVE-2018-10387 and CVE-2019-12567. | [] |
|
CVE-2018-20664 | Zoho ManageEngine ADSelfService Plus 5.x before build 5701 has XXE via an uploaded product license. | [
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:4500:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5032:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5040:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5041:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5103:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5104:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5105:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5106:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5107:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5108:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5109:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5111:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5112:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5114:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5115:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5116:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5200:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5201:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5202:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5203:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5204:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5205:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5206:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5207:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5300:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5301:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5302:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5303:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5304:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5305:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5306:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5307:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5308:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5309:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5310:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5311:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5312:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5313:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5314:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5315:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5316:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5317:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5318:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5319:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5320:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5321:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5322:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5323:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5324:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5325:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5326:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5327:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5328:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5329:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5330:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5400:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5500:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5501:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5502:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5503:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5504:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5505:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5506:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5507:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5508:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5509:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5510:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5511:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5512:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5513:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5514:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5515:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5516:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5517:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5518:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5519:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5520:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5521:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5600:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5601:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5602:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5603:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5604:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5605:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5606:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5607:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5700:*:*:*:*:*:*"
] |
|
CVE-2004-0490 | cPanel, when compiling Apache 1.3.29 and PHP with the mod_phpsuexec option, does not set the --enable-discard-path option, which causes php to use the SCRIPT_FILENAME variable to find and execute a script instead of the PATH_TRANSLATED variable, which allows local users to execute arbitrary PHP code as other users via a URL that references the attacker's script after the user's script, which executes the attacker's script with the user's privileges, a different vulnerability than CVE-2004-0529. | [
"cpe:2.3:a:cpanel:cpanel:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:6.4.2_stable_48:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cpanel:cpanel:9.1.0_r85:*:*:*:*:*:*:*"
] |
|
GHSA-hv4j-7wh2-m4p5 | This vulnerability potentially allows unauthorized write operations which may lead to remote code execution. An attacker must already have authenticated admin access and knowledge of both an internal system identifier and details of another valid user to exploit this. | [] |
|
GHSA-wr32-2xg2-rpp3 | Cross-site scripting (XSS) vulnerability in Avolve Software ProjectDox 8.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2019-7585 | An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/PublicAction.class.php allows time-based SQL Injection via the param array parameter to the /index.php?m=public&a=checkemail URI. | [
"cpe:2.3:a:bijiadao:waimai_super_cms:20150505:*:*:*:*:*:*:*"
] |
|
CVE-2016-5305 | Multiple cross-site scripting (XSS) vulnerabilities in management scripts in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allow remote authenticated users to inject arbitrary web script or HTML via a "DOM link manipulation" attack. | [
"cpe:2.3:a:symantec:endpoint_protection_manager:*:mp4:*:*:*:*:*:*"
] |
|
CVE-2018-16958 | An issue was discovered in Oracle WebCenter Interaction Portal 10.3.3. The ASP.NET_SessionID primary session cookie, when Internet Information Services (IIS) with ASP.NET is used, is not protected with the HttpOnly attribute. The attribute cannot be enabled by customers. Consequently, this cookie is exposed to session hijacking attacks should an adversary be able to execute JavaScript in the origin of the portal installation. NOTE: this CVE is assigned by MITRE and isn't validated by Oracle because Oracle WebCenter Interaction Portal is out of support. | [
"cpe:2.3:a:oracle:webcenter_interaction:10.3.3:*:*:*:*:*:*:*"
] |
|
GHSA-3rm3-2566-pgwv | A denial of service exists in gitlab <v12.3.2, <v12.2.6, and <v12.1.10 that would let an attacker bypass input validation in markdown fields take down the affected page. | [] |
|
GHSA-3j25-jp3q-7f47 | IBM Tivoli Micromuse Netcool/NeuSecure 3.0.236 configures a MySQL database to allow connections from any source IP address with the ns database account, which allows remote attackers to bypass the Netcool/NeuSecure application layer and perform unauthorized database actions. NOTE: IBM has privately confirmed to CVE that a fix is available for these issues. | [] |
|
CVE-2025-4337 | AHAthat Plugin <= 1.6 - Cross-Site Request Forgery to AHA Page Deletion | The AHAthat Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6. This is due to missing or incorrect nonce validation on the aha_plugin_page() function. This makes it possible for unauthenticated attackers to delete AHA pages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
GHSA-9xg9-hh45-xcm6 | Apache InLong Manager Remote Code Execution vulnerability | Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.9.0, which could lead to Remote Code Execution. Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it.[1] https://github.com/apache/inlong/pull/9329 | [] |
CVE-2023-26341 | ZDI-CAN-19391: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*"
] |
GHSA-pxmh-q2jw-fgfx | Rhymix CMS 1.9.8.1 allows XSS via an index.php?module=admin&act=dispModuleAdminFileBox SVG upload. | [] |
|
GHSA-cqw7-466v-f9g6 | In JetBrains Ktor before 3.1.1 an HTTP Request Smuggling was possible | [] |
|
CVE-2024-37007 | Multiple ZDI Vulnerabilities in Autodesk AutoCAD and certain AutoCAD-based products | A maliciously crafted X_B and X_T file, when parsed in pskernel.DLL through Autodesk applications, can cause a use-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process. | [
"cpe:2.3:a:autodesk:autocad:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_advance_steel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_civil_3d:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:-:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:-:*:*:*:*:*:*:*"
] |
GHSA-vq5p-c45m-jmr5 | The Slideshow 365 (aka com.Slideshow) application 3.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-rcp3-mcch-7cjw | Cybereason EDR version 19.1.282 and above, 19.2.182 and above, 20.1.343 and above, and 20.2.X and above has a DLL hijacking vulnerability, which could allow a local attacker to execute code with elevated privileges. | [] |
|
CVE-2022-35908 | Cambium Enterprise Wi-Fi System Software before 6.4.2 does not sanitize the ping host argument in device-agent. | [
"cpe:2.3:a:cambiumnetworks:enterprise_wi-fi:*:*:*:*:*:*:*:*"
] |
|
GHSA-vfpr-487g-rfrf | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in giovanebribeiro WP PagSeguro Payments allows Stored XSS.This issue affects WP PagSeguro Payments: from n/a through 1.0. | [] |
|
GHSA-jwr7-992g-68mh | starcitizentools/citizen-skin allows stored XSS in preference menu heading messages | SummaryVarious preferences messages are inserted into raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM.DetailsThe `innerHtml` of the label div is set to the `textContent` of the label, essentially unsanitizing the system messages:
https://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/407052e7069bdeae927d6f1a2a1c9a45b473bf9a/resources/skins.citizen.preferences/addPortlet.polyfill.js#L18PoCEdit `citizen-feature-custom-font-size-name` (or any other message displayed in a heading in the preferences menu) to `<img src="" onerror="alert('citizen-feature-custom-font-size-name')">` (script tags don't work here due to the way the HTML is inserted)Open the preferences menu
 | [] |
GHSA-pcmh-49qc-2rx3 | This High severity Remote Code Execution (RCE) vulnerability was introduced in version 2.1.0 of Confluence Data Center and Server.Remote Code Execution (RCE) vulnerability, with a CVSS Score of 8.3 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H allows an unauthenticated attacker to remotely expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x releaseConfluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x releaseConfluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher releaseSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives). | [] |
|
CVE-2025-6126 | PHPGurukul Rail Pass Management System contact.php cross site scripting | A vulnerability was found in PHPGurukul Rail Pass Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /contact.php. The manipulation of the argument Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [] |
CVE-2003-0649 | Buffer overflow in xpcd-svga for xpcd 2.08 and earlier allows local users to execute arbitrary code via a long HOME environment variable. | [
"cpe:2.3:a:xpcd:xpcd:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-44809 | A remote code execution (RCE) vulnerability exists in the Pi Camera project, version 1.0, maintained by RECANTHA. The issue arises from improper sanitization of user input passed to the "position" GET parameter in the tilt.php script. An attacker can exploit this by sending crafted input data that includes malicious command sequences, allowing arbitrary commands to be executed on the server with the privileges of the web server user. This vulnerability is exploitable remotely and poses significant risk if the application is exposed to untrusted networks. | [
"cpe:2.3:a:recantha:pi_camera_project:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-52441 | WordPress Quick Learn plugin <= 1.0.1 - PHP Object Injection vulnerability | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability in Rajesh Thanoch Quick Learn allows Object Injection.This issue affects Quick Learn: from n/a through 1.0.1. | [
"cpe:2.3:a:rajesh_thanoch:quick_learn:*:*:*:*:*:*:*:*"
] |
CVE-2017-7400 | OpenStack Horizon 9.x through 9.1.1, 10.x through 10.0.2, and 11.0.0 allows remote authenticated administrators to conduct XSS attacks via a crafted federation mapping. | [
"cpe:2.3:a:openstack:horizon:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:9.0.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:9.0.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:9.0.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:9.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:9.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:10.0.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:10.0.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:10.0.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:10.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:10.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:10.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:horizon:11.0.0:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.