id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2022-36910
|
Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to reindex the database and to obtain information about jobs otherwise inaccessible to them.
|
[
"cpe:2.3:a:jenkins:lucene-search:*:*:*:*:*:jenkins:*:*"
] |
|
CVE-2016-6523
|
Multiple cross-site scripting (XSS) vulnerabilities in the media manager in Dotclear before 2.10 allow remote attackers to inject arbitrary web script or HTML via the (1) q or (2) link_type parameter to admin/media.php.
|
[
"cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-31742
|
WordPress Dima Take Action Plugin <= 1.0.5 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PixelDima Dima Take Action allows Stored XSS. This issue affects Dima Take Action: from n/a through 1.0.5.
|
[] |
CVE-2007-0365
|
Multiple cross-site scripting (XSS) vulnerabilities in All In One Control Panel (AIOCP) 1.3.009 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this is probably a different vulnerability than CVE-2006-5830.
|
[
"cpe:2.3:a:nicola_asuni:all_in_one_control_panel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nicola_asuni:all_in_one_control_panel:1.3.000:*:*:*:*:*:*:*",
"cpe:2.3:a:nicola_asuni:all_in_one_control_panel:1.3.001:*:*:*:*:*:*:*",
"cpe:2.3:a:nicola_asuni:all_in_one_control_panel:1.3.002:*:*:*:*:*:*:*",
"cpe:2.3:a:nicola_asuni:all_in_one_control_panel:1.3.003:*:*:*:*:*:*:*",
"cpe:2.3:a:nicola_asuni:all_in_one_control_panel:1.3.004:*:*:*:*:*:*:*",
"cpe:2.3:a:nicola_asuni:all_in_one_control_panel:1.3.005:*:*:*:*:*:*:*",
"cpe:2.3:a:nicola_asuni:all_in_one_control_panel:1.3.006:*:*:*:*:*:*:*",
"cpe:2.3:a:nicola_asuni:all_in_one_control_panel:1.3.007:*:*:*:*:*:*:*",
"cpe:2.3:a:nicola_asuni:all_in_one_control_panel:1.3.008:*:*:*:*:*:*:*"
] |
|
CVE-2011-0011
|
qemu-kvm before 0.11.0 disables VNC authentication when the password is cleared, which allows remote attackers to bypass authentication and establish VNC sessions.
|
[
"cpe:2.3:a:qemu:qemu:*:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*"
] |
|
CVE-2019-13489
|
Trape through 2019-05-08 has SQL injection via the data[2] variable in core/db.py, as demonstrated by the /bs t parameter.
|
[
"cpe:2.3:a:trape_project:trape:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-10415
|
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/index.php by adding a question mark (?) followed by the payload.
|
[
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-mhwp-x94h-mg49
|
A heap-buffer-overflow in pcf2bdf, versions >= 1.05 allows an attacker to trigger unsafe memory access via a specially crafted PCF font file. This out-of-bound read may lead to an application crash, information disclosure via program memory or other context-dependent impact.
|
[] |
|
CVE-2002-2279
|
Unspecified vulnerability in the bind function in config.inc of aldap 0.09 allows remote attackers to authenticate with Manager permissions.
|
[
"cpe:2.3:a:aldap:aldap:0.09:*:*:*:*:*:*:*"
] |
|
CVE-2018-4207
|
In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*"
] |
|
GHSA-4jh7-c2vv-7qf2
|
Websites directing users to long URLs that caused eliding to occur in the location view could leverage the truncating behavior to potentially trick users into thinking they were on a different webpage This vulnerability affects Focus < 138.
|
[] |
|
GHSA-j68c-36rf-74mv
|
Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect availability via unknown vectors related to Zones.
|
[] |
|
GHSA-975j-fq85-vmrj
|
Multiple cross-site scripting (XSS) vulnerabilities in Boesch SimpNews before 2.34.01 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) admin/index.php, (2) admin/pwlost.php, and unspecified other files. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
|
[] |
|
CVE-2019-1569
|
The Expedition Migration tool 1.1.8 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the User Mapping Settings for account name of admin user.
|
[
"cpe:2.3:a:paloaltonetworks:expedition:*:*:*:*:*:*:*:*"
] |
|
GHSA-r758-hjvg-hgjc
|
Sandboxie installer 5071703 has a DLL Hijacking or Unsafe DLL Loading Vulnerability via a Trojan horse dwmapi.dll or profapi.dll file in an AppData\Local\Temp directory.
|
[] |
|
GHSA-hxrj-xc7h-73qh
|
IBM Maximo Asset Management 7.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 173308.
|
[] |
|
CVE-2014-5972
|
The Loving - Couple Essential (aka com.xiaoenai.app) application 4.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:loving.fm:loving_-_couple_essential:4.0.1:*:*:*:*:android:*:*"
] |
|
GHSA-g3hg-wfhh-f63p
|
Adobe Media Encoder versions 13.1 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[] |
|
CVE-2023-36905
|
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
|
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4737:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4737:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4737:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4737:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.2295:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.2295:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.3324:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.3324:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.3324:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.2134:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.2134:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3324:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3324:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.3324:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20107:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20107:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.6167:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.6167:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6167:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
GHSA-4q3r-q67v-jf47
|
SmartStar Software CWS is a web-based integration platform, its file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service.
|
[] |
|
GHSA-fcm2-6c3h-pg6j
|
Node DOS by way of memory exhaustion through ExecSync request in CRI-O
|
DescriptionAn ExecSync request runs a command in a container and returns the output to the Kubelet. It is used for readiness and liveness probes within a pod. The way CRI-O runs ExecSync commands is through conmon. CRI-O asks conmon to start the process, and conmon writes the output to disk. CRI-O then reads the output and returns it to the Kubelet.If the output of the command is large enough, it is possible to exhaust the memory (or disk usage) of the node. The following deployment is an example yaml file that will output around 8GB of ‘A’ characters, which would be written to disk by conmon and read by CRI-O.ImpactIt is possible for the node to be exhausted of memory or disk space, depending on the node the command is being run on. What is further problematic is that the memory and disk usage aren't attributed to the container, as this file and its processing are implementation details of CRI-O. The consequence of the exhaustion is that other services on the node, e.g. other containers, will be unable to allocate memory and thus causing a denial of service.PatchesThis vulnerability will be fixed in 1.24.1, 1.23.3, 1.22.5, v1.21.8, v1.20.8, v1.19.7WorkaroundsAt the time of writing, no workaround exists other than ensuring only trusted images are used.Referenceshttps://github.com/containerd/containerd/security/advisories/GHSA-5ffw-gxpp-mxpfFor more informationIf you have any questions or comments about this advisory:Open an issue in [the CRI-O repo](http://github.com/cri-o/cri-o/issues)To make a report, email your vulnerability to the private
[[email protected]](mailto:[email protected]) list
with the security details and the details expected for [all CRI-O bug
reports](https://github.com/cri-o/cri-o/blob/main/.github/ISSUE_TEMPLATE/bug-report.yml).CreditsDisclosed by Ada Logics in a security audit sponsored by CNCF and facilitated by OSTIF.
|
[] |
CVE-2021-28951
|
An issue was discovered in fs/io_uring.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (deadlock) because exit may be waiting to park a SQPOLL thread, but concurrently that SQPOLL thread is waiting for a signal to start, aka CID-3ebba796fa25.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:fas_500f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:fas_500f:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*"
] |
|
GHSA-p58j-6622-5r54
|
IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] |
|
GHSA-3xjc-mrjc-p932
|
Stack-based buffer overflow in the IMAP service in SurgeMail 38k allows remote authenticated users to execute arbitrary code via a long argument to the SEARCH command. NOTE: this might overlap CVE-2007-4372.
|
[] |
|
CVE-2016-9199
|
A vulnerability in the Cisco application-hosting framework (CAF) of Cisco IOx could allow an authenticated, remote attacker to read arbitrary files on a targeted system. Affected Products: This vulnerability affects specific releases of the Cisco IOx subsystem of Cisco IOS and IOS XE Software. More Information: CSCvb23331. Known Affected Releases: 15.2(6.0.57i)E CAF-1.1.0.0.
|
[
"cpe:2.3:a:cisco:iox:1.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-6ww3-v82p-jv78
|
An attacker with physical access to the Kantech Gen1 ioSmart card reader with firmware version prior to 1.7.2 in certain circumstances can recover the reader's communication memory between the card and reader.
|
[] |
|
CVE-2024-2604
|
SourceCodester File Manager App update-file.php unrestricted upload
|
A vulnerability was found in SourceCodester File Manager App 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /endpoint/update-file.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257182 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:sourcecodester:file_management_app:1.0:*:*:*:*:*:*:*"
] |
CVE-2022-33641
|
Azure Site Recovery Elevation of Privilege Vulnerability
|
Azure Site Recovery Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:azure_site_recovery_vmware_to_azure:*:*:*:*:*:*:*:*"
] |
CVE-2022-4812
|
Authorization Bypass Through User-Controlled Key in usememos/memos
|
Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1.
|
[
"cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*"
] |
CVE-2024-10638
|
Product Labels For Woocommerce < 1.5.11 - Admin+ SQLi
|
The Product Labels For Woocommerce (Sale Badges) WordPress plugin before 1.5.11 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
|
[] |
GHSA-f82m-w3p3-cgp3
|
OpenStack Identity Keystone Improper Access Control
|
The Fernet Token Provider in OpenStack Identity (Keystone) 9.0.x before 9.0.1 (mitaka) allows remote authenticated users to prevent revocation of a chain of tokens and bypass intended access restrictions by rescoping a token.
|
[] |
CVE-2010-4369
|
Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory.
|
[
"cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.4_1:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.4_1:sarge1:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.5_1:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.5_1.857:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:awstats:awstats:6.9:*:*:*:*:*:*:*"
] |
|
GHSA-6j6p-p8wc-9jpp
|
The Resource Timing API incorrectly revealed navigations in cross-origin iframes. This is a same-origin policy violation and could allow for data theft of URLs loaded by users. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
|
[] |
|
CVE-2021-1372
|
Cisco Webex Meetings Desktop App and Webex Productivity Tools for Windows Shared Memory Information Disclosure Vulnerability
|
A vulnerability in Cisco Webex Meetings Desktop App and Webex Productivity Tools for Windows could allow an authenticated, local attacker to gain access to sensitive information on an affected system. This vulnerability is due to the unsafe usage of shared memory by the affected software. An attacker with permissions to view system memory could exploit this vulnerability by running an application on the local system that is designed to read shared memory. A successful exploit could allow the attacker to retrieve sensitive information from the shared memory, including usernames, meeting information, or authentication tokens. Note: To exploit this vulnerability, an attacker must have valid credentials on a Microsoft Windows end-user system and must log in after another user has already authenticated with Webex on the same end-user system.
|
[
"cpe:2.3:a:cisco:webex_meetings:*:*:*:*:slow_channel:*:*:*",
"cpe:2.3:a:cisco:webex_meetings:*:*:*:*:latest_channel:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3_security_patch3:*:*:*:*:*:*"
] |
CVE-2019-19228
|
Fronius Solar Inverter devices before 3.14.1 (HM 1.12.1) allow attackers to bypass authentication because the password for the today account is stored in the /tmp/web_users.conf file.
|
[
"cpe:2.3:o:fronius:datamanager_box_2.0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:datamanager_box_2.0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:eco_25.0-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:eco_25.0-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:eco_27.0-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:eco_27.0-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_1.5-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_1.5-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_1.5-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_1.5-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.5-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.5-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_2.5-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_2.5-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_3.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_3.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_3.1-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_3.1-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:galvo_3.1-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:galvo_3.1-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_10.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_10.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_11.4-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_11.4-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_12.5-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_12.5-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_15.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_15.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.5-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.5-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.6-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.6-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_3.8-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_3.8-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_4.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_4.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_4.6-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_4.6-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_aus_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1_aus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_5.0-1_sc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_5.0-1_sc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_6.0-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_6.0-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_6.0-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_6.0-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_7.6-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_7.6-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_8.2-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_8.2-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:primo_8.2-1_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:primo_8.2-1_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3-m-os_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3-m-os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_10.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_10.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_12.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_12.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_12.5-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_12.5-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_12.5-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_12.5-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_15.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_15.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_15.0-3_107_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_15.0-3_107:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_15.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_15.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_17.5-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_17.5-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_17.5-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_17.5-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_20.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_20.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_20.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_20.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_22.7-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_22.7-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_24.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_24.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.0-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.0-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.7-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.7-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_3.7-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_3.7-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_4.5-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_4.5-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_4.5-3-s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_4.5-3-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_5.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_5.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_6.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_6.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_7.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_7.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_8.2-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_8.2-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_10.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_10.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_12.0-3_208-240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_12.0-3_208-240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_15.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_15.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_20.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_20.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_22.7-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_22.7-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_advanced_24.0-3_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_advanced_24.0-3_480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_hybrid_3.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_hybrid_3.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_hybrid_4.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_hybrid_4.0-3-m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fronius:symo_hybrid_5.0-3-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fronius:symo_hybrid_5.0-3-m:-:*:*:*:*:*:*:*"
] |
|
CVE-2010-1892
|
The TCP/IP stack in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly handle malformed IPv6 packets, which allows remote attackers to cause a denial of service (system hang) via multiple crafted packets, aka "IPv6 Memory Corruption Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] |
|
CVE-2024-42170
|
HCL MyXalytics is affected by a session fixation vulnerability
|
HCL MyXalytics is affected by a session fixation vulnerability. Cyber-criminals can exploit this by sending crafted URLs with a session token to access the victim's login session.
|
[] |
CVE-2021-47370
|
mptcp: ensure tx skbs always have the MPTCP ext
|
In the Linux kernel, the following vulnerability has been resolved:
mptcp: ensure tx skbs always have the MPTCP ext
Due to signed/unsigned comparison, the expression:
info->size_goal - skb->len > 0
evaluates to true when the size goal is smaller than the
skb size. That results in lack of tx cache refill, so that
the skb allocated by the core TCP code lacks the required
MPTCP skb extensions.
Due to the above, syzbot is able to trigger the following WARN_ON():
WARNING: CPU: 1 PID: 810 at net/mptcp/protocol.c:1366 mptcp_sendmsg_frag+0x1362/0x1bc0 net/mptcp/protocol.c:1366
Modules linked in:
CPU: 1 PID: 810 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:mptcp_sendmsg_frag+0x1362/0x1bc0 net/mptcp/protocol.c:1366
Code: ff 4c 8b 74 24 50 48 8b 5c 24 58 e9 0f fb ff ff e8 13 44 8b f8 4c 89 e7 45 31 ed e8 98 57 2e fe e9 81 f4 ff ff e8 fe 43 8b f8 <0f> 0b 41 bd ea ff ff ff e9 6f f4 ff ff 4c 89 e7 e8 b9 8e d2 f8 e9
RSP: 0018:ffffc9000531f6a0 EFLAGS: 00010216
RAX: 000000000000697f RBX: 0000000000000000 RCX: ffffc90012107000
RDX: 0000000000040000 RSI: ffffffff88eac9e2 RDI: 0000000000000003
RBP: ffff888078b15780 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff88eac017 R11: 0000000000000000 R12: ffff88801de0a280
R13: 0000000000006b58 R14: ffff888066278280 R15: ffff88803c2fe9c0
FS: 00007fd9f866e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007faebcb2f718 CR3: 00000000267cb000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__mptcp_push_pending+0x1fb/0x6b0 net/mptcp/protocol.c:1547
mptcp_release_cb+0xfe/0x210 net/mptcp/protocol.c:3003
release_sock+0xb4/0x1b0 net/core/sock.c:3206
sk_stream_wait_memory+0x604/0xed0 net/core/stream.c:145
mptcp_sendmsg+0xc39/0x1bc0 net/mptcp/protocol.c:1749
inet6_sendmsg+0x99/0xe0 net/ipv6/af_inet6.c:643
sock_sendmsg_nosec net/socket.c:704 [inline]
sock_sendmsg+0xcf/0x120 net/socket.c:724
sock_write_iter+0x2a0/0x3e0 net/socket.c:1057
call_write_iter include/linux/fs.h:2163 [inline]
new_sync_write+0x40b/0x640 fs/read_write.c:507
vfs_write+0x7cf/0xae0 fs/read_write.c:594
ksys_write+0x1ee/0x250 fs/read_write.c:647
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd9f866e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665f9
RDX: 00000000000e7b78 RSI: 0000000020000000 RDI: 0000000000000003
RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038
R13: 0000000000a9fb1f R14: 00007fd9f866e300 R15: 0000000000022000
Fix the issue rewriting the relevant expression to avoid
sign-related problems - note: size_goal is always >= 0.
Additionally, ensure that the skb in the tx cache always carries
the relevant extension.
|
[] |
GHSA-r934-wgxg-jx75
|
SQL injection vulnerability in the Diocese of Portsmouth Calendar (pd_calendar) extension 0.4.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors, a different issue than CVE-2008-6691.
|
[] |
|
CVE-2024-50631
|
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in the system syncing daemon in Synology Drive Server before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085 and 3.5.1-26102 allows remote attackers to inject SQL commands, limited to write operations, via unspecified vectors.
|
[] |
|
CVE-2024-13056
|
Dyn Business Panel <= 1.0.0 - Reflected XSS
|
The Dyn Business Panel WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
[] |
GHSA-532g-fpxj-7pxx
|
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1543-1 (All versions), SINAMICS S210 (6SL5...) (All versions >= V6.1 < V6.1 HF2), SIPLUS NET CP 1543-1 (All versions). The webserver implementation of the affected products does not correctly release allocated memory after it has been used.An attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product.
|
[] |
|
CVE-2019-20471
|
An issue was discovered on TK-Star Q90 Junior GPS horloge 3.1042.9.8656 devices. When using the device at initial setup, a default password is used (123456) for administrative purposes. There is no prompt to change this password. Note that this password can be used in combination with CVE-2019-20470.
|
[
"cpe:2.3:o:tk-star:q90_junior_gps_horloge_firmware:3.1042.9.8656:*:*:*:*:*:*:*",
"cpe:2.3:h:tk-star:q90_junior_gps_horloge:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-45884
|
DrayTek Vigor3900 1.5.1.3 contains a post-authentication command injection vulnerability. This vulnerability occurs when the `action` parameter in `cgi-bin/mainfunction.cgi` is set to `setSWMGroup.`
|
[
"cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-3964
|
Authorization Bypass Through User-Controlled Key in elgg/elgg
|
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
|
[
"cpe:2.3:a:elgg:elgg:*:*:*:*:*:*:*:*"
] |
CVE-2019-1821
|
Cisco Prime Infrastructure and Evolved Programmable Network Manager Remote Code Execution Vulnerabilities
|
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
|
[
"cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:network_level_service:3.0\\(0.0.83b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*"
] |
CVE-2019-9028
|
An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a stack-based buffer over-read in the function InflateDimensions() in inflate.c when called from ReadNextCell in mat5.c.
|
[
"cpe:2.3:a:matio_project:matio:1.5.13:*:*:*:*:*:*:*"
] |
|
GHSA-74mw-mv5r-fgg8
|
IBM Maximo Asset Management 7.1, 7.5, and 7.6 could allow a remote attacker to include arbitrary files. A remote attacker could send a specially-crafted URL request, which could allow the attacker to execute arbitrary code on the vulnerable server. IBM X-Force ID: 120252.
|
[] |
|
GHSA-4855-75hx-mc35
|
Missing Authorization vulnerability in Save as PDF plugin by Pdfcrowd Word Replacer Pro.This issue affects Word Replacer Pro: from n/a through 1.0.
|
[] |
|
GHSA-x7wg-2f27-pc97
|
A DLL hijacking vulnerability in the B. Braun OnlineSuite Version AP 3.0 and earlier allows local attackers to execute code on the system as a high privileged user.
|
[] |
|
GHSA-w4mc-h5r4-jp4g
|
Missing Authorization vulnerability in VIICTORY MEDIA LLC Z Y N I T H allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Z Y N I T H: from n/a through 7.4.9.
|
[] |
|
GHSA-36wj-23jx-jgg5
|
Huawei Enjoy 5s and Y6 Pro smartphones with software the versions before TAG-AL00C92B170; the versions before TIT-L01C576B121 have an information leak vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious application on the smart phone and the application can read some sensitive information in kernel memory which may cause sensitive information leak.
|
[] |
|
GHSA-vhq6-x2hv-fhjv
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ICONICS/Mitsubishi Electric GENESIS64 versions 10.96 to 10.97.2 allows an unauthenticated attacker to create, tamper with or destroy arbitrary files by getting a legitimate user import a project package file crafted by the attacker.
|
[] |
|
GHSA-mqfw-gg2g-9qc5
|
The Blue Admin WordPress plugin through 21.06.01 does not sanitise or escape its "Logo Title" setting before outputting in a page, leading to a Stored Cross-Site Scripting issue. Furthermore, the plugin does not have CSRF check in place when saving its settings, allowing the issue to be exploited via a CSRF attack.
|
[] |
|
GHSA-hgv8-rr8f-4q2r
|
An issue was discovered in Acronis True Image 2020 24.5.22510. anti_ransomware_service.exe includes functionality to quarantine files by copying a suspected ransomware file from one directory to another using SYSTEM privileges. Because unprivileged users have write permissions in the quarantine folder, it is possible to control this privileged write with a hardlink. This means that an unprivileged user can write/overwrite arbitrary files in arbitrary folders. Escalating privileges to SYSTEM is trivial with arbitrary writes. While the quarantine feature is not enabled by default, it can be forced to copy the file to the quarantine by communicating with anti_ransomware_service.exe through its REST API.
|
[] |
|
GHSA-6f22-c225-fcxm
|
Three os command injection vulnerabilities exist in the boa formWsc functionality of Realtek rtl819x Jungle SDK v3.4.11. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `localPin` request's parameter.
|
[] |
|
CVE-2024-10195
|
Tecno 4G Portable WiFi TR118 SMS Check goform_get_cmd_process sql injection
|
A vulnerability was found in Tecno 4G Portable WiFi TR118 V008-20220830. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /goform/goform_get_cmd_process of the component SMS Check. The manipulation of the argument order_by leads to sql injection. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:tecno-mobile:4g_portable_wifi_tr118_firmware:v008-20220830:*:*:*:*:*:*:*",
"cpe:2.3:h:tecno-mobile:4g_portable_wifi_tr118:-:*:*:*:*:*:*:*"
] |
CVE-2018-6201
|
In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020E0 or 0x830020E4.
|
[
"cpe:2.3:a:escanav:anti-virus:14.0.1400.2029:*:*:*:*:*:*:*"
] |
|
CVE-2023-47314
|
Headwind MDM Web panel 5.22.1 is vulnerable to cross-site scripting (XSS). The file upload function allows APK and arbitrary files to be uploaded. By exploiting this issue, attackers may upload HTML files and share the download URL pointing to these files with the victims. As the file download function returns the file in inline mode, the victim’s browser will immediately render the content of the HTML file as a web page. As a result, the uploaded client-side code will be evaluated and executed in the victim’s browser, allowing attackers to perform common XSS attacks.
|
[
"cpe:2.3:a:h-mdm:headwind_mdm:5.22.1:*:*:*:*:*:*:*"
] |
|
CVE-2020-15004
|
OX App Suite through 7.10.3 allows stats/diagnostic?param= XSS.
|
[
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:open-xchange_appsuite:7.10.3:*:*:*:*:*:*:*"
] |
|
GHSA-65xq-gc4r-fmm7
|
NETGEAR FVS318 running firmware 1.1 stores the username and password in a readable format when a backup of the configuration file is made, which allows local users to obtain sensitive information.
|
[] |
|
GHSA-4j36-wmcj-5q44
|
SQL injection vulnerability in WordPress 1.5.2, and possibly other versions before 2.0, allows remote attackers to execute arbitrary SQL commands via the User-Agent field in an HTTP header for a comment.
|
[] |
|
CVE-2022-31026
|
Use of Uninitialized Variable in trilogy
|
Trilogy is a client library for MySQL. When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory. Users of the trilogy gem should upgrade to version 2.1.1 This issue can be avoided by only connecting to trusted servers.
|
[
"cpe:2.3:a:trilogy_project:trilogy:*:*:*:*:*:ruby:*:*"
] |
GHSA-gcmg-m9m3-j5jw
|
Adobe Experience Manager version 6.5.9.0 (and earlier) are affected by an improper access control vulnerability that leads to a security feature bypass. By manipulating referer headers, an unauthenticated attacker could gain access to arbitrary pages that they are not authorized to access.
|
[] |
|
CVE-2018-7202
|
An issue was discovered in ProjectSend before r1053. XSS exists in the "Name" field on the My Account page.
|
[
"cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*"
] |
|
GHSA-r277-jrfv-qvwr
|
A vulnerability classified as problematic was found in BestWebSoft Job Board Plugin 1.0.0 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.0.1 is able to address this issue. The name of the patch is dbb71deee071422ce3e663fbcdce3ad24886f940. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227764.
|
[] |
|
CVE-2020-19802
|
File Upload vulnerability found in Milken DoyoCMS v.2.3 allows a remote attacker to execute arbitrary code via the upload file type parameter.
|
[
"cpe:2.3:a:doyocms_project:doyocms:2.3:-:*:*:*:*:*:*"
] |
|
GHSA-vwch-g97w-hfg2
|
CubeFS leaks users key in logs
|
CubeFS was found to leak users secret keys and access keys in the logs in multiple components. When CubeCS creates new users, it leaks the users secret key. This could allow a lower-privileged user with access to the logs to retrieve sensitive information and impersonate other users with higher privileges than themselves.There is no evidence of this vulnerability being exploited in the wild. It was found during an ongoing security audit carried out by [Ada Logics](https://adalogics.com/) in collaboration with [OSTIF](https://ostif.org/) and the [CNCF](https://www.cncf.io/).The issue has been patched in v3.3.1. There is no other mitigation than upgrading CubeFS.
|
[] |
CVE-2019-7225
|
The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool "Panel Builder 600" to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components.
|
[
"cpe:2.3:o:abb:cp620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp620-web_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp620-web:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp630_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp630-web_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp630-web:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp635_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp635:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp635-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp635-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp635-web_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp635-web:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:pb610_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:pb610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp651-web_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp651-web:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp661_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp661:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp661-web_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp661-web:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp665_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp665-web_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp665-web:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp676_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp676:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp676-web_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp676-web:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:cp651_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:cp651:-:*:*:*:*:*:*:*"
] |
|
GHSA-cw49-h9r2-pr6m
|
Unspecified vulnerability in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via a crafted image description atom in a movie file, related to "memory corruption."
|
[] |
|
GHSA-cm3q-5m4g-jqqx
|
A Remote Code Execution vulnerability in all versions of HPE LoadRunner and Performance Center was found.
|
[] |
|
GHSA-gxcv-w2wp-7xvm
|
The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.
|
[] |
|
CVE-2025-32547
|
WordPress All push notification for WP Plugin <= 1.5.3 - CSRF to SQL Injection vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in gtlwpdev All push notification for WP allows Blind SQL Injection. This issue affects All push notification for WP: from n/a through 1.5.3.
|
[] |
CVE-2024-11036
|
GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress <= 7.1.5 - Unauthenticated Arbitrary Shortcode Execution via gamipress_get_user_earnings
|
The The GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via gamipress_get_user_earnings AJAX action in all versions up to, and including, 7.1.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
|
[
"cpe:2.3:a:gamipress:gamipress:-:*:*:*:*:wordpress:*:*"
] |
CVE-2006-2157
|
SQL injection vulnerability in gallery.php in Plogger Beta 2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter, when the level is set to "slideshow". NOTE: This is a different vulnerability than CVE-2005-4246.
|
[
"cpe:2.3:a:plogger:plogger:2.1:beta:*:*:*:*:*:*"
] |
|
GHSA-wv3w-qq6q-g9j3
|
A cross-site scripting (xss) vulnerability exists in the functiongetOpenGraph videoName functionality of WWBN AVideo 11.6 and dev master commit 3c6bb3ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
|
[] |
|
CVE-2023-40274
|
An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the "zola serve" command, allows directory traversal. The handle_request function, used by the server to process HTTP requests, does not account for sequences of special path control characters (../) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem.
|
[
"cpe:2.3:a:getzola:zola:*:*:*:*:*:*:*:*"
] |
|
GHSA-7gp7-q625-569q
|
Cross-site scripting (XSS) vulnerability in NOCC 0.9 through 0.9.5 allows remote attackers to inject arbitrary web script or HTML via email messages.
|
[] |
|
CVE-2016-3071
|
Libreswan 3.16 might allow remote attackers to cause a denial of service (daemon restart) via an IKEv2 aes_xcbc transform.
|
[
"cpe:2.3:a:libreswan:libreswan:3.16:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*"
] |
|
GHSA-3p7g-wrgg-wq45
|
GraphQL queries can expose password hashes
|
ImpactUnauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically but not necessarily limited to administrators and editors.PatchesAffected versions: Ibexa DXP v3.3.\*, v4.2.\*, eZ Platform v2.5.\*
Resolving versions: Ibexa DXP v3.3.28, v4.2.3, eZ Platform v2.5.31WorkaroundsRemove the "passwordHash" entry from "src/bundle/Resources/config/graphql/User.types.yaml" in the GraphQL package, and other properties like hash type, email, login if you prefer.ReferencesThis issue was reported to us by Philippe Tranca ("trancap") of the company Lexfo. We are very grateful for their research, and responsible disclosure to us of this critical vulnerability.For more informationIf you have any questions or comments about this advisory, please contact Support via your service portal.
|
[] |
GHSA-99g2-72rh-xfmr
|
Certain General Electric Renewable Energy products download firmware without an integrity check. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6.
|
[] |
|
CVE-2007-0100
|
The Perforce client does not restrict the set of files that it overwrites upon receiving a request from the server, which allows remote attackers to overwrite arbitrary files by modifying the client config file on the server, or by operating a malicious server.
|
[
"cpe:2.3:a:perforce:perforce_client:*:*:*:*:*:*:*:*"
] |
|
GHSA-6x75-vwp5-q242
|
ForgeRock AM server 6.x before 7, and OpenAM 14.6.3, has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/Version request to the server. The vulnerability exists due to incorrect usage of Sun ONE Application Framework (JATO).
|
[] |
|
CVE-2025-1703
|
Ultimate Blocks <= 3.2.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via content Parameter
|
The Ultimate Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘content’ parameter in all versions up to, and including, 3.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
GHSA-8g9j-vp2c-mg7r
|
The AP4_FtypAtom class in Core/Ap4FtypAtom.cpp in Bento4 1.5.1.0 has an Infinite loop via a crafted MP4 file that triggers size mishandling.
|
[] |
|
GHSA-wvwp-cgr6-m5rx
|
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
|
[] |
|
CVE-2021-45927
|
MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0x7ffd6e029ee0) in mdb_numeric_to_string (called from mdb_xfer_bound_data and _mdb_attempt_bind).
|
[
"cpe:2.3:a:mdbtools_project:mdbtools:0.9.2:*:*:*:*:*:*:*"
] |
|
GHSA-rxmj-hg9v-vp3p
|
Uncontrolled Resource Consumption in LengthPrefixedMessageReader
|
ImpactAffected gRPC Swift clients and servers are vulnerable to uncontrolled resource consumption attacks. Excessive memory may be allocated when parsing messages. This can lead to a denial of service.PatchesThe problem has been fixed in 1.2.0.WorkaroundsNo workaround is available. Users must upgrade.
|
[] |
GHSA-3h2h-fwxh-x5w9
|
Cross-site scripting (XSS) vulnerability in Outlook Web Access in Microsoft Exchange Server 2010 SP2 and SP3 and 2013 Cumulative Update 2 and 3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "OWA XSS Vulnerability."
|
[] |
|
GHSA-gqrp-9mp9-2rf6
|
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS by memory leak.
|
[] |
|
CVE-2013-4024
|
IBM Data Studio Web Console 3.x before 3.2, Optim Performance Manager 5.x before 5.2, InfoSphere Optim Configuration Manager 2.x before 2.2, and DB2 Recovery Expert 2.x support HTTP access to the Web Console, which allows remote attackers to read session cookies by sniffing the network.
|
[
"cpe:2.3:a:ibm:data_studio_web_console:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2_recovery_expert:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_optim_configuration_manager:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_optim_configuration_manager:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:optim_performance_manager:5.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-44026
|
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.
|
[
"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-4337
|
Multiple buffer overflows in the httplib_parse_sc_header function in lib/http.c in Streamripper before 1.62.2 allow remote attackers to execute arbitrary code via long (1) Location and (2) Server HTTP headers, a different vulnerability than CVE-2006-3124.
|
[
"cpe:2.3:a:streamripper:streamripper:1.61.1:*:*:*:*:*:*:*",
"cpe:2.3:a:streamripper:streamripper:1.61.17:*:*:*:*:*:*:*",
"cpe:2.3:a:streamripper:streamripper:1.61.24:*:*:*:*:*:*:*",
"cpe:2.3:a:streamripper:streamripper:1.61.25:*:*:*:*:*:*:*",
"cpe:2.3:a:streamripper:streamripper:1.61.26:*:*:*:*:*:*:*",
"cpe:2.3:a:streamripper:streamripper:1.62:*:*:*:*:*:*:*"
] |
|
GHSA-3m4m-v7p2-vg4g
|
Splashin iOS v2.0 fails to enforce server-side interval restrictions for location updates for free-tier users.
|
[] |
|
CVE-2025-29100
|
Tenda AC8 V16.03.34.06 is vulnerable to Buffer Overflow in the fromSetRouteStatic function via the parameter list.
|
[] |
|
GHSA-f4x5-7cjq-vgcr
|
Bugzilla 2.23.3 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 allows remote attackers to determine the existence of private group names via a crafted parameter during (1) bug creation or (2) bug editing.
|
[] |
|
CVE-2016-3775
|
The kernel filesystem implementation in Android before 2016-07-05 on Nexus 5X, Nexus 6, Nexus 6P, Nexus Player, and Pixel C devices allows attackers to gain privileges via a crafted application, aka internal bug 28588279.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
GHSA-35wj-3f68-9hrj
|
Cerberus Helpdesk before 4.0 (Build 600) allows remote attackers to obtain sensitive information via direct requests for "controllers ... that aren't standard helpdesk pages," possibly involving the (1) /display and (2) /kb URIs.
|
[] |
|
CVE-2025-46532
|
WordPress Tooltip <= 1.0.1 - Cross Site Scripting (XSS) Vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Haris Zulfiqar Tooltip allows DOM-Based XSS. This issue affects Tooltip: from n/a through 1.0.1.
|
[] |
CVE-2023-43769
|
An issue was discovered in Couchbase Server through 7.1.4 before 7.1.5 and before 7.2.1. There are Unauthenticated RMI Service Ports Exposed in Analytics.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.