id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2025-24443 | Substance3D - Sampler | Heap-based Buffer Overflow (CWE-122) | Substance3D - Sampler versions 4.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
GHSA-qvjf-c3cc-2mpj | IBM Sterling Connect:Direct for UNIX 4.2.0, 4.3.0, 6.0.0, and 6.1.0 is vulnerable to a stack based buffer ovreflow, caused by improper bounds checking. A local attacker could manipulate CD UNIX to obtain root provileges. IBM X-Force ID: 184578. | [] |
|
GHSA-fp3r-4j3m-54jg | Employee Performance Evaluation v1.0 was discovered to contain a SQL injection vulnerability via the email parameter. | [] |
|
GHSA-7mgm-6cgr-gh26 | SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrusted data. An unauthenticated attacker could run commands on the server when port 17001 was remotely accessible. This port is not accessible remotely by default after applying the Build 6985 patch. | [] |
|
CVE-2002-1697 | Electronic Code Book (ECB) mode in VTun 2.0 through 2.5 uses a weak encryption algorithm that produces the same ciphertext from the same plaintext blocks, which could allow remote attackers to gain sensitive information. | [
"cpe:2.3:a:vtun_project:vtun:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-3205 | Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*"
] |
|
CVE-2009-4580 | Multiple cross-site scripting (XSS) vulnerabilities in Hasta Blog 2.3 allow remote attackers to inject arbitrary web script or HTML via the id parameter to (1) yorumyaz.php and (2) blog.php. | [
"cpe:2.3:a:hastablog:hasta_blog:2.3:*:*:*:*:*:*:*"
] |
|
CVE-2011-5191 | Cross-site scripting (XSS) vulnerability in pretty-bar.php in Pretty Link Lite plugin before 1.5.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the slug parameter, a different vulnerability than CVE-2011-5192. | [
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.29:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.38:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.39:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.41:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.42:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.43:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.44:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.45:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.46:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.47:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.48:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.49:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.50:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.51:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.52:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.53:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.55:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.4.56:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:blairwilliams:pretty_link_lite_plugin:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*"
] |
|
GHSA-vp9w-43wr-g8fj | A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication. | [] |
|
CVE-2015-1752 | Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1741. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
CVE-2018-8583 | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8617, CVE-2018-8618, CVE-2018-8624, CVE-2018-8629. | [
"cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-j438-gf7h-pvjh | D-Link Online behavior audit gateway DAR-7000 V31R02B1413C is vulnerable to SQL Injection via /importexport.php. | [] |
|
GHSA-hw2r-jgp3-3h2v | On Microchip RN4870 devices, when more than one consecutive PairReqNoInputNoOutput request is
received, the device becomes incapable of completing the pairing
process. A third party can inject a second PairReqNoInputNoOutput request
just after a real one, causing the pair request to be blocked. | [] |
|
GHSA-q23c-cffp-ccqx | Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434. | [] |
|
CVE-2024-5167 | CM Email Registration Blacklist and Whitelist < 1.4.9 - Add/Delete Emails via CSRF Add and delete any item from blacklist/whitelist | The CM Email Registration Blacklist and Whitelist WordPress plugin before 1.4.9 does not have CSRF check when adding or deleting an item from the blacklist or whitelist, which could allow attackers to make a logged in admin add or delete settings from the blacklist or whitelist menu via a CSRF attack | [
"cpe:2.3:a:creativemindssolutions:cm_email_registration_blacklist_and_whitelist:*:*:*:*:*:*:*:*"
] |
CVE-2006-7012 | scart.cgi in SCart 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the page parameter of a show_text action. | [
"cpe:2.3:a:scart:scart:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-12139 | XOOPS Core 2.5.8 has stored XSS in imagemanager.php because of missing MIME type validation in htdocs/class/uploader.php. | [
"cpe:2.3:a:xoops:xoops:2.5.8:*:*:*:*:*:*:*"
] |
|
CVE-2017-7510 | In ovirt-engine 4.1, if a host was provisioned with cloud-init, the root password could be revealed through the REST interface. | [
"cpe:2.3:a:redhat:ovirt-engine:4.1.0:-:*:*:*:*:*:*"
] |
|
GHSA-568x-gvr8-p7p8 | Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] |
|
GHSA-jx2m-9x57-vwr5 | A clipboard "paste" button could persist across tabs which allowed a spoofing attack. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132. | [] |
|
GHSA-mgmm-cmhj-2h5f | modoboa Cross-site Scripting vulnerability | Cross-site Scripting (XSS) - Reflected in GitHub repository modoboa/modoboa prior to 2.0.45. | [] |
GHSA-4gj3-5752-q8g8 | OS command injection vulnerability exists in BUFFALO wireless LAN routers and wireless LAN repeaters. If a user logs in to the management page and sends a specially crafted request to the affected product from the product's specific management page, an arbitrary OS command may be executed. | [] |
|
CVE-2025-2146 | Buffer overflow in WebService Authentication processing of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *: Satera MF656Cdw/Satera MF654Cdw/Satera MF551dw/Satera MF457dw firmware v05.07 and earlier sold in Japan. Color imageCLASS MF656Cdw/Color imageCLASS MF654Cdw/Color imageCLASS MF653Cdw/Color imageCLASS MF652Cdw/Color imageCLASS LBP633Cdw/Color imageCLASS LBP632Cdw/imageCLASS MF455dw/imageCLASS MF453dw/imageCLASS MF452dw/imageCLASS MF451dw/imageCLASS LBP237dw/imageCLASS LBP236dw/imageCLASS X MF1238 II/imageCLASS X MF1643i II/imageCLASS X MF1643iF II/imageCLASS X LBP1238 II firmware v05.07 and earlier sold in US. i-SENSYS MF657Cdw/i-SENSYS MF655Cdw/i-SENSYS MF651Cdw/i-SENSYS LBP633Cdw/i-SENSYS LBP631Cdw/i-SENSYS MF553dw/i-SENSYS MF552dw/i-SENSYS MF455dw/i-SENSYS MF453dw/i-SENSYS LBP236dw/i-SENSYS LBP233dw/imageRUNNER 1643iF II/imageRUNNER 1643i II/i-SENSYS X 1238iF II/i-SENSYS X 1238i II/i-SENSYS X 1238P II/i-SENSYS X 1238Pr II firmware v05.07 and earlier sold in Europe. | [] |
|
GHSA-535p-6x4h-f6px | In widevine, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07635697; Issue ID: ALPS07635697. | [] |
|
CVE-2024-54795 | SpagoBI v3.5.1 contains multiple Stored Cross-Site Scripting (XSS) vulnerabilities in the create/edit forms of the worksheet designer function. | [] |
|
CVE-2022-3916 | Keycloak: session takeover with oidc offline refreshtokens | A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user. | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6",
"cpe:/a:redhat:red_hat_single_sign_on:7.6.1",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9",
"cpe:/a:redhat:rhosemc:1.0::el8",
"cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*"
] |
GHSA-mpjp-h73q-33cc | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. | [] |
|
CVE-2018-10633 | Universal Robots Robot Controllers Version CB 3.1, SW Version 3.4.5-100 utilizes hard-coded credentials that may allow an attacker to reset passwords for the controller. | [
"cpe:2.3:o:universal-robots:cb3.1_firmware:3.4.5-100:*:*:*:*:*:*:*",
"cpe:2.3:h:universal-robots:cb3.1:-:*:*:*:*:*:*:*"
] |
|
GHSA-2fh2-r4pq-hx4f | An issue was discovered in Samsung Mobile Processor Exynos 2200, Exynos 1480, Exynos 2400. It lacks proper buffer length checking, which can result in an Out-of-Bounds Write. | [] |
|
CVE-2023-2387 | Netgear SRX5308 Web Management Interface cross site scripting | A vulnerability classified as problematic was found in Netgear SRX5308 up to 4.3.5-3. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument winsServer1 leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227665 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*"
] |
GHSA-mmcc-4pv3-77cj | An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9 when used in conjunction with libSDL2_image.a in SDL2_image 2.0.4. There is a heap-based buffer overflow in the SDL2_image function IMG_LoadPCX_RW at IMG_pcx.c. | [] |
|
CVE-2016-7281 | The Web Workers implementation in Microsoft Internet Explorer 10 and 11 and Microsoft Edge allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Microsoft Browser Security Feature Bypass Vulnerability." | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
GHSA-vhcp-vh2x-wgf3 | SQL injection vulnerability in cgi-bin/gnudip.cgi in GnuDIP 2.1.1 allows remote attackers to execute arbitrary SQL commands via the username parameter. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2021-36070 | Adobe Media Encoder Improper Memory Access When Parsing SVG Files Could Lead To Remote Code Execution | Adobe Media Encoder version 15.1 (and earlier) is affected by an improper memory access vulnerability when parsing a crafted .SVG file. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-qm7h-4cgg-4m78 | SAP Biller Direct allows an unauthenticated attacker to craft a legitimate looking URL. When clicked by an unsuspecting victim, it will use an unsensitized parameter to redirect the victim to a malicious site of the attacker's choosing which can result in disclosure or modification of the victim's information. | [] |
|
GHSA-chm6-426c-783j | In the Linux kernel, the following vulnerability has been resolved:net: fix geneve_opt length integer overflowstruct geneve_opt uses 5 bit length for each single option, which
means every vary size option should be smaller than 128 bytes.However, all current related Netlink policies cannot promise this
length condition and the attacker can exploit a exact 128-byte size
option to *fake* a zero length option and confuse the parsing logic,
further achieve heap out-of-bounds read.One example crash log is like below:[ 3.905425] ==================================================================
[ 3.905925] BUG: KASAN: slab-out-of-bounds in nla_put+0xa9/0xe0
[ 3.906255] Read of size 124 at addr ffff888005f291cc by task poc/177
[ 3.906646]
[ 3.906775] CPU: 0 PID: 177 Comm: poc-oob-read Not tainted 6.1.132 #1
[ 3.907131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
[ 3.907784] Call Trace:
[ 3.907925] <TASK>
[ 3.908048] dump_stack_lvl+0x44/0x5c
[ 3.908258] print_report+0x184/0x4be
[ 3.909151] kasan_report+0xc5/0x100
[ 3.909539] kasan_check_range+0xf3/0x1a0
[ 3.909794] memcpy+0x1f/0x60
[ 3.909968] nla_put+0xa9/0xe0
[ 3.910147] tunnel_key_dump+0x945/0xba0
[ 3.911536] tcf_action_dump_1+0x1c1/0x340
[ 3.912436] tcf_action_dump+0x101/0x180
[ 3.912689] tcf_exts_dump+0x164/0x1e0
[ 3.912905] fw_dump+0x18b/0x2d0
[ 3.913483] tcf_fill_node+0x2ee/0x460
[ 3.914778] tfilter_notify+0xf4/0x180
[ 3.915208] tc_new_tfilter+0xd51/0x10d0
[ 3.918615] rtnetlink_rcv_msg+0x4a2/0x560
[ 3.919118] netlink_rcv_skb+0xcd/0x200
[ 3.919787] netlink_unicast+0x395/0x530
[ 3.921032] netlink_sendmsg+0x3d0/0x6d0
[ 3.921987] __sock_sendmsg+0x99/0xa0
[ 3.922220] __sys_sendto+0x1b7/0x240
[ 3.922682] __x64_sys_sendto+0x72/0x90
[ 3.922906] do_syscall_64+0x5e/0x90
[ 3.923814] entry_SYSCALL_64_after_hwframe+0x6e/0xd8
[ 3.924122] RIP: 0033:0x7e83eab84407
[ 3.924331] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 faf
[ 3.925330] RSP: 002b:00007ffff505e370 EFLAGS: 00000202 ORIG_RAX: 000000000000002c
[ 3.925752] RAX: ffffffffffffffda RBX: 00007e83eaafa740 RCX: 00007e83eab84407
[ 3.926173] RDX: 00000000000001a8 RSI: 00007ffff505e3c0 RDI: 0000000000000003
[ 3.926587] RBP: 00007ffff505f460 R08: 00007e83eace1000 R09: 000000000000000c
[ 3.926977] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffff505f3c0
[ 3.927367] R13: 00007ffff505f5c8 R14: 00007e83ead1b000 R15: 00005d4fbbe6dcb8Fix these issues by enforing correct length condition in related
policies. | [] |
|
GHSA-hxvf-rx4m-qx26 | Ecava IntegraXor before 4.1.4393 allows remote attackers to read cleartext credentials for administrative accounts via SELECT statements that leverage the guest role. | [] |
|
CVE-2025-1627 | Qi Blocks < 1.4 - Contributor+ Stored XSS via ToC Block | The Qi Blocks WordPress plugin before 1.4 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] |
CVE-2008-3476 | Microsoft Internet Explorer 5.01 SP4 and 6 does not properly handle errors associated with access to uninitialized memory, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "HTML Objects Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:5.01:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*"
] |
|
CVE-2017-10264 | Vulnerability in the Siebel UI Framework component of Oracle Siebel CRM (subcomponent: UIF Open UI). Supported versions that are affected are 16.0 and 17.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Siebel UI Framework. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | [
"cpe:2.3:a:oracle:siebel_ui_framework:16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_ui_framework:17.0:*:*:*:*:*:*:*"
] |
|
GHSA-fqc3-2g58-6mp9 | In AdBlock before 3.45.0, the $rewrite filter option allows filter-list maintainers to run arbitrary code in a client-side session when a web service loads a script for execution using XMLHttpRequest or Fetch, and the script origin has an open redirect. | [] |
|
GHSA-c773-95pr-cwwc | A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client, aka 'Windows DHCP Client Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0697, CVE-2019-0726. | [] |
|
GHSA-6c69-f4qc-5997 | Prior to CouchDB version 2.3.0, CouchDB allowed for runtime-configuration of key components of the database. In some cases, this lead to vulnerabilities where CouchDB admin users could access the underlying operating system as the CouchDB user. Together with other vulnerabilities, it allowed full system entry for unauthenticated users. Rather than waiting for new vulnerabilities to be discovered, and fixing them as they come up, the CouchDB development team decided to make changes to avoid this entire class of vulnerabilities. | [] |
|
CVE-2022-32554 | Pure Storage FlashArray products running Purity//FA 6.2.0 - 6.2.3, 6.1.0 - 6.1.12, 6.0.0 - 6.0.8, 5.3.0 - 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 - 3.2.4, 3.1.0 - 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to possibly exposed credentials for accessing the product’s management interface. The password may be known outside Pure Storage and could be used on an affected system, if reachable, to execute arbitrary instructions with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software. | [
"cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*",
"cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*"
] |
|
GHSA-2jg5-xgvv-4wq7 | Mailman Core vulnerable to timing attacks | An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces. | [] |
CVE-2008-7301 | SQL injection vulnerability in admin/login.php in jSite 1.0 OE allows remote attackers to execute arbitrary SQL commands via the username parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:sclek:jsite:1.0:*:oe:*:*:*:*:*"
] |
|
CVE-2017-0015 | A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
] |
|
CVE-2004-0900 | The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote attackers to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability." | [
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:alpha:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server_alpha:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:alpha:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:alpha:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:alpha:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:alpha:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:alpha:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:alpha:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:alpha:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*"
] |
|
GHSA-jj26-w84h-2pcx | Multiple cross-site scripting (XSS) vulnerabilities in the web framework in Cisco Secure Access Control System (ACS) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuq79019. | [] |
|
GHSA-7p8m-54qp-xvw9 | Directory traversal vulnerability in index.php in Alstrasoft Epay Pro 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the read parameter. | [] |
|
CVE-2013-5845 | Unspecified vulnerability in the Oracle iLearning component in Oracle iLearning 5.2.1 and 6.0 allows remote attackers to affect integrity via unknown vectors related to Learner Administration. | [
"cpe:2.3:a:oracle:ilearning:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:ilearning:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-9947-j3mv-mffj | SQL injection vulnerability in popup.php in Zabbix 1.8.3 and 1.8.4, and possibly other versions before 1.8.9, allows remote attackers to execute arbitrary SQL commands via the only_hostid parameter. | [] |
|
GHSA-p52h-5fjj-x2pc | The vCenter Server contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in vCenter Server Content Library. An authorised user with access to content library may exploit this issue by sending a POST request to vCenter Server leading to information disclosure. | [] |
|
GHSA-jm2p-9h9p-vg22 | The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete. | [] |
|
CVE-2008-3095 | Cross-site scripting (XSS) vulnerability in the Organic Groups (OG) module 5.x before 5.x-7.3 and 6.x before 6.x-1.0-RC1, a module for Drupal, allows remote authenticated users, with group owner permissions, to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:drupal:organic_groups_module:5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:organic_groups_module:6:*:*:*:*:*:*:*"
] |
|
GHSA-v728-2v4r-c686 | This vulnerability allows remote attackers to traverse paths via file upload on the affected LG LED Assistant. | [] |
|
CVE-2024-27768 | Unitronics Unistream Unilogic – Versions prior to 1.35.227 CWE-22: 'Path Traversal' |
Unitronics Unistream Unilogic – Versions prior to 1.35.227 - CWE-22: 'Path Traversal' may allow RCE
| [
"cpe:2.3:a:unitronics:unistream_unilogic:*:*:*:*:*:*:*:*"
] |
CVE-2021-1751 | A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Mounting a maliciously crafted Samba network share may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-g995-h8wx-7qw6 | A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service. | [] |
|
CVE-2025-47163 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. | [] |
CVE-2024-53136 | mm: revert "mm: shmem: fix data-race in shmem_getattr()" | In the Linux kernel, the following vulnerability has been resolved:
mm: revert "mm: shmem: fix data-race in shmem_getattr()"
Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as
suggested by Chuck [1]. It is causing deadlocks when accessing tmpfs over
NFS.
As Hugh commented, "added just to silence a syzbot sanitizer splat: added
where there has never been any practical problem". | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-9577-9q88-9qxg | Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30178, CVE-2022-30179. | [] |
|
GHSA-mpmc-v776-vcmf | A certain Red Hat build script for nfs-utils before 1.0.9-35z.el5_2 on Red Hat Enterprise Linux (RHEL) 5 omits TCP wrappers support, which might allow remote attackers to bypass intended access restrictions. | [] |
|
CVE-2025-5611 | CodeAstro Real Estate Management System submitpropertyupdate.php sql injection | A vulnerability, which was classified as critical, was found in CodeAstro Real Estate Management System 1.0. This affects an unknown part of the file /submitpropertyupdate.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
CVE-2023-24426 | Jenkins Azure AD Plugin 303.va_91ef20ee49f and earlier does not invalidate the previous session on login. | [
"cpe:2.3:a:jenkins:azure_ad:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2009-3781 | The filefield_file_download function in FileField 6.x-3.1, a module for Drupal, does not properly check node-access permissions for Drupal core private files, which allows remote attackers to access unauthorized files via unspecified vectors. | [
"cpe:2.3:a:quicksketch:filefield:6.x-3.1:*:*:*:*:drupal:*:*"
] |
|
GHSA-73gh-39wp-xm6c | A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary files in arbitrary file system paths via a crafted HTTP request. | [] |
|
CVE-2018-14783 | NetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. A cross-site request forgery condition can occur, allowing an attacker to change passwords of the device remotely. | [
"cpe:2.3:o:netcommwireless:nwl-25_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netcommwireless:nwl-25:-:*:*:*:*:*:*:*"
] |
|
GHSA-5835-h5hx-vv53 | Cross-site scripting (XSS) vulnerability in Amazing Flash AFCommerce Shopping Cart allows remote attackers to inject arbitrary web script or HTML via the "new review" text box. | [] |
|
GHSA-vqgp-46r4-f6j8 | Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formwrlSSIDset function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string. | [] |
|
GHSA-3xx8-v4vj-2v2m | Unquoted Windows search path vulnerability in NSClient++ before 0.4.1.73 allows non-privileged local users to execute arbitrary code with elevated privileges on the system via a malicious program.exe executable in the %SYSTEMDRIVE% folder. | [] |
|
GHSA-637q-pq87-f4pq | While processing a compressed kernel image, a buffer overflow can occur in Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05. | [] |
|
GHSA-9pfr-cc3p-p98q | A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka "ASP.NET Core Denial of Service Vulnerability." This affects ASP.NET Core 2.2, ASP.NET Core 2.1. This CVE ID is unique from CVE-2019-0564. | [] |
|
GHSA-p7q6-9gm8-m4c5 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Eightweb Interactive Read More Without Refresh plugin <= 3.1 versions. | [] |
|
GHSA-vrx6-v2w3-g566 | The auto-complete functionality in the Chaos Tool Suite (aka CTools) module 6.x before 6.x-1.4 for Drupal does not follow access restrictions, which allows remote authenticated users, with "access content" privileges, to read the title of an unpublished node via a q=ctools/autocomplete/node/ value accompanied by the first character of the node's title. | [] |
|
GHSA-9965-5x5j-j3rf | js/ui/screenShield.js in GNOME Shell (aka gnome-shell) before 3.8 allows physically proximate attackers to execute arbitrary commands by leveraging an unattended workstation with the keyboard focus on the Activities search. | [] |
|
CVE-2016-0436 | Unspecified vulnerability in the Oracle Retail Point-of-Service component in Oracle Retail Applications 13.4, 14.0, and 14.1 allows local users to affect confidentiality via vectors related to Mobile POS, a different vulnerability than CVE-2016-0434, CVE-2016-0437, and CVE-2016-0438. | [
"cpe:2.3:a:oracle:retail_applications:13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_applications:14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_applications:14.1:*:*:*:*:*:*:*"
] |
|
GHSA-mcrm-xjc2-86j5 | SQL injection vulnerability in showflat.php in UBB.threads 5.5.1, 6.0 br5, 6.0.1, 6.0.2, and earlier, allows remote attackers to execute arbitrary SQL commands via the Number parameter. | [] |
|
GHSA-333w-grm8-fgcg | The vulnerability allows a successful attacker to bypass the integrity check of FW uploaded to the free@home System Access Point. | [] |
|
CVE-2016-1328 | goform/WClientMACList on Cisco EPC3928 devices allows remote attackers to cause a denial of service (device crash) via a long h_sortWireless parameter, related to a "Gateway Client List Denial of Service" issue, aka Bug ID CSCux24948. | [
"cpe:2.3:o:cisco:epc3928_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:epc3928:*:*:*:*:*:*:*:*"
] |
|
GHSA-q7c2-6g86-6v93 | The build package before 20171128 did not check directory names during extraction of build results that allowed untrusted builds to write outside of the target system,allowing escape out of buildroots. | [] |
|
CVE-2015-1176 | Cross-site scripting (XSS) vulnerability in upload/scp/tickets.php in osTicket before 1.9.5 allows remote attackers to inject arbitrary web script or HTML via the status parameter in a search action. | [
"cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-53432 | While parsing certain malformed PLY files, PCL version 1.14.1 crashes due to an uncaught std::out_of_range exception in PCLPointCloud2::at. This issue could potentially be exploited to cause a denial-of-service (DoS) attack when processing untrusted PLY files. | [
"cpe:2.3:a:point_cloud_library:pcl:1.14.1:*:*:*:*:*:*:*"
] |
|
GHSA-fmxc-729m-p4cj | Memory leak in Terminal servers in Windows NT and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed Remote Desktop Protocol (RDP) requests to port 3389. | [] |
|
GHSA-4f2h-f89q-3w95 | Buffer overflow in "rcar_dev_init" due to using due to using untrusted data (rcar_image_number) as a loop counter before verifying it against RCAR_MAX_BL3X_IMAGE. This could lead to a full bypass of secure boot. | [] |
|
CVE-2015-1857 | The odl-mdsal-apidocs feature in OpenDaylight Helium allow remote attackers to obtain sensitive information by leveraging missing AAA restrictions. | [
"cpe:2.3:a:linuxfoundation:opendaylight:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-3276 | HP OpenVMS 8.3, 8.3-1H1, and 8.4 on the Itanium platform and 7.3-2, 8.2, 8.3, and 8.4 on the Alpha platform does not properly implement the LOGIN and ACME_SERVER ACMELOGIN programs, which allows local users to cause a denial of service via unspecified vectors. | [
"cpe:2.3:o:hp:openvms:7.3-2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:openvms:8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:openvms:8.3-1h1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:openvms:8.4:*:*:*:*:*:*:*"
] |
|
CVE-2024-23118 | Centreon updateContactHostCommands SQL Injection Remote Code Execution Vulnerability | Centreon updateContactHostCommands SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Centreon. Authentication is required to exploit this vulnerability.
The specific flaw exists within the updateContactHostCommands function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-22298. | [
"cpe:2.3:a:centreon:centreon:*:*:*:*:*:*:*:*"
] |
CVE-2020-3420 | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.There are no workarounds that address this vulnerability. | [] |
GHSA-9v9r-86p3-cg7v | A remote, unauthenticated attacker may be able to send crafted messages
to the web server of the Commend WS203VICM causing the system to
restart, interrupting service. | [] |
|
CVE-2023-2309 | wpForo Forum < 2.1.9 - Reflected Cross-Site Scripting | The wpForo Forum WordPress plugin before 2.1.9 does not escape some request parameters while in debug mode, leading to a Reflected Cross-Site Scripting vulnerability. | [
"cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:*"
] |
GHSA-8334-x488-rmxc | H3C Magic R200 R200V200R004L02 was discovered to contain a stack overflow via the DelDNSHnList interface at /goform/aspForm. | [] |
|
GHSA-c2wc-64f2-wxpp | An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the option parameter equal to 0, 1 or 2 in /administer/selectionnode/framesSelection.asp. | [] |
|
GHSA-98mx-whjc-jqv8 | Buffer overflow in the Avax Vector ActiveX control in avPreview.ocx in AVAX-software Avax Vector ActiveX 1.3 allows remote attackers to cause a denial of service (application crash) via a long PrinterName property. | [] |
|
CVE-2015-8530 | Stack-based buffer overflow in the Initialize function in an ActiveX control in IBM SPSS Statistics 19 and 20 before 20.0.0.2-IF0008, 21 before 21.0.0.2-IF0010, 22 before 22.0.0.2-IF0011, 23 before 23.0.0.3-IF0001, and 24 before 24.0.0.0-IF0003 allows remote authenticated users to execute arbitrary code via a long argument. | [
"cpe:2.3:a:ibm:spss_statistics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spss_statistics:24.0.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-66jg-m4hw-q8f2 | This vulnerability could allow an attacker to store a malicious JavaScript payload in the login footer and login page description parameters within the administration panel. | [] |
|
CVE-2010-3008 | Unspecified vulnerability in HP Data Protector Express, and Data Protector Express Single Server Edition (SSE), 3.x before build 56936 and 4.x before build 56906 on Windows allows local users to gain privileges or cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3007. | [
"cpe:2.3:a:hp:data_protector_express:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_express:3.5:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_express:3.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_express:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_express:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_express:3.1:*:single_server:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_express:3.5:sp1:single_server:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_express:3.5:sp2:single_server:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_express:4.0:*:single_server:*:*:*:*:*",
"cpe:2.3:a:hp:data_protector_express:4.0:sp1:single_server:*:*:*:*:*"
] |
|
CVE-2020-14461 | Zyxel Armor X1 WAP6806 1.00(ABAL.6)C0 devices allow Directory Traversal via the images/eaZy/ URI. | [
"cpe:2.3:o:zyxel:wap6806_firmware:1.00\\(abal.6\\)c0:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:wap6806:-:*:*:*:*:*:*:*"
] |
|
GHSA-m2fm-gm84-v5jq | A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [] |
|
CVE-2017-9303 | Laravel 5.4.x before 5.4.22 does not properly constrain the host portion of a password-reset URL, which makes it easier for remote attackers to conduct phishing attacks by specifying an attacker-controlled host. | [
"cpe:2.3:a:laravel:laravel:5.4.0:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.