Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2019-15579
An information disclosure exists in < 12.3.2, < 12.2.6, and < 12.1.12 for GitLab Community Edition (CE) and Enterprise Edition (EE) where the assignee(s) of a confidential issue in a private project would be disclosed to a guest via milestones.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
CVE-2019-19729
An issue was discovered in the BSON ObjectID (aka bson-objectid) package 1.3.0 for Node.js. ObjectID() allows an attacker to generate a malformed objectid by inserting an additional property to the user-input, because bson-objectid will return early if it detects _bsontype==ObjectID in the user-input object. As a result, objects in arbitrary forms can bypass formatting if they have a valid bsontype.
[ "cpe:2.3:a:bson-objectid_project:bson-objectid:1.3.0:*:*:*:*:node.js:*:*" ]
GHSA-f3v6-g4mv-pjhq
WEC Map (wec_map) extension for TYPO3 allows SQL Injection
SQL injection vulnerability in the WEC Map (wec_map) extension before 3.0.3 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
GHSA-3hpf-ff72-j67p
shared_preferences_android vulnerability
ImpactDue to some data types not being natively representable for the available storage options, shared_preferences_android serializes and deserializes special string prefixes to store these unrepresentable data types. This allows arbitrary classes to be deserialized leading to arbitrary code execution.As a result, Files containing the preferences can be overwritten with a malicious one with a deserialization payload that triggers as soon as the data is loaded from the disk.Patches2.3.4WorkaroundsUpdate to the latest version of shared_preferences_android that contains the changes to address this vulnerability.ReferencesTBDFor more informationSee [our community page](https://dart.dev/community) to find ways to contact the team.ThanksThank you so much to Oskar Zeino-Mahmalat from sonarsource for finding and reporting this issue!
[]
CVE-2006-3515
SQL injection vulnerability in the loginADP function in ajaxp.php in AjaxPortal 3.0 allows remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) username or (2) password parameters.
[ "cpe:2.3:a:myiosoft.com:ajaxportal:3.0:*:*:*:*:*:*:*" ]
CVE-2022-1658
Jupiter Theme <= 6.10.1 - Authenticated Arbitrary Plugin Deletion
Vulnerable versions of the Jupiter Theme (<= 6.10.1) allow arbitrary plugin deletion by any authenticated user, including users with the subscriber role, via the abb_remove_plugin AJAX action registered in the framework/admin/control-panel/logic/plugin-management.php file. Using this functionality, any logged-in user can delete any installed plugin on the site.
[ "cpe:2.3:a:artbees:jupiter:*:*:*:*:*:wordpress:*:*" ]
CVE-2023-30482
WordPress WPBulky Plugin < 1.0.10 is vulnerable to Cross Site Scripting (XSS)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in VillaTheme WPBulky plugin <= 1.0.10 versions.
[ "cpe:2.3:a:villatheme:wpbulky:*:*:*:*:*:wordpress:*:*" ]
GHSA-fq78-jw2r-hqcx
Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434.
[]
CVE-2010-0625
Stack-based buffer overflow in NWFTPD.nlm before 5.10.01 in the FTP server in Novell NetWare 5.1 through 6.5 SP8 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long (1) MKD, (2) RMD, (3) RNFR, or (4) DELE command.
[ "cpe:2.3:a:novell:netware_ftp_server:5.01i:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.01o:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.01w:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.01y:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.02b:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.02i:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.02r:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.02y:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.03b:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.03l:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.04.5:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.04.8:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.04.20:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.04.25:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.05:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.05.04:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.06.04:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.06.05:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.07:*:*:*:*:*:*:*", "cpe:2.3:a:novell:netware_ftp_server:5.07.02:*:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:5.1:sp2a:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:5.1:sp3:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:5.1:sp4:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:5.1:sp6:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.0:sp3:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp1.1a:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp1.1b:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp2:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp3:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp4:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp5:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp6:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp7:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:sp8:*:*:*:*:*:*" ]
CVE-2022-48683
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13. An app may be able to break out of its sandbox.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
GHSA-jg22-m6v9-7rwj
Associated Press (AP) Newspower 4.0.1 and earlier uses a default blank password for the MySQL root account, which allows remote attackers to insert or modify news articles via shows.tblscript.
[]
GHSA-mfv3-xjr8-9xpg
Cross-site scripting (XSS) vulnerability (stored) in SPIP before 3.1.7 allows remote attackers to inject arbitrary web script or HTML via a crafted string, as demonstrated by a PGP field, related to prive/objets/contenu/auteur.html and ecrire/inc/texte_mini.php.
[]
CVE-2005-3925
Multiple SQL injection vulnerabilities in Central Manchester CLC Helpdesk Issue Manager 0.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) detail[], (2) orderdir, and (3) orderby parameters to find.php, and the (4) id parameter to issue.php.
[ "cpe:2.3:a:helpdesk_issue_manager:helpdesk_issue_manager:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:helpdesk_issue_manager:helpdesk_issue_manager:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:helpdesk_issue_manager:helpdesk_issue_manager:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:helpdesk_issue_manager:helpdesk_issue_manager:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:helpdesk_issue_manager:helpdesk_issue_manager:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:helpdesk_issue_manager:helpdesk_issue_manager:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:helpdesk_issue_manager:helpdesk_issue_manager:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:helpdesk_issue_manager:helpdesk_issue_manager:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:helpdesk_issue_manager:helpdesk_issue_manager:0.9:*:*:*:*:*:*:*" ]
GHSA-r5hc-wm3g-hjw6
Server-Side Request Forgery (SSRF) in rudloff/alltube
ImpactReleases prior to 3.0.2 are vulnerable to a Server-Side Request Forgery vulnerability that allows an attacker to send a request to an internal hostname.Patches3.0.2 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.)Part of the fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/148a171b240e7ceb076b9e198bef412de14ac55d/patches/youtube-dl-redirect.diff) to youtube-dl to prevent it from following HTTP redirects. If you are using the version of youtube-dl bundled with 3.0.2, it is already patched. However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**.Referenceshttps://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8dhttps://github.com/Rudloff/alltube/commit/1b099bb9836a3ce7c427a41722a7ab5a3d1c1b2dhttps://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903/https://nvd.nist.gov/vuln/detail/CVE-2022-0768https://github.com/ytdl-org/youtube-dl/issues/30691
[]
CVE-2018-13171
The mintToken function of a smart contract implementation for LadaToken (LDT), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:ladatoken_project:ladatoken:-:*:*:*:*:*:*:*" ]
GHSA-2v92-7cf3-4vm5
The Timetable and Event Schedule WordPress plugin before 2.4.2 does not have proper access control when updating a timeslot, allowing any user with the edit_posts capability (contributor+) to update arbitrary timeslot from any events. Furthermore, no CSRF check is in place as well, allowing such attack to be perform via CSRF against a logged in with such capability. In versions before 2.3.19, the lack of sanitisation and escaping in some of the fields, like the descritption could also lead to Stored XSS issues
[]
GHSA-xc4q-r4rw-49j6
The login_to_simulator method in Linden Lab Second Life, as used by the secondlife:// protocol handler and possibly other Second Life login mechanisms, sends an MD5 hash in cleartext in the passwd field, which allows remote attackers to login to an account by sniffing the network and then sending this hash to a Second Life authentication server.
[]
CVE-2016-6419
SQL injection vulnerability in Cisco Firepower Management Center 4.10.3 through 5.4.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCur25485.
[ "cpe:2.3:a:cisco:secure_firewall_management_center:4.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:5.4.0:*:*:*:*:*:*:*" ]
CVE-2019-15540
filters/filter-cso/filter-stream.c in the CSO filter in libMirage 3.2.2 in CDemu does not validate the part size, triggering a heap-based buffer overflow that can lead to root access by a local Linux user.
[ "cpe:2.3:a:cdemu:libmirage:3.2.2:*:*:*:*:*:*:*" ]
GHSA-mm4r-hm8p-4r5h
Dell EMC Unity OE versions 4.3.0.x and 4.3.1.x and UnityVSA OE versions 4.3.0.x and 4.3.1.x contains an Incorrect File Permissions vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability to alter multiple library files in service tools that might result in arbitrary code execution with elevated privileges. No user file systems are directly affected by this vulnerability.
[]
CVE-2017-0912
Ubiquiti UCRM versions 2.5.0 to 2.7.7 are vulnerable to Stored Cross-site Scripting. Due to the lack sanitization, it is possible to inject arbitrary HTML code by manipulating the uploaded filename. Successful exploitation requires valid credentials to an account with "Edit" access to "Scheduling".
[ "cpe:2.3:a:ui:ucrm:*:*:*:*:*:*:*:*" ]
CVE-2008-3607
The IMAP server in NoticeWare Email Server NG 4.6.3 and earlier allows remote attackers to cause a denial of service (daemon crash) via multiple long LOGIN commands.
[ "cpe:2.3:a:noticeware:email_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:noticeware:email_server:4.6.2:*:*:*:*:*:*:*" ]
GHSA-qgc6-g85m-p5fg
SimpleNetwork TCP Server commit 29bc615f0d9910eb2f59aa8dff1f54f0e3af4496 was discovered to contain a double free vulnerability which is exploited via crafted TCP packets.
[]
CVE-2020-35240
FluxBB 1.5.11 is affected by cross-site scripting (XSS in the Blog Content component. This vulnerability can allow an attacker to inject the XSS payload in "Blog Content" and each time any user will visit the blog, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload.
[ "cpe:2.3:a:fluxbb:fluxbb:1.5.11:*:*:*:*:*:*:*" ]
GHSA-87rv-5pg2-g76r
SQL injection vulnerability in interface/forms/eye_mag/php/Anything_simple.php from library/forms.inc in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'encounter' parameter.
[]
CVE-2014-3461
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
[ "cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*" ]
GHSA-f357-m44q-68mm
In the Linux kernel, the following vulnerability has been resolved:s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFsWith commit bcb5d6c76903 ("s390/pci: introduce lock to synchronize state of zpci_dev's") the code to ignore power off of a PF that has child VFs was changed from a direct return to a goto to the unlock and pci_dev_put() section. The change however left the existing pci_dev_put() untouched resulting in a doubple put. This can subsequently cause a use after free if the struct pci_dev is released in an unexpected state. Fix this by removing the extra pci_dev_put().
[]
CVE-2014-2078
The backend in Open-Xchange (OX) AppSuite 7.4.2 before 7.4.2-rev9 allows remote attackers to obtain sensitive information about user email addresses in opportunistic circumstances by leveraging a failure in e-mail auto configuration for external accounts.
[ "cpe:2.3:a:open-xchange:open-xchange_appsuite:7.4.2:*:*:*:*:*:*:*" ]
CVE-2013-1026
Buffer overflow in ImageIO in Apple Mac OS X before 10.8.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted JPEG2000 data in a PDF document.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*" ]
GHSA-5f6g-rvpp-f8f4
Beehive Forum allows remote attackers to obtain sensitive information via (1) an invalid final_uri or sort_by parameter to index.php or a direct request to (2) admin.php, (3) attachments.inc.php, (4) banned.inc.php, (5) beehive.inc.php, (6) constants.inc.php, (7) db.inc.php, (8) dictionary.inc.php or (9) search_index.php, which reveal the path in an error message.
[]
GHSA-66c2-7g4p-wx4p
TYPO3 Information Disclosure in Install Tool
The Install Tool exposes the current TYPO3 version number to non-authenticated users.
[]
CVE-2024-2782
Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder <= 5.1.16 - Missing Authorization to Setting Manipulation
The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the /wp-json/fluentform/v1/global-settings REST API endpoint in all versions up to, and including, 5.1.16. This makes it possible for unauthenticated attackers to modify all of the plugin's settings.
[]
GHSA-q25j-gcmv-5qpp
Stored Cross Site Scripting in Grails Fields Plugin
Grails Fields plugin version 2.2.7 contains a Cross Site Scripting (XSS) vulnerability in using the display tag that can result in XSS. This vulnerability has been fixed in version 2.2.8.
[]
GHSA-4f7h-9j2x-cmr4
Improper Authentication in Apache Tomcat
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184.
[]
CVE-2025-23643
WordPress ReadMe Creator plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ReadMe Creator allows Reflected XSS. This issue affects ReadMe Creator: from n/a through 1.0.
[]
GHSA-jq2p-9w9x-5vq6
Microsoft SharePoint Server Remote Code Execution Vulnerability
[]
GHSA-p9qv-hhrp-m74q
In Xpdf 4.01.01, there is an out-of-bounds read vulnerability in the function SplashXPath::strokeAdjust() located at splash/SplashXPath.cc. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It might allow an attacker to cause Information Disclosure. This is related to CVE-2018-16368.
[]
CVE-2021-43958
Various rest resources in Fisheye and Crucible before version 4.8.9 allowed remote attackers to brute force user login credentials as rest resources did not check if users were beyond their max failed login limits and therefore required solving a CAPTCHA in addition to providing user credentials for authentication via a improper restriction of excess authentication attempts vulnerability.
[ "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*" ]
CVE-2008-0897
Unspecified vulnerability in BEA WebLogic Server 9.0 through 10.0 allows remote authenticated users without "receive" permissions to bypass intended access restrictions and receive messages from a standalone JMS Topic or secured Distributed Topic member destination, related to durable subscriptions.
[ "cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:9.2:mp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:10.0:*:*:*:*:*:*:*" ]
CVE-2015-4737
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Pluggable Auth.
[ "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
GHSA-wxmq-v9gx-75pg
Moodle vulnerable to Cross-site Request Forgery
The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk.
[]
GHSA-v9p6-88mx-cp9m
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteCIPImage() function in coders/cip.c, related to the GetPixelLuma function in MagickCore/pixel-accessor.h.
[]
GHSA-gfm8-g3vm-53jh
Malicious Package in leetlog
Versions 0.1.2 and 0.1.3 of `leetlog` contain malicious code. The package adds an arbitrary hardcoded SSH key identified as `hacker@evilmachine` to the system's `authorized_keys`RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
CVE-2012-3273
Multiple unspecified vulnerabilities on the HP LaserJet Pro 400 MFP M425 with firmware 20120625 and LaserJet 400 M401 with firmware 20120621 allow remote attackers to obtain sensitive information via unknown vectors.
[ "cpe:2.3:h:hp:laserjet_pro_mfp_m401:20120621:*:*:*:*:*:*:*", "cpe:2.3:h:hp:laserjet_pro_mfp_m425:20120625:*:*:*:*:*:*:*" ]
GHSA-c49r-8gj6-768r
Symfony Directory Traversal
An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal.
[]
GHSA-fqp8-3vv8-7r5j
This vulnerability allows remote attackers to create a denial-of-service condition on vulnerable installations of Quest NetVault Backup 11.2.0.13. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be easily bypassed. The specific flaw exists within the handling of Export requests. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to arbitrarily overwrite files resulting in a denial-of-service condition. Was ZDI-CAN-4222.
[]
GHSA-6c4m-qwcg-cwgv
PHP remote file inclusion vulnerability in sample/xls2mysql in ABC Excel Parser Pro 4.0 allows remote attackers to execute arbitrary PHP code via a URL in the parser_path parameter.
[]
GHSA-xqx5-9rjr-cjq9
Seceon aiSIEM before 6.3.2 (build 585) is prone to an unauthenticated account takeover vulnerability in the Forgot Password feature. The lack of correct configuration leads to recovery of the password reset link generated via the password reset functionality, and thus an unauthenticated attacker can set an arbitrary password for any user.
[]
CVE-2024-21253
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 2.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
[ "cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
GHSA-pxwq-x987-f52r
JetBrains YouTrack before 2021.4.36872 was vulnerable to stored XSS via a project icon.
[]
GHSA-953c-c526-jfh6
Stack-based buffer overflow in eZnet.exe, as used in eZ (a) eZphotoshare, (b) eZmeeting, (c) eZnetwork, and (d) eZshare allows remote attackers to cause a denial of service (crash) or execute arbitrary code, as demonstrated via (1) a long GET request and (2) a long operation or autologin parameter to SwEzModule.dll.
[]
GHSA-h9j4-m2pf-hmrh
Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API.
[]
CVE-2013-4302
(1) ApiBlock.php, (2) ApiCreateAccount.php, (3) ApiLogin.php, (4) ApiMain.php, (5) ApiQueryDeletedrevs.php, (6) ApiTokens.php, and (7) ApiUnblock.php in includes/api/ in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allow remote attackers to obtain CSRF tokens and bypass the cross-site request forgery (CSRF) protection mechanism via a JSONP request to wiki/api.php.
[ "cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.3:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.4:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.5:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.20.6:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:mediawiki:mediawiki:1.21.1:*:*:*:*:*:*:*" ]
GHSA-w7pr-r354-3wwp
Microsoft Excel Services on Microsoft SharePoint Server 2010 SP1 and SP2, Microsoft Excel Web Apps 2010 SP2, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps Server 2013 SP1 and Office Online Server allows remote attackers to perform cross-site scripting and run script with local user privileges via a crafted request, aka "Microsoft Office XSS Elevation of Privilege Vulnerability."
[]
GHSA-4gxq-mqgw-j2ww
In sprd_sysdump driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
[]
CVE-2013-1934
A cross-site scripting (XSS) vulnerability in the configuration report page (adm_config_report.php) in MantisBT 1.2.0rc1 before 1.2.14 allows remote authenticated users to inject arbitrary web script or HTML via a complex value.
[ "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:-:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
CVE-2021-43782
Indirect LDAP injection in Tuleap
Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. This is a follow up to GHSA-887w-pv2r-x8pm/CVE-2021-41276, the initial fix was incomplete. Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. The following versions contain the fix: Tuleap Community Edition 13.2.99.83, Tuleap Enterprise Edition 13.1-6, and Tuleap Enterprise Edition 13.2-4.
[ "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*" ]
CVE-2024-27411
drm/nouveau: keep DMA buffers required for suspend/resume
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: keep DMA buffers required for suspend/resume Nouveau deallocates a few buffers post GPU init which are required for GPU suspend/resume to function correctly. This is likely not as big an issue on systems where the NVGPU is the only GPU, but on multi-GPU set ups it leads to a regression where the kernel module errors and results in a system-wide rendering freeze. This commit addresses that regression by moving the two buffers required for suspend and resume to be deallocated at driver unload instead of post init.
[]
CVE-2025-1507
ShareThis Dashboard for Google Analytics <= 3.2.1 - Missing Authorization to Unauthenticated Feature Deactivation
The ShareThis Dashboard for Google Analytics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the handle_actions() function in all versions up to, and including, 3.2.1. This makes it possible for unauthenticated attackers to disable all features.
[]
GHSA-p8vh-p3hc-xm35
If an XML file is served with a Content Security Policy and the XML file includes an XSL stylesheet, the Content Security Policy will not be applied to the contents of the XSL stylesheet. If the XSL sheet e.g. includes JavaScript, it would bypass any of the restrictions of the Content Security Policy applied to the XML document. This vulnerability affects Firefox < 72.
[]
CVE-2020-24482
Improper buffer restrictions in firmware for Intel(R) 7360 Cell Modem before UDE version 9.4.370 may allow unauthenticated user to potentially enable denial of service via network access.
[ "cpe:2.3:o:intel:xmm_7360_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xmm_7360:-:*:*:*:*:*:*:*" ]
GHSA-7885-whv3-46f6
Codeastro Bus Ticket Booking System v1.0 is vulnerable to SQL injection via the kodetiket parameter in /BusTicket-CI/tiket/cekorder.
[]
CVE-2020-1959
A Server-Side Template Injection was identified in Apache Syncope prior to 2.1.6 enabling attackers to inject arbitrary Java EL expressions, leading to an unauthenticated Remote Code Execution (RCE) vulnerability. Apache Syncope uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, they support different types of interpolation, including Java EL expressions. Therefore, if an attacker can inject arbitrary data in the error message template being passed, they will be able to run arbitrary Java code.
[ "cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*" ]
GHSA-q9g4-9fx4-v533
Stored XSS vulnerability in Jenkins DotCi Plugin
DotCi Plugin 2.40.00 and earlier does not escape the GitHub user name parameter provided to commit notifications when displaying them in a build cause.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted commit notifications to the `/githook/` endpoint (see also [SECURITY-2867](https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2867)).This vulnerability is only exploitable in Jenkins 2.314 and earlier, LTS 2.303.1 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.303/#SECURITY-2452).
[]
CVE-2025-31830
WordPress Printus Plugin <= 1.2.6 - Broken Access Control vulnerability
Missing Authorization vulnerability in Uriahs Victor Printus allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Printus: from n/a through 1.2.6.
[]
GHSA-6hfm-rxpf-979r
A flaw in grub2 was found where its configuration file, known as grub.cfg, is being created with the wrong permission set allowing non privileged users to read its content. This represents a low severity confidentiality issue, as those users can eventually read any encrypted passwords present in grub.cfg. This flaw affects grub2 2.06 and previous versions. This issue has been fixed in grub upstream but no version with the fix is currently released.
[]
GHSA-g4q7-qpw3-v546
An issue was discovered in asn1c through v0.9.28. A NULL pointer dereference exists in the function _default_error_logger() located in asn1fix.c. It allows an attacker to cause Denial of Service.
[]
GHSA-h435-qr7v-xh34
Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
[]
GHSA-c9g7-6vjc-r2p5
Cross-site request forgery (CSRF) vulnerability in admin/index.php in 11in1 1.2.1 stable 12-31-2011 allows remote attackers to hijack the authentication of administrators for requests that add new topics via an addTopic action.
[]
CVE-2019-9886
eClass platform allows user to download arbitrary files without authentication
Any URLs with download_attachment.php under templates or home folders can allow arbitrary files downloaded without login in BroadLearning eClass before version ip.2.5.10.2.1.
[ "cpe:2.3:a:eclass:eclass_ip:*:*:*:*:*:*:*:*" ]
CVE-2014-0034
The SecurityTokenService (STS) in Apache CXF before 2.6.12 and 2.7.x before 2.7.9 does not properly validate SAML tokens when caching is enabled, which allows remote attackers to gain access via an invalid SAML token.
[ "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:2.7.8:*:*:*:*:*:*:*" ]
CVE-2017-6908
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (fID) passed to the "concrete5-legacy-master/web/concrete/tools/files/selector_data.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
[ "cpe:2.3:a:concrete5:concrete5:*:*:*:*:*:*:*:*" ]
GHSA-mprf-c48f-x8wf
Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
[]
CVE-2014-4203
Unspecified vulnerability in the Hyperion Enterprise Performance Management Architect component in Oracle Hyperion 11.1.2.2 and 11.1.2.3 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Property Editing.
[ "cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*" ]
GHSA-44c3-rvfv-fxw4
Cross-site scripting (XSS) vulnerability in Mantis before 1.1.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to the "Most active bugs" summary.
[]
GHSA-6mx7-79gg-f646
An issue was discovered in The Sleuth Kit (TSK) 4.6.6. There is an off-by-one overwrite due to an underflow on tools/hashtools/hfind.cpp while using a bogus hash table.
[]
CVE-2002-0315
fasttrack p2p, as used in (1) KaZaA, (2) grokster, and (3) morpheus allows remote attackers to spoof other users by modifying the username and network information in the message header.
[ "cpe:2.3:a:fasttrack:kazaa:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:fasttrack:kazaa:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:fasttrack:kazaa:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:fasttrack:kazaa:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:fasttrack:kazaa:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:grokster:grokster:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:grokster:grokster:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:music_city_networks:morpheus:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:music_city_networks:morpheus:1.3.3:*:*:*:*:*:*:*" ]
GHSA-qj8c-ppfc-qr5f
There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could delete some system files without user permission.
[]
CVE-2021-43105
A vulnerability in the bailiwick checking function in Technitium DNS Server <= v7.0 exists that allows specific malicious users to inject `NS` records of any domain (even TLDs) into the cache and conduct a DNS cache poisoning attack.
[ "cpe:2.3:a:technitium:dns_server:*:*:*:*:*:*:*:*" ]
GHSA-gpcx-wq44-fm7x
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka "Hyper-V Denial of Service Vulnerability." This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0074, CVE-2017-0076, and CVE-2017-0099.
[]
CVE-2019-16061
A number of files on the NETSAS Enigma NMS server 65.0.0 and prior are granted weak world-readable and world-writable permissions, allowing any low privileged user with access to the system to read sensitive data (e.g., .htpasswd) and create/modify/delete content (e.g., under /var/www/html/docs) within the operating system.
[ "cpe:2.3:a:netsas:enigma_network_management_solution:*:*:*:*:*:*:*:*" ]
CVE-2017-17818
In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer over-read that will cause a remote denial of service attack, related to a while loop in paste_tokens in asm/preproc.c.
[ "cpe:2.3:a:nasm:netwide_assembler:2.14:rc0:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" ]
GHSA-v5p8-3v95-73c8
A cross-site scripting (XSS) vulnerability has been reported to affect earlier versions of File Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 build 20210202 (and later) QTS 4.5.1.1456 build 20201015 (and later) QTS 4.3.6.1446 build 20200929 (and later) QTS 4.3.4.1463 build 20201006 (and later) QTS 4.3.3.1432 build 20201006 (and later) QTS 4.2.6 build 20210327 (and later) QuTS hero h4.5.1.1472 build 20201031 (and later) QuTScloud c4.5.4.1601 build 20210309 (and later) QuTScloud c4.5.3.1454 build 20201013 (and later)
[]
GHSA-gpmh-g94g-qrhr
Internal hidden fields are visible on to many associations in admin api
ImpactThe admin api has exposed some internal hidden fields when an association has been loaded with a to many referencePatchesWe recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview.https://www.shopware.com/en/download/#shopware-6WorkaroundsFor older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
[]
CVE-2018-0777
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0778, and CVE-2018-0781.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*" ]
CVE-2018-20876
cPanel before 74.0.8 allows self XSS in the Site Software Moderation interface (SEC-434).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
CVE-2020-27670
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.
[ "cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
CVE-2025-0050
Mali GPU Userspace Driver allows an Out-of-Bounds access
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to make valid GPU processing operations, including via WebGL or WebGPU, to access a limited amount outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r0p0 through r49p2, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r19p0 through r49p2, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p2, from r50p0 through r53p0.
[]
CVE-2025-24897
Misskey CSRF vulnerability due to insecure configuration of authentication cookie attributes
Misskey is an open source, federated social media platform. Starting in version 12.109.0 and prior to version 2025.2.0-alpha.0, due to a lack of CSRF protection and the lack of proper security attributes in the authentication cookies of Bull's dashboard, some of the APIs of bull-board may be subject to CSRF attacks. There is a risk of this vulnerability being used for attacks with relatively large impact on availability and integrity, such as the ability to add arbitrary jobs. This vulnerability was fixed in 2025.2.0-alpha.0. As a workaround, block all access to the `/queue` directory with a web application firewall (WAF).
[]
GHSA-fg8q-hggw-8hjr
A vulnerability classified as critical has been found in MINMAX. This affects an unknown part of the file /newsDia.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely.
[]
CVE-2017-5865
The password reset functionality in ownCloud Server before 8.1.11, 8.2.x before 8.2.9, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 sends different error messages depending on whether the username is valid, which allows remote attackers to enumerate user names via a large number of password reset attempts.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:8.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:8.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:8.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:8.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:9.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:9.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:9.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:9.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:9.1.2:*:*:*:*:*:*:*" ]
GHSA-7pvm-8xr9-7v7g
Out-of-bounds Read vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of13::MultipartRequestTableFeatures::unpack.This issue affects libfluid: 0.1.0.
[]
CVE-2023-50225
TP-Link TL-WR902AC dm_fillObjByStr Stack-based Buffer Overflow Remote Code Execution Vulnerability
TP-Link TL-WR902AC dm_fillObjByStr Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR902AC routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the libcmm.so module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-21819.
[ "cpe:2.3:o:tp-link:tl-wr902ac_firmware:-:*:*:*:*:*:*:*" ]
GHSA-9wm7-g493-2j99
Mozilla Firefox before 2.0.0.16, and 3.x before 3.0.1, interprets '|' (pipe) characters in a command-line URI as requests to open multiple tabs, which allows remote attackers to access chrome:i URIs, or read arbitrary local files via manipulations involving a series of URIs that is not entirely handled by a vector application, as exploited in conjunction with CVE-2008-2540. NOTE: this issue exists because of an insufficient fix for CVE-2005-2267.
[]
CVE-2007-4938
Heap-based buffer overflow in libmpdemux/aviheader.c in MPlayer 1.0rc1 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with certain large "indx truck size" and nEntriesInuse values, and a certain wLongsPerEntry value.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*", "cpe:2.3:o:hp:tru64:*:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:os2:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*", "cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86_64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*", "cpe:2.3:o:santa_cruz_operation:sco_unix:*:*:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "cpe:2.3:o:windriver:bsdos:*:*:*:*:*:*:*:*", "cpe:2.3:a:mplayer:mplayer:1.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*" ]
GHSA-767v-w2p6-p2g2
Cisco Adaptive Security Appliance (ASA) Software 9.1(.5) and earlier allows remote authenticated users to cause a denial of service (device reload) via crafted attributes in a RADIUS packet, aka Bug ID CSCun69561.
[]
GHSA-463c-jhp2-4mm7
The Backup Plus extension for TYPO3 (ns_backup) allows command injections
The ns_backup extension through 13.0.0 for TYPO3 allows command injection when creating a backup. An authenticated backend user with access to the extensions backend module is required to exploit the vulnerability.
[]
CVE-2007-3916
The main function in skkdic-expr.c in SKK Tools 1.2 allows local users to overwrite or delete arbitrary files via a symlink attack on a skkdic$PID temporary file.
[ "cpe:2.3:a:skk_openlab:skk_tools:1.2:*:*:*:*:*:*:*" ]
GHSA-mjx9-jg4x-jvv2
Internet Explorer 5.01 through 6 allows remote attackers to cause a denial of service (application crash) via Javascript in a web page that calls location.replace on itself, causing a loop.
[]
CVE-2011-4939
The pidgin_conv_chat_rename_user function in gtkconv.c in Pidgin before 2.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by changing a nickname while in an XMPP chat room.
[ "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*" ]