Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-cvpj-w72w-rchg
As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.
[]
CVE-2006-3267
SQL injection vulnerability in index.php in Infinite Core Technologies (ICT) 1.0 Gold and earlier allows remote attackers to execute arbitrary SQL commands via the post parameter.
[ "cpe:2.3:a:infinite_core_technologies:ict:*:*:*:*:*:*:*:*" ]
CVE-2024-0890
hongmaple octopus edit sql injection
A vulnerability was found in hongmaple octopus 1.0. It has been classified as critical. Affected is an unknown function of the file /system/dept/edit. The manipulation of the argument ancestors leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. VDB-252042 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:hongmaple:octopus:1.0:*:*:*:*:*:*:*" ]
CVE-2020-28594
A use-after-free vulnerability exists in the _3MF_Importer::_handle_end_model() functionality of Prusa Research PrusaSlicer 2.2.0 and Master (commit 4b040b856). A specially crafted 3MF file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
[ "cpe:2.3:a:prusa3d:prusaslicer:2.2.0:-:*:*:*:*:*:*" ]
GHSA-gh22-2pg6-7q63
Multiple SQL injection vulnerabilities in CARE 2002 before beta 1.0.02 allow remote attackers to perform unauthorized database operations.
[]
GHSA-2548-xwx6-3r34
A stack-based buffer overflow vulnerability exists in the LXT2 lxt2_rd_expand_integer_to_bits function of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.
[]
GHSA-24rf-wvhf-33v8
PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-20926.
[]
CVE-2012-4893
Multiple cross-site request forgery (CSRF) vulnerabilities in file/show.cgi in Webmin 1.590 and earlier allow remote attackers to hijack the authentication of privileged users for requests that (1) read files or execute (2) tar, (3) zip, or (4) gzip commands, a different issue than CVE-2012-2982.
[ "cpe:2.3:a:gentoo:webmin:*:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.140:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.150:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.160:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.170:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.180:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.200:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.210:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.220:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.230:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.240:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.260:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.270:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.280:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.290:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.300:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.310:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.320:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.330:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.340:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.370:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.380:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.390:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.400:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.410:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.420:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.430:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.440:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.450:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.470:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.480:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.500:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.510:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.520:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.530:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.550:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.560:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.570:*:*:*:*:*:*:*", "cpe:2.3:a:gentoo:webmin:1.580:*:*:*:*:*:*:*" ]
GHSA-g4qr-pvvg-9h2w
this vulnerability affect user that even not allowed to access via the web interface. First of all, the attacker needs to access the "Login menu - demo site" then he can see in this menu all the functionality of the application. If the attacker will try to click on one of the links, he will get an answer that he is not authorized because he needs to log in with credentials. after he performed log in to the system there are some functionalities that the specific user is not allowed to perform because he was configured with low privileges however all the attacker need to do in order to achieve his goals is to change the value of the prog step parameter from 0 to 1 or more and then the attacker could access to some of the functionality the web application that he couldn't perform it before the parameter changed.
[]
CVE-2024-49369
Icinga 2 has a TLS Certificate Validation Bypass for JSON-RPC and HTTP API Connections
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12.
[ "cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*" ]
GHSA-q9h7-27gp-hwp9
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zoho Flow Zoho Flow for WordPress allows SQL Injection.This issue affects Zoho Flow for WordPress: from n/a through 2.7.1.
[]
GHSA-jff3-mqp2-2qvx
FlightCrew v0.9.2 and older are vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in a ZIP archive entry that is mishandled during extraction.
[]
GHSA-hvxf-w5xq-9cvg
A vulnerability in the Two-Way Active Measurement Protocol (TWAMP) server feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. For Cisco IOS XR Software, this vulnerability could cause the ipsla_ippm_server&nbsp;process to reload unexpectedly if debugs are enabled.This vulnerability is due to out-of-bounds array access when processing specially crafted TWAMP control packets. An attacker could exploit this vulnerability by sending crafted TWAMP control packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: For Cisco IOS XR Software, only the ipsla_ippm_server process reloads unexpectedly and only when debugs are enabled. The vulnerability details for Cisco IOS XR Software are as follows:&nbsp;&nbsp;&nbsp;&nbsp;Security Impact Rating (SIR): Low&nbsp;&nbsp;&nbsp;&nbsp;CVSS Base Score: 3.7&nbsp;&nbsp;&nbsp;&nbsp;CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
[]
CVE-2022-25634
Qt through 5.15.8 and 6.x through 6.2.3 can load system library files from an unintended working directory.
[ "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*" ]
GHSA-2q4q-6wrc-q22h
An issue was discovered in savignano S/Notify before 2.0.1 for Bitbucket. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Bitbucket, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be.
[]
CVE-2024-26220
Windows Mobile Hotspot Information Disclosure Vulnerability
Windows Mobile Hotspot Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
CVE-2021-36484
SQL injection vulnerability in JIZHICMS 1.9.5 allows attackers to run arbitrary SQL commands via add or edit article page.
[ "cpe:2.3:a:jizhicms:jizhicms:1.9.5:*:*:*:*:*:*:*" ]
GHSA-h688-4pc2-376f
TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. This vulnerability allows remote attackers to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the hotplugd daemon. The issue results from firewall rule handling that allows an attacker access to resources that should be available to the LAN interface only. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the root user. Was ZDI-CAN-19664.
[]
GHSA-wjp9-c4cc-qcj5
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Group Replication Plugin). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via MySQL Procotol to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
CVE-2022-44535
A vulnerability in the Aruba EdgeConnect Enterprise Orchestrator web-based management interface allows remote low-privileged authenticated users to escalate their privileges to those of an administrative user. A successful exploit could allow an attacker to achieve administrative privilege on the web-management interface leading to complete system compromise in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.
[ "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:on-premises:*:*:*", "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:as-a-service:*:*:*", "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:global_enterprise_tenant_orchestrators:*:*:*", "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:sp:*:*:*" ]
GHSA-w683-cc8r-prr2
Cross-Site Request Forgery (CSRF) vulnerability in Gift Up Gift Up Gift Cards for WordPress and WooCommerce.This issue affects Gift Up Gift Cards for WordPress and WooCommerce: from n/a through 2.21.3.
[]
GHSA-8v8g-jpqq-2cx6
Cross-site scripting (XSS) vulnerability in the CQWeb server in IBM Rational ClearQuest 7.0.0 before 7.0.0.6 and 7.0.1 before 7.0.1.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
CVE-2023-30172
A directory traversal vulnerability in the /get-artifact API method of the mlflow platform up to v2.0.1 allows attackers to read arbitrary files on the server via the path parameter.
[ "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*" ]
GHSA-xq4f-f2vc-9hxr
The WebDorado Contact Form plugin before 1.13.5 for WordPress allows CSRF via the wp-admin/admin-ajax.php action parameter, with resultant local file inclusion via directory traversal, because there can be a discrepancy between the $_POST['action'] value and the $_GET['action'] value, and the latter is unsanitized.
[]
GHSA-fhc9-mwwq-6p67
Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2017-18639
Progress Sitefinity CMS before 10.1 allows XSS via /Pages Parameter : Page Title, /Content/News Parameter : News Title, /Content/List Parameter : List Title, /Content/Documents/LibraryDocuments/incident-request-attachments Parameter : Document Title, /Content/Images/LibraryImages/newsimages Parameter : Image Title, /Content/links Parameter : Link Title, /Content/links Parameter : Link Title, or /Content/Videos/LibraryVideos/default-video-library Parameter : Video Title.
[ "cpe:2.3:a:progress:sitefinity_cms:*:*:*:*:*:*:*:*" ]
CVE-2021-42547
reflected XSS in search functionality of WP Cloud Plugins - Out-of-the-Box
Insufficient Input Validation in the search functionality of Wordpress plugin Out-of-the-Box prior to 1.20.3 allows unauthenticated user to craft a reflected Cross-Site Scripting attack.
[ "cpe:2.3:a:wpcloudplugins:out-of-the-box:*:*:*:*:*:wordpress:*:*" ]
GHSA-82mv-g2x6-p4mx
In the Linux kernel, the following vulnerability has been resolved:iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_clientof_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when not need anymore. Add missing of_node_put() to avoid refcount leak.
[]
CVE-2021-38988
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212950.
[ "cpe:2.3:a:ibm:vios:*:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:7.2.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:7.2.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:7.3.0.0:*:*:*:*:*:*:*" ]
GHSA-mrq3-m48q-67j2
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
[]
CVE-2021-42235
SQL injection in osTicket before 1.14.8 and 1.15.4 login and password reset process allows attackers to access the osTicket administration profile functionality.
[ "cpe:2.3:a:enhancesoft:osticket:*:*:*:*:*:*:*:*" ]
GHSA-p2hm-hc2v-xwc6
Gee-netics, member of AXIS Camera Station Pro Bug Bounty Program, has found that it is possible for a non-admin user to remove system files causing a boot loop by redirecting a file deletion when recording video. Axis has released a patched version for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
[]
GHSA-7mr2-g8wf-jhrp
Cross-site scripting (XSS) vulnerability in the Quick Stats page (psilan.cgi) in ZTE ZXDSL 831 and 831CII allows remote attackers to inject arbitrary web script or HTML via the domainname parameter in a save action. NOTE: this issue was SPLIT from CVE-2014-9021 per ADT1 due to different affected products and codebases.
[]
GHSA-v4x2-xrc6-7q7j
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the PPW parameter in the fromWizardHandle function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
[]
GHSA-v5xw-43vp-r66x
"HCL Verse for Android was found to employ dynamic code loading. This mechanism allows a developer to specify which components of the application should not be loaded by default when the application is started. Typically, core components and additional dependencies are loaded natively at runtime; however, dynamically loaded components are only loaded as they are specifically requested. While this can have a positive impact on performance, or grant additional functionality (for example, a non-invasive update feature), it can also open the application to loading unintended code if not implemented properly."
[]
CVE-2024-38813
Privilege escalation vulnerability
The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.
[ "cpe:2.3:a:broadcom:vmware_center_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:broadcom:vmware_cloud_foundation:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update1e:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:8.0:update2d:*:*:*:*:*:*" ]
CVE-2020-14246
HCL OneTest Performance V9.5, V10.0, V10.1 uses basic authentication which is relatively weak. An attacker could potentially decode the encoded credentials.
[ "cpe:2.3:a:hcltechsw:onetest_performance:9.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltechsw:onetest_performance:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltechsw:onetest_performance:10.1.0:*:*:*:*:*:*:*" ]
GHSA-cghc-jhgh-fr89
The DrawBlog WordPress plugin through 0.90 does not sanitise or validate some of its settings before outputting them back in the page, leading to an authenticated stored Cross-Site Scripting issue
[]
CVE-2007-6534
Multiple unspecified vulnerabilities in Microsoft Office Publisher allow user-assisted remote attackers to cause a denial of service (application crash) via a crafted PUB file, possibly involving wordart.
[ "cpe:2.3:a:microsoft:publisher:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:publisher:2002:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:publisher:2002:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:publisher:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:publisher:2007:*:*:*:*:*:*:*" ]
CVE-2022-44151
Simple Inventory Management System v1.0 is vulnerable to SQL Injection via /ims/login.php.
[ "cpe:2.3:a:sanitization_management_system_project:sanitization_management_system:1.0:*:*:*:*:*:*:*" ]
CVE-2017-18472
cPanel before 62.0.4 allows reflected XSS in reset-password interfaces (SEC-198).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
CVE-2019-8809
A validation issue was addressed with improved logic. This issue is fixed in macOS Catalina 10.15, iOS 13.1 and iPadOS 13.1, tvOS 13, watchOS 6, iOS 13. A local app may be able to read a persistent account identifier.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
GHSA-m4wf-cgh7-9gv4
Cross-site scripting (XSS) vulnerability in parser.php in phpCMS 1.2.1 and earlier, with non-stealth and debug modes enabled, allows remote attackers to inject arbitrary web script or HTML via the file parameter.
[]
GHSA-wcmh-ghjh-4j2h
nGrinder before 3.5.9 allows an attacker to obtain the results of webhook requests due to lack of access control, which could be the cause of information disclosure and limited Server-Side Request Forgery.
[]
CVE-2022-24888
Possible Injection in Nextcloud Server
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1, it is possible to create files and folders that have leading and trailing \n, \r, \t, and \v characters. The server rejects files and folders that have these characters in the middle of their names, so this might be an opportunity for injection. This issue is fixed in versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1. There are currently no known workarounds.
[ "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*" ]
CVE-2020-16970
Azure Sphere Unsigned Code Execution Vulnerability
Azure Sphere Unsigned Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:azure_sphere:*:*:*:*:*:*:*:*" ]
CVE-2023-1565
FeiFeiCMS Extension Tool slide_add.html cross site scripting
A vulnerability was found in FeiFeiCMS 2.7.130201. It has been classified as problematic. This affects an unknown part of the file \Public\system\slide_add.html of the component Extension Tool. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223557 was assigned to this vulnerability.
[ "cpe:2.3:a:feifeicms:feifeicms:2.7.130201:*:*:*:*:*:*:*" ]
GHSA-hh6q-wqw3-85g6
u'QSEE reads the access permission policy for the SMEM TOC partition from the SMEM TOC contents populated by XBL Loader and applies them without validation' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, APQ8098, Bitra, IPQ6018, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8998, Nicobar, QCA6390, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
[]
CVE-2025-33061
Windows Storage Management Provider Information Disclosure Vulnerability
Out-of-bounds read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.
[]
GHSA-wp36-xg52-2w32
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality via unknown vectors related to JavaFX.
[]
CVE-2021-22312
There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500.
[ "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r005c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r005c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r005c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc200:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg6000e_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg6000e:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6000e_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6000e:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips6000e_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ips6000e:-:*:*:*:*:*:*:*" ]
GHSA-4mgh-wqj7-785j
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0613, CVE-2020-0614, CVE-2020-0623, CVE-2020-0625, CVE-2020-0626, CVE-2020-0628, CVE-2020-0629, CVE-2020-0630, CVE-2020-0631, CVE-2020-0632, CVE-2020-0633.
[]
CVE-2021-37555
TX9 Automatic Food Dispenser v3.2.57 devices allow access to a shell as root/superuser, a related issue to CVE-2019-16734. To connect, the telnet service is used on port 23 with the default password of 059AnkJ for the root account. The user can then download the filesystem through preinstalled BusyBox utilities (e.g., tar and nc).
[ "cpe:2.3:o:trixie:tx9_automatic_food_dispenser_firmware:3.2.57:*:*:*:*:*:*:*", "cpe:2.3:h:trixie:tx9_automatic_food_dispenser:-:*:*:*:*:*:*:*" ]
CVE-2019-8526
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Mojave 10.14.4. An application may be able to gain elevated privileges.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
GHSA-48m6-wm5p-rr6h
Insufficient covariance check makes self_cell unsound
All public versions prior to `1.02` used an insufficient check to ensure that users correctly marked the dependent type as either `covariant` or `not_covariant`. This allowed users to mark a dependent as covariant even though its type was not covariant but invariant, for certain invariant types involving trait object lifetimes. One example for such a dependent type is `type Dependent<'a> = RefCell<Box<dyn fmt::Display + 'a>>`. Such a type allowed unsound usage in purely safe user code that leads to undefined behavior. The patched versions now produce a compile time error if such a type is marked as `covariant`.
[]
GHSA-2rmc-v2mp-gxq4
In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-196970023
[]
CVE-2020-15057
TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to denial-of-service the device via long input values.
[ "cpe:2.3:o:tp-link:tl-ps310u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-ps310u:-:*:*:*:*:*:*:*" ]
GHSA-2xc7-724c-r36j
An issue was discovered in the HDF HDF5 1.8.20 library. There is a heap-based buffer over-read in the function H5T_copy in H5T.c.
[]
GHSA-g3h4-8xjh-jmhw
Directory traversal vulnerability in sources/_template_parser.php in Moa Gallery 1.2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the p_filename parameter, a different issue than CVE-2009-4614.
[]
CVE-2014-0504
Adobe Flash Player before 11.7.700.272 and 11.8.x through 12.0.x before 12.0.0.77 on Windows and OS X, and before 11.2.202.346 on Linux, allows attackers to read the clipboard via unspecified vectors.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2025-30789
WordPress Clearout Email Validator <= 3.2.0 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in clearoutio Clearout Email Validator allows Stored XSS. This issue affects Clearout Email Validator: from n/a through 3.2.0.
[]
CVE-2014-1701
The GenerateFunction function in bindings/scripts/code_generator_v8.pm in Blink, as used in Google Chrome before 33.0.1750.149, does not implement a certain cross-origin restriction for the EventTarget::dispatchEvent function, which allows remote attackers to conduct Universal XSS (UXSS) attacks via vectors involving events.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.69:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.71:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.83:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.104:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.106:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.107:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.108:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.109:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.110:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.111:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.112:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.113:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.115:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.116:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.117:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.124:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.125:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.126:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.132:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.133:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.135:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.136:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:33.0.1750.144:*:*:*:*:*:*:*" ]
CVE-2020-2906
Vulnerability in the PeopleSoft Enterprise SCM Purchasing product of Oracle PeopleSoft (component: Supplier Change). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM Purchasing. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise SCM Purchasing accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_scm_purchasing:9.2:*:*:*:*:*:*:*" ]
GHSA-p94v-4vwh-qwpf
Moodle 2.3.x before 2.3.3 allows remote authenticated users to bypass the moodle/role:manage capability requirement and read all capability data by visiting the Check Permissions page.
[]
GHSA-fr2c-q2cq-5frw
Unspecified vulnerability in the GO Bookmark Widget (com.gau.go.launcherex.gowidget.bookmark) application 1.1 for Android has unknown impact and attack vectors.
[]
CVE-2015-1685
Microsoft Internet Explorer 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass."
[ "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
GHSA-j438-r4pg-w4g3
Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to obfuscate main origin data via a crafted HTML page. (Chromium security severity: Medium)
[]
GHSA-xxmp-4c36-6f47
Unspecified vulnerability in the Webservice Axis Gateway in IBM Rational Focal Point 6.4 before devfix1, 6.4.1.3 before devfix1, 6.5.1 before devfix1, 6.5.2 before devfix4, 6.5.2.3 before devfix9, 6.6 before devfix5, 6.6.0.1 before devfix2, and 6.6.1 allows remote attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2013-5398.
[]
CVE-2024-41050
cachefiles: cyclic allocation of msg_id to avoid reuse
In the Linux kernel, the following vulnerability has been resolved: cachefiles: cyclic allocation of msg_id to avoid reuse Reusing the msg_id after a maliciously completed reopen request may cause a read request to remain unprocessed and result in a hung, as shown below: t1 | t2 | t3 ------------------------------------------------- cachefiles_ondemand_select_req cachefiles_ondemand_object_is_close(A) cachefiles_ondemand_set_object_reopening(A) queue_work(fscache_object_wq, &info->work) ondemand_object_worker cachefiles_ondemand_init_object(A) cachefiles_ondemand_send_req(OPEN) // get msg_id 6 wait_for_completion(&req_A->done) cachefiles_ondemand_daemon_read // read msg_id 6 req_A cachefiles_ondemand_get_fd copy_to_user // Malicious completion msg_id 6 copen 6,-1 cachefiles_ondemand_copen complete(&req_A->done) // will not set the object to close // because ondemand_id && fd is valid. // ondemand_object_worker() is done // but the object is still reopening. // new open req_B cachefiles_ondemand_init_object(B) cachefiles_ondemand_send_req(OPEN) // reuse msg_id 6 process_open_req copen 6,A.size // The expected failed copen was executed successfully Expect copen to fail, and when it does, it closes fd, which sets the object to close, and then close triggers reopen again. However, due to msg_id reuse resulting in a successful copen, the anonymous fd is not closed until the daemon exits. Therefore read requests waiting for reopen to complete may trigger hung task. To avoid this issue, allocate the msg_id cyclically to avoid reusing the msg_id for a very short duration of time.
[]
CVE-2019-16732
Unencrypted HTTP communications for firmware upgrades in Petalk AI and PF-103 allow man-in-the-middle attackers to run arbitrary code as the root user.
[ "cpe:2.3:o:skymee:petalk_ai_firmware:3.2.2.30:*:*:*:*:*:*:*", "cpe:2.3:h:skymee:petalk_ai:-:*:*:*:*:*:*:*", "cpe:2.3:o:petwant:pf-103_firmware:4.22.2.42:*:*:*:*:*:*:*", "cpe:2.3:h:petwant:pf-103:-:*:*:*:*:*:*:*" ]
CVE-2023-31587
Tenda AC5 router V15.03.06.28 was discovered to contain a remote code execution (RCE) vulnerability via the Mac parameter at ip/goform/WriteFacMac.
[ "cpe:2.3:o:tenda:ac5_firmware:15.03.06.28:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ac5:-:*:*:*:*:*:*:*" ]
CVE-2021-31976
Server for NFS Information Disclosure Vulnerability
Server for NFS Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1621:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1052:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20044:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20044:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20045:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20045:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20044:*:*:*:*:*:x64:*" ]
CVE-2021-35589
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Device drivers). The supported version that is affected is 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 6.0 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).
[ "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*" ]
CVE-2019-10368
A cross-site request forgery vulnerability in Jenkins JClouds Plugin 2.14 and earlier in BlobStoreProfile.DescriptorImpl#doTestConnection and JCloudsCloud.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:jclouds:*:*:*:*:*:jenkins:*:*" ]
GHSA-4fcw-jxm7-6pjg
Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine ServiceDesk Plus 8.1 allow remote attackers to inject arbitrary web script or HTML via an e-mail message body with (1) a SCRIPT element, (2) a crafted Cascading Style Sheets (CSS) expression property, (3) a CSS expression property in the STYLE attribute of an arbitrary element, or (4) a crafted SRC attribute of an IFRAME element, or an e-mail message subject with (5) a SCRIPT element, (6) a CSS expression property in the STYLE attribute of an arbitrary element, (7) a crafted SRC attribute of an IFRAME element, (8) a crafted CONTENT attribute of an HTTP-EQUIV="refresh" META element, or (9) a data: URL in the CONTENT attribute of an HTTP-EQUIV="refresh" META element.
[]
CVE-2022-32749
Apache Traffic Server: Improperly handled requests can cause crashes in specific plugins
Improper Check for Unusual or Exceptional Conditions vulnerability handling requests in Apache Traffic Server allows an attacker to crash the server under certain conditions. This issue affects Apache Traffic Server: from 8.0.0 through 9.1.3.
[ "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*" ]
GHSA-pg56-q33g-2q76
An Out-of-bounds Read vulnerability exists in Open Design Alliance ODA Viewer before 2022.8. Crafted data in a DWF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process
[]
GHSA-399f-937r-fwr9
Adobe Media Encoder versions 22.0, 15.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious 3GP ?file
[]
GHSA-x3r9-qf42-4572
ESPCMS P8 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the fetch_filename function at \espcms_public\espcms_templates\ESPCMS_Templates.
[]
GHSA-5wgr-gvxp-f9m4
A vulnerability has been found in SourceCodester Clinics Patient Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /medicines.php. The manipulation of the argument medicine_name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-84x8-7rpq-3m9g
IBM QRadar Suite Products 1.10.12.0 through 1.10.18.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 280781.
[]
CVE-2008-6446
Static code injection vulnerability in the Guestbook component in CMS MAXSITE allows remote attackers to inject arbitrary PHP code into the guestbook via the message parameter.
[ "cpe:2.3:a:geniuscyber:maxsite:-:*:*:*:*:*:*:*" ]
CVE-2021-0279
Contrail Cloud: Hardcoded credentials for RabbitMQ service
Juniper Networks Contrail Cloud (CC) releases prior to 13.6.0 have RabbitMQ service enabled by default with hardcoded credentials. The messaging services of RabbitMQ are used when coordinating operations and status information among Contrail services. An attacker with access to an administrative service for RabbitMQ (e.g. GUI), can use these hardcoded credentials to cause a Denial of Service (DoS) or have access to unspecified sensitive system information. This issue affects the Juniper Networks Contrail Cloud releases on versions prior to 13.6.0.
[ "cpe:2.3:a:juniper:contrail_cloud:*:*:*:*:*:*:*:*" ]
CVE-2024-6296
Stackable – Page Builder Gutenberg Blocks <= 3.13.1 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting
The Stackable – Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-caption’ parameter in all versions up to, and including, 3.13.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-g5mq-prx7-c588
motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution
SummaryUsing a constructed (camera) device path with the `config/add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any UNIX shell code within a non-interactive shell as executing user of the motionEye instance, `motion` by default.function call stack`post``add_camera``config.add_camera``v4l2ctl.list_resolutions``utils.call_subprocess``subprocess.run`PoCbuildreproduceRun:Now, run the following script to attack motionEye:DiscussionIt is obvious that call_subprocess was used to execute the incoming data, resulting in a vulnerabilityImpactRCEPatchesThe vulnerability has been patch with motionEye v0.43.1b4: https://github.com/motioneye-project/motioneye/pull/3143WorkaroundsApplying the following patch, replacing the literal single quotes in the created `cmd` string with a `shlex.quote`d input device: https://patch-diff.githubusercontent.com/raw/motioneye-project/motioneye/pull/3143.patchReferenceshttps://github.com/motioneye-project/motioneye/issues/3142CreditThe vulnerability was discovered by Tencent YunDing Security Lab.
[]
CVE-2022-2796
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.4.
[ "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*" ]
GHSA-jc8x-vpwq-c9g5
TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability via the username parameter in the setting/setOpenVpnCertGenerationCfg function.
[]
GHSA-j65p-jg28-297r
The Video Share VOD – Turnkey Video Site Builder Script plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'videowhisper_player_html' shortcode in all versions up to, and including, 2.6.30 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-8c97-c37f-24x3
Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21585.
[]
GHSA-3fx3-gj2c-qr57
Pharmacy Sales And Inventory System v1.0 is vulnerable to SQL Injection via /pharmacy-sales-and-inventory-system/manage_user.php?id=.
[]
CVE-2017-12093
An exploitable insufficient resource pool vulnerability exists in the session communication functionality of Allen Bradley Micrologix 1400 Series B Firmware 21.2 and before. A specially crafted stream of packets can cause a flood of the session resource pool resulting in legitimate connections to the PLC being disconnected. An attacker can send unauthenticated packets to trigger this vulnerability.
[ "cpe:2.3:o:rockwellautomation:micrologix_1400_b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:micrologix_1400:-:*:*:*:*:*:*:*" ]
GHSA-3qr9-vhfr-rj74
Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. For more information about these vulnerabilities, see the Details section of this advisory.
[]
GHSA-p67c-35g3-9pqc
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
[]
GHSA-fr37-rgj4-cmfh
NexusPHP 1.5.beta5.20120707 has XSS in the returnto parameter to fun.php in a delete action.
[]
CVE-2018-1371
An IBM WebSphere MQ 8.0.0.8, 9.0.0.2, and 9.0.4 Client connecting to a MQ Queue Manager can cause a SIGSEGV in the AMQRMPPA channel process terminating it. IBM X-Force ID: 137771.
[ "cpe:2.3:a:ibm:websphere_mq:8.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:9.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_mq:9.0.4:*:*:*:*:*:*:*" ]
CVE-2024-21010
Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Simphony Enterprise Server). Supported versions that are affected are 19.1.0-19.5.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. While the vulnerability is in Oracle Hospitality Simphony, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:hospitality_simphony:19.1.0-19.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_simphony:*:*:*:*:*:*:*:*" ]
GHSA-rf4j-j272-fj86
Django vulnerable to information leakage in AuthenticationForm
`django.contrib.auth.forms.AuthenticationForm` in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the `confirm_login_allowed()` method, as demonstrated by discovering whether a user account is inactive.
[]
CVE-2022-27181
On F5 BIG-IP APM 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when APM is configured on a virtual server and the associated access profile is configured with APM AAA NTLM Auth, undisclosed requests can cause an increase in internal resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:13.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:14.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:16.1.2:*:*:*:*:*:*:*" ]
CVE-2012-2977
The management console in Symantec Web Gateway 5.0.x before 5.0.3.18 allows remote attackers to change arbitrary passwords via crafted input to an application script.
[ "cpe:2.3:a:symantec:web_gateway:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:web_gateway:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:web_gateway:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:web_gateway:5.0.3:*:*:*:*:*:*:*" ]
GHSA-xj7q-fm56-pfxj
Cross-site scripting (XSS) vulnerability in gallery/thumb.php in Winged Gallery 1.0 allows remote attackers to inject arbitrary web script or HTML via the image parameter.
[]