id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2013-5563 | Cross-site scripting (XSS) vulnerability in Query/NewQueryResult.jsp in Cisco Security Monitoring, Analysis and Response System (CS-MARS) allows remote attackers to inject arbitrary web script or HTML via the isnowLatency parameter, aka Bug ID CSCul16173. | [
"cpe:2.3:h:cisco:security_monitoring_analysis_and_response_system:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-1209 | The Ultimate Member plugin for WordPress is vulnerable to arbitrary redirects due to insufficient validation on supplied URLs in the social fields of the Profile Page, which makes it possible for attackers to redirect unsuspecting victims in versions up to, and including, 2.3.1. | [
"cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2020-29385 | GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way. | [
"cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] |
|
GHSA-8jxr-wrhj-f7f8 | DCME-320 <=7.4.12.90, DCME-520 <=9.25.5.11, DCME-320-L <=9.3.5.26, and DCME-720 <=9.1.5.11 are vulnerable to Remote Code Execution via /function/audit/newstatistics/mon_stat_hist.php. | [] |
|
CVE-2012-0623 | WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
] |
|
CVE-2009-4392 | SQL injection vulnerability in the XDS Staff List (xds_staff) extension 0.0.3 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:typo3:xds_staff:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] |
|
GHSA-c7q4-9h6h-g94j | PrestaShop jmspagebuilder 3.x is vulnerable to SQL Injection via ajax_jmspagebuilder.php. | [] |
|
GHSA-3hrw-324r-f9xj | Telegram before 7.4 (212543) Stable on macOS stores the local passcode in cleartext, leading to information disclosure. | [] |
|
GHSA-pmc3-p9hx-jq96 | uTLS ServerHellos are accepted without checking TLS 1.3 downgrade canaries | DescriptionBefore version 1.7.0, utls did not implement the TLS 1.3 downgrade protection mechanism specified in RFC 8446 Section 4.1.3 when using a utls ClientHello spec. This allowed an active network adversary to downgrade TLS 1.3 connections initiated by a utls client to a lower TLS version (e.g., TLS 1.2) by modifying the ClientHello message to exclude the SupportedVersions extension, causing the server to respond with a TLS 1.2 ServerHello (along with a downgrade canary in the ServerHello random field). Because utls did not check the downgrade canary in the ServerHello random field, clients would accept the downgraded connection without detecting the attack. This attack could also be used by an active network attacker to fingerprint utls connections.Fix Commit or Pull Requestrefraction-networking/utls#337, specifically refraction-networking/utls@f8892761e2a4d29054264651d3a86fda83bc83f9Referenceshttps://github.com/refraction-networking/utls/issues/181 | [] |
CVE-2022-21592 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.7.39 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] |
|
GHSA-f8h9-v582-wc52 | A buffer overflow vulnerability in Formats!ReadRAS_W+0x1001 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file. | [] |
|
GHSA-hm9p-f2cp-2w64 | jpress v 4.2.0 is vulnerable to RCE via io.jpress.module.product.ProductNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code. | [] |
|
CVE-2025-2641 | PHPGurukul Art Gallery Management System edit-artist-detail.php sql injection | A vulnerability, which was classified as critical, has been found in PHPGurukul Art Gallery Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/edit-artist-detail.php?editid=1. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
CVE-2021-23954 | Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
GHSA-qxq5-575v-fj9w | fileshare.cmd on Telus Actiontec T2200H T2200H-31.128L.03 devices allows OS Command Injection via shell metacharacters in the smbdUserid or smbdPasswd field. | [] |
|
CVE-2008-2436 | Multiple heap-based buffer overflows in the IppCreateServerRef function in nipplib.dll in Novell iPrint Client 4.x before 4.38 and 5.x before 5.08 allow remote attackers to execute arbitrary code via a long argument to the (1) GetPrinterURLList, (2) GetPrinterURLList2, or (3) GetFileList2 function in the Novell iPrint ActiveX control in ienipp.ocx. | [
"cpe:2.3:a:novell:iprint_client:4.26:*:windows:*:*:*:*:*",
"cpe:2.3:a:novell:iprint_client:4.32:*:windows:*:*:*:*:*",
"cpe:2.3:a:novell:iprint_client:4.35:*:windows:*:*:*:*:*",
"cpe:2.3:a:novell:iprint_client:4.36:*:windows:*:*:*:*:*",
"cpe:2.3:a:novell:iprint_client:5.06:*:vista:*:*:*:*:*"
] |
|
GHSA-g7j7-h4q8-8w2f | Rancher API and cluster.management.cattle.io object vulnerable to plaintext storage and exposure of credentials | ImpactAn issue was discovered in Rancher versions up to and including 2.5.15 and 2.6.6 where sensitive fields, like passwords, API keys and Rancher's service account token (used to provision clusters), were stored in plaintext directly on Kubernetes objects like `Clusters`, for example `cluster.management.cattle.io`. Anyone with read access to those objects in the Kubernetes API could retrieve the plaintext version of those sensitive data.The exposed credentials are visible in Rancher to authenticated `Cluster Owners`, `Cluster Members`, `Project Owners`, `Project Members` and `User Base` on the endpoints:`/v1/management.cattle.io.catalogs``/v1/management.cattle.io.cluster``/v1/management.cattle.io.clustertemplates``/v1/management.cattle.io.notifiers``/v1/project.cattle.io.sourcecodeproviderconfig``/k8s/clusters/local/apis/management.cattle.io/v3/catalogs``/k8s/clusters/local/apis/management.cattle.io/v3/clusters``/k8s/clusters/local/apis/management.cattle.io/v3/clustertemplates``/k8s/clusters/local/apis/management.cattle.io/v3/notifiers``/k8s/clusters/local/apis/project.cattle.io/v3/sourcecodeproviderconfigs`Sensitive fields are now stripped from `Clusters` and other objects and moved to a `Secret` before the object is stored. The `Secret` is retrieved when the credential is needed. For objects that existed before this security fix, a one-time migration happens on startup.**Important:**The exposure of Rancher's `serviceAccountToken` allows any standard user to escalate its privileges to cluster administrator in Rancher.For the exposure of credentials not related to Rancher, the final impact severity for confidentiality, integrity and availability is dependent on the permissions that the leaked credentials have on their own services.The fields that have been addressed by this security fix are:`Notifier.SMTPConfig.Password``Notifier.WechatConfig.Secret``Notifier.DingtalkConfig.Secret``Catalog.Spec.Password``SourceCodeProviderConfig.GithubPipelineConfig.ClientSecret``SourceCodeProviderConfig.GitlabPipelineConfig.ClientSecret``SourceCodeProviderConfig.BitbucketCloudPipelineConfig.ClientSecret``SourceCodeProviderConfig.BitbucketServerPipelineConfig.PrivateKey``Cluster.Spec.RancherKubernetesEngineConfig.BackupConfig.S3BackupConfig.SecretKey``Cluster.Spec.RancherKubernetesEngineConfig.PrivateRegistries.Password``Cluster.Spec.RancherKubernetesEngineConfig.Network.WeaveNetworkProvider.Password``Cluster.Spec.RancherKubernetesEngineConfig.CloudProvider.VsphereCloudProvider.Global.Password``Cluster.Spec.RancherKubernetesEngineConfig.CloudProvider.VsphereCloudProvider.VirtualCenter.Password``Cluster.Spec.RancherKubernetesEngineConfig.CloudProvider.OpenstackCloudProvider.Global.Password``Cluster.Spec.RancherKubernetesEngineConfig.CloudProvider.AzureCloudProvider.AADClientSecret``Cluster.Spec.RancherKubernetesEngineConfig.CloudProvider.AzureCloudProvider.AADClientCertPassword``Cluster.Status.ServiceAccountToken``ClusterTemplate.Spec.ClusterConfig.RancherKubernetesEngineConfig.PrivateRegistries.Password``ClusterTemplate.Spec.ClusterConfig.RancherKubernetesEngineConfig.Network.WeaveNetworkProvider.Password``ClusterTemplate.Spec.ClusterConfig.RancherKubernetesEngineConfig.CloudProvider.VsphereCloudProvider.Global.Password``ClusterTemplate.Spec.ClusterConfig.RancherKubernetesEngineConfig.CloudProvider.VsphereCloudProvider.VirtualCenter.Password``ClusterTemplate.Spec.ClusterConfig.RancherKubernetesEngineConfig.CloudProvider.OpenstackCloudProvider.Global.Password``ClusterTemplate.Spec.ClusterConfig.RancherKubernetesEngineConfig.CloudProvider.AzureCloudProvider.AADClientSecret``ClusterTemplate.Spec.ClusterConfig.RancherKubernetesEngineConfig.CloudProvider.AzureCloudProvider.AADClientCertPassword`PatchesPatched versions include releases 2.5.16, 2.6.7 and later versions.After upgrading to a patched version, it is important to check for the `SecretsMigrated` condition on `Clusters`, `ClusterTemplates`, and `Catalogs` to confirm when secrets have been fully migrated off of those objects and the objects scoped within them (`Notifiers` and `SourceCodeProviderConfigs`).WorkaroundsLimit access in Rancher to trusted users. There is not a direct mitigation besides upgrading to the patched Rancher versions.**Important:**It is highly advised to rotate Rancher's `serviceAccountToken`. This rotation is not done by the version upgrade. Please see the helper script below.The local and downstream clusters should be checked for potential unrecognized services (pods), users and API keys.It is recommended to review for potential leaked credentials in this scenario, that are not directly related to Rancher, and to change them if deemed necessary.The script available in [rancherlabs/support-tools/rotate-tokens](https://github.com/rancherlabs/support-tools/blob/master/rotate-tokens) repository can be used as a helper to rotate the service account token (used to provision clusters). The script requires a valid Rancher API token, `kubectl` access to the `local` cluster and the `jq` command.CreditsWe would like to recognize and appreciate Florian Struck (from [Continum AG](https://www.continum.net/)) and [Marco Stuurman](https://github.com/fe-ax) (from [Shock Media B.V.](https://www.shockmedia.nl)) for the responsible disclosure of this security issue.For more informationIf you have any questions or comments about this advisory:Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/). | [] |
GHSA-hxvx-w43m-m8wv | Windows Authentication Elevation of Privilege Vulnerability | [] |
|
GHSA-qx2c-cjfg-57c3 | A vulnerability was found in PCMan FTP Server 2.0.7 and classified as critical. This issue affects some unknown processing of the component RMDIR Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-vvp7-r422-rx83 | Unauthenticated user can have information about hidden users on subwikis through uorgsuggest.vm | ImpactIt's possible to list some users who are normally not viewable from subwiki by requesting users on a subwiki which allows only global users with `uorgsuggest.vm`. This issue only concerns hidden users from main wiki.
Note that the disclosed information are the username and the first and last name of users, no other information is leaked.PatchesThe problem has been patched on XWiki 13.10.8, 14.4.3 and 14.7RC1.WorkaroundsIt's possible to workaround this vulnerability by patching directly `uorgsuggest.vm ` to apply the same changes as in https://github.com/xwiki/xwiki-platform/pull/1883.ReferencesJIRA ticket: https://jira.xwiki.org/browse/XWIKI-20007this vulnerability is actually a remaining of https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-97jg-43c9-q6pf which wasn't entirely fixed back thenFor more informationIf you have any questions or comments about this advisory:Open an issue in [Jira](https://jira.xwiki.org)Email us at [security ML](mailto:[email protected]) | [] |
CVE-2022-31364 | Cypress : https://www.infineon.com/ Cypress Bluetooth Mesh SDK BSA0107_05.01.00-BX8-AMESH-08 is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: affected function is lower_transport_layer_on_seg. ¶¶ In Cypress Bluetooth Mesh SDK, there is an out-of-bound write vulnerability that can be triggered by sending a series of segmented packets with inconsistent SegN. | [
"cpe:2.3:a:infineon:cypress_bluetooth_mesh_software_development_kit:bsa0107_05.01.00-bx8-amesh-08:*:*:*:*:*:*:*"
] |
|
GHSA-vjp9-559m-23q9 | Vulnerability of defects introduced in the design process in the HiviewTunner module. Successful exploitation of this vulnerability may cause service hijacking. | [] |
|
CVE-2023-23716 | WordPress Zendesk Support for WordPress plugin <= 1.8.4 - Broken Access Control vulnerability | Missing Authorization vulnerability in Zendesk Zendesk Support for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zendesk Support for WordPress: from n/a through 1.8.4. | [] |
GHSA-j4wq-m2h7-q8qx | SQL Injection vulnerability in Baizhuo Network Smart s200 Management Platform v.S200 allows a local attacker to obtain sensitive information and escalate privileges via the /importexport.php component. | [] |
|
GHSA-5hfj-v78p-rrrj | Missing Authorization vulnerability in Academy LMS academy.This issue affects Academy LMS: from n/a through 1.9.16. | [] |
|
CVE-2018-5216 | Radiant CMS 1.1.4 has XSS via crafted Markdown input in the part_body_content parameter to an admin/pages/*/edit resource. | [
"cpe:2.3:a:radiantcms:radiant_cms:1.1.4:*:*:*:*:*:*:*"
] |
|
GHSA-4h5w-rfr3-39rp | Missing Authorization vulnerability in gVectors Team wpDiscuz allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects wpDiscuz: from n/a through 7.6.10. | [] |
|
GHSA-h8rg-wg9m-6gh2 | Cross-site request forgery (CSRF) vulnerability on NEC Aterm WG300HP devices allows remote attackers to hijack the authentication of arbitrary users. | [] |
|
CVE-2019-18633 | European Commission eIDAS-Node Integration Package before 2.3.1 has Missing Certificate Validation because a certain ExplicitKeyTrustEvaluator return value is not checked. NOTE: only 2.1 is confirmed to be affected. | [
"cpe:2.3:a:europa:eidas-node_integration_package:2.1:*:*:*:*:*:*:*"
] |
|
GHSA-v9xr-3w4j-5rch | The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. | [] |
|
CVE-2015-2871 | Chiyu BF-660C fingerprint access-control devices allow remote attackers to bypass authentication and (1) read or (2) modify communication configuration settings via a request to net.htm, a different vulnerability than CVE-2015-5618. | [
"cpe:2.3:h:chiyu:bf-660c:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-21122 | UReport v2.2.9 contains a Server-Side Request Forgery (SSRF) in the designer page which allows attackers to detect intranet device ports. | [
"cpe:2.3:a:ureport_project:ureport:2.2.9:*:*:*:*:*:*:*"
] |
|
CVE-2023-41113 | An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It allows an authenticated user to to obtain information about whether certain files exist on disk, what errors if any occur when attempting to read them, and some limited information about their contents (regardless of permissions). This can occur when a superuser has configured one or more directories for filesystem access via CREATE DIRECTORY and adopted certain non-default settings for log_line_prefix and log_connections. | [
"cpe:2.3:a:enterprisedb:postgres_advanced_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-qw95-2v38-2pp5 | The admin.php file in Rantx allows remote attackers to bypass authentication and gain privileges by setting the logininfo cookie to "<?php" or "?>", which is present in the password file and probably passes an insufficient comparison. | [] |
|
CVE-2016-7042 | The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-3646 | Command injection vulnerability was identified in GitHub Enterprise Server that allowed privilege escalation in the Management Console | A command injection vulnerability was identified in GitHub Enterprise Server that allowed an attacker with an editor role in the Management Console to gain admin SSH access to the instance when configuring the chat integration. Exploitation of this vulnerability required access to the GitHub Enterprise Server instance and access to the Management Console with the editor role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.12.2, 3.11.8, 3.10.10, and 3.9.13. This vulnerability was reported via the GitHub Bug Bounty program.
| [
"cpe:2.3:a:github:enterprise_server:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:github:enterprise_server:3.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:github:enterprise_server:3.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:github:enterprise_server:3.12.0:*:*:*:*:*:*:*"
] |
GHSA-669j-hvf3-2f28 | A buffer overflow can occur when manipulating the SVG "animatedPathSegList" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59. | [] |
|
CVE-2018-10935 | A flaw was found in the 389 Directory Server that allows users to cause a crash in the LDAP server using ldapsearch with server side sort. | [
"cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-30061 | ftcms <=2.1 was discovered to be vulnerable to directory traversal attacks via the parameter tp. | [
"cpe:2.3:a:ftcms:ftcms:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-7731 | A weak password recovery vulnerability in Fortinet FortiPortal versions 4.0.0 and below allows attacker to carry out information disclosure via the Forgotten Password feature. | [
"cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*"
] |
|
GHSA-pgmv-r49r-93pq | Dell Wyse Management Suite, versions prior to WMS 5.2, contain an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Script injection. | [] |
|
GHSA-wq4c-wm6x-jw44 | Withdrawn Advisory: Node.js Inspector RCE via DNS Rebinding | Withdrawn AdvisoryThis advisory has been withdrawn because this vulnerability affects inspector code in https://github.com/nodejs/node, not the [legacy debugger](https://nodejs.org/en/docs/inspector#legacy-debugger) at https://github.com/node-inspector/node-inspector. https://github.com/nodejs/node is not in a [supported ecosystem](https://github.com/github/advisory-database/blob/main/README.md#supported-ecosystems).Original DescriptionThe Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access. | [] |
GHSA-mr85-wvjc-ppxp | Unknown vulnerability in the net-svc script on Solaris 10 allows remote authenticated users to execute arbitrary code on a DHCP client via certain DHCP responses. | [] |
|
CVE-2023-24860 | Microsoft Defender Denial of Service Vulnerability | Microsoft Defender Denial of Service Vulnerability | [
"cpe:2.3:a:microsoft:malware_protection_engine:*:*:*:*:*:*:*:*"
] |
CVE-2008-3980 | Unspecified vulnerability in the Upgrade component in Oracle Database 10.1.0.5 and 10.2.0.3 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. | [
"cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_10g:10.2.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-wpm5-fh4f-wr9q | The Forminator – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.13.4. This is due to missing or incorrect nonce validation on the listen_for_saving_export_schedule() function. This makes it possible for unauthenticated attackers to export form submissions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
GHSA-j766-66hv-6p2p | Login.aspx in the SmarterTools SmarterStats 6.0 web server supports URLs containing txtUser and txtPass parameters in the query string, which makes it easier for context-dependent attackers to discover credentials by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history, related to a "cross-domain Referer leakage" issue. | [] |
|
GHSA-3vcw-92x2-jjg4 | A vulnerability in Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to overwrite or append arbitrary data to system files using root-level privileges. The attacker must have administrative credentials on the device. This vulnerability is due to incomplete validation of user input for a specific CLI command. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges and issuing a CLI command with crafted user parameters. A successful exploit could allow the attacker to overwrite or append arbitrary data to system files using root-level privileges. | [] |
|
CVE-2008-6541 | Unrestricted file upload vulnerability in the file manager module in DotNetNuke before 4.8.2 allows remote administrators to upload arbitrary files and gain privileges to the server via unspecified vectors. | [
"cpe:2.3:a:dotnetnuke:dotnetnuke:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.10d:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:1.0.10e:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:dotnetnuke:dotnetnuke:4.5.2:*:*:*:*:*:*:*"
] |
|
CVE-2005-3877 | Multiple SQL injection vulnerabilities in Simple Document Management System (SDMS) 2.0-CVS and earlier allow remote attackers to execute arbitrary SQL commands via the (1) folder_id parameter in list.php and (2) mid parameter in a view action to messages.php. | [
"cpe:2.3:a:cafuego:simple_document_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cafuego:simple_document_management_system:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cafuego:simple_document_management_system:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cafuego:simple_document_management_system:1.1.6:*:*:*:*:*:*:*"
] |
|
GHSA-x4hg-pfrq-5xvq | The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. | [] |
|
GHSA-hq84-pvgw-424h | SQL injection vulnerability in the com_hbssearch component 1.0 in the Hotel Booking Reservation System (aka HBS) 1.0.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the r_type parameter in a showhoteldetails action to index.php. | [] |
|
GHSA-fjvh-mchr-664c | A read-only authentication bypass vulnerability was reported in the Third Quarter 2021 release of Lenovo XClarity Controller (XCC) firmware affecting XCC devices configured in LDAP Authentication Only Mode and using an LDAP server that supports “unauthenticated bind”, such as Microsoft Active Directory. An unauthenticated user can gain read-only access to XCC in such a configuration, thereby allowing the XCC device configuration to be viewed but not changed. XCC devices configured to use local authentication, LDAP Authentication + Authorization Mode, or LDAP servers that support only “authenticated bind” and/or “anonymous bind” are not affected. | [] |
|
GHSA-rx5w-4vhh-gg8p | ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to an Improper Authentication vulnerability which could allow an attacker to bypass authentication and gain permissions in the product. | [] |
|
CVE-2022-45094 | A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 1). An authenticated remote attacker with access to the Web Based Management (443/tcp) of the affected product, could potentially inject commands into the dhcpd configuration of the affected product. An attacker might leverage this to trigger remote code execution on the affected component. | [
"cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_ins:1.0:sp2:*:*:*:*:*:*"
] |
|
CVE-2020-25102 | silverstripe-advancedreports (aka the Advanced Reports module for SilverStripe) 1.0 through 2.0 is vulnerable to Cross-Site Scripting (XSS) because it is possible to inject and store malicious JavaScript code. The affects admin/advanced-reports/DataObjectReport/EditForm/field/DataObjectReport/item (aka report preview) when an SVG document is provided in the Description parameter. | [
"cpe:2.3:a:advanced_reports_project:advanced_reports:*:*:*:*:*:silverstripe:*:*"
] |
|
CVE-2022-30143 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:hololens:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:azure:*:*:*"
] |
GHSA-rv29-g37p-fvpf | PNPSCADA 2.200816204020 allows SQL injection via parameter 'interf' in /browse.jsp. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. | [] |
|
GHSA-chhp-78gp-3h92 | An issue was discovered in CentralAuth in MediaWiki through 1.36.2. The rightsnone MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the setchange log. | [] |
|
CVE-2022-33728 | Exposure of sensitive information in Bluetooth prior to SMR Aug-2022 Release 1 allows local attackers to access connected BT macAddress via Settings.Gloabal. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] |
|
GHSA-mr5h-jw29-c93v | Adobe Bridge versions 10.0.1 and earlier version have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution. | [] |
|
GHSA-9w97-9rqx-8v4j | Mattermost allows demoted guests to change group names | Mattermost fails to update the permissions of the current session for a user who was just demoted to guest, allowing freshly demoted guests to change group names. | [] |
CVE-2021-42009 | Apache Traffic Control Traffic Ops Email Injection Vulnerability | An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3. | [
"cpe:2.3:a:apache:traffic_control:*:*:*:*:*:*:*:*"
] |
CVE-2006-4424 | PHP remote file inclusion vulnerability in coin_includes/constants.php in phpCOIN 1.2.3 allows remote attackers to execute arbitrary PHP code via the _CCFG[_PKG_PATH_INCL] parameter. | [
"cpe:2.3:a:coinsoft_technologies:phpcoin:1.2.3:*:*:*:*:*:*:*"
] |
|
GHSA-5793-wfxr-j725 | In the Linux kernel, the following vulnerability has been resolved:dma-buf: heaps: Fix off-by-one in CMA heap fault handlerUntil VM_DONTEXPAND was added in commit 1c1914d6e8c6 ("dma-buf: heaps:
Don't track CMA dma-buf pages under RssFile") it was possible to obtain
a mapping larger than the buffer size via mremap and bypass the overflow
check in dma_buf_mmap_internal. When using such a mapping to attempt to
fault past the end of the buffer, the CMA heap fault handler also checks
the fault offset against the buffer size, but gets the boundary wrong byFix the boundary check so that we don't read off the end of the pages
array and insert an arbitrary page in the mapping. | [] |
|
GHSA-4fvx-h823-38v3 | YesWiki Uses a Broken or Risky Cryptographic Algorithm | SummaryThe use of a weak cryptographic algorithm and a hard-coded salt to hash the password reset key allows it to be recovered and used to reset the password of any account.DetailsFirstly, the salt used to hash the password reset key is hard-coded in the `includes/services/UserManager.php` file at line `36` :Next, the application uses a weak cryptographic algorithm to hash the password reset key. The hash algorithm is defined in the `includes/services/UserManager.php` file at line `201` :The key is generated from the **user's name**, **e-mail address**, a random number **between 0 and 10000**, the **current date** of the request and the **salt**.
If we know the user's name and e-mail address, we can retrieve the key and use it to reset the account password with a bit of brute force on the random number.Proof of Concept (PoC)To demonstrate the vulnerability, I created a python script to automatically retrieve the key and reset the password of a provided username and email.Simply run this script with the arguments `-u` for the username, `-e` for the email and `-d` for the target domain.ImpactMany impacts are possible, the most obvious being account takeover, which can lead to theft of sensitive data, modification of website content, addition/deletion of administrator accounts, user identity theft, etc.RecommendationThe safest solution is to replace the salt with a random one and the hash algorithm with a more secure one.
For example, you can use [random bytes](https://www.php.net/manual/en/function.random-bytes.php) instead of a random integer. | [] |
CVE-2010-3908 | FFmpeg before 0.5.4, as used in MPlayer and other products, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a malformed WMV file. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mplayerhq:mplayer:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-38029 | Microsoft OpenSSH for Windows Remote Code Execution Vulnerability | Microsoft OpenSSH for Windows Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] |
CVE-2016-0052 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0022. | [
"cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_for_mac:2011:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_for_mac:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*"
] |
|
GHSA-vv72-36rg-vcmc | A vulnerability was found in QDocs Smart School 6.4.1. It has been classified as critical. This affects an unknown part of the file /course/filterRecords/ of the component HTTP POST Request Handler. The manipulation of the argument searchdata[0][title]/searchdata[0][searchfield]/searchdata[0][searchvalue] leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-241647. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-prhv-qr49-g94v | SQL injection vulnerability in Employee Management System v.1.0 allows a local attacker to obtain sensitive information via a crafted payload to the txtemail parameter in the login.php. | [] |
|
CVE-2021-22167 | An issue has been discovered in GitLab affecting all versions starting from 12.1. Incorrect headers in specific project page allows attacker to have a temporary read access to the private repository | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
GHSA-4cr6-j83q-fcq3 | An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server. | [] |
|
CVE-2024-42795 | An Incorrect Access Control vulnerability was found in /music/view_user.php?id=3 and /music/controller.php?page=edit_user&id=3 in Kashipara Music Management System v1.0. This vulnerability allows an unauthenticated attacker to view valid user details. | [
"cpe:2.3:a:kashipara:music_management_system:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-0889 | Cross-site scripting (XSS) vulnerability in Calcium 3.10.1 allows remote attackers to inject arbitrary web script or HTML via the EventText parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:brown_bear_software:calcium:3.10.1:*:*:*:*:*:*:*"
] |
|
CVE-2016-6111 | IBM Curam Social Program Management 6.0 and 7.0 are vulnerable to a denial of service, caused by an XML External Entity Injection (XXE) error when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume all available memory resources. IBM Reference #: 2000833. | [
"cpe:2.3:a:ibm:curam_social_program_management:5.2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:5.2:sp4:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:5.2:sp6:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:7.0.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-6099 | A lack of CORS checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page. | [
"cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-1040 | SourceCodester Online Graduate Tracer System add_acc.php sql injection | A vulnerability, which was classified as critical, has been found in SourceCodester Online Graduate Tracer System 1.0. Affected by this issue is some unknown functionality of the file tracking/admin/add_acc.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-221798 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:online_graduate_tracer_system_project:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-8cjp-pfr2-hjwj | A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function | [] |
|
CVE-2017-14378 | EMC RSA Authentication Agent API 8.5 for C and RSA Authentication Agent SDK 8.6 for C allow attackers to bypass authentication, aka an "Error Handling Vulnerability." | [
"cpe:2.3:a:emc:rsa_authentication_agent_api_for_c:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_authentication_agent_sdk_for_c:8.6:*:*:*:*:*:*:*"
] |
|
GHSA-6ghq-8mcg-mj93 | Microsoft Internet Explorer 9 through 11 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability." | [] |
|
CVE-2020-25820 | BigBlueButton before 2.2.7 allows remote authenticated users to read local files and conduct SSRF attacks via an uploaded Office document that has a crafted URL in an ODF xlink field. | [
"cpe:2.3:a:bigbluebutton:bigbluebutton:*:*:*:*:*:*:*:*"
] |
|
GHSA-cwh3-jw96-rmr6 | Improper Verification of Source of a Communication Channel in Work Desktop for Mac versions below 10.8.2.33 allows attackers to execute arbitrary commands via unauthorized access to the Agent service. | [] |
|
CVE-2018-0876 | Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0889, CVE-2018-0893, CVE-2018-0925, and CVE-2018-0935. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] |
|
CVE-2002-2280 | syslogd on OpenBSD 2.9 through 3.2 does not change the source IP address of syslog packets when the machine's IP addressed is changed without rebooting, e.g. via ifconfig, which can cause incorrect information to be sent to the syslog server. | [
"cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*"
] |
|
CVE-2016-9480 | libdwarf 2016-10-21 allows context-dependent attackers to obtain sensitive information or cause a denial of service by using the "malformed dwarf file" approach, related to a "Heap Buffer Over-read" issue affecting the dwarf_util.c component, aka DW201611-006. | [
"cpe:2.3:a:libdwarf_project:libdwarf:2016-10-21:*:*:*:*:*:*:*"
] |
|
GHSA-2fv6-hp2w-qhgh | IKEv2 in Huawei IPS Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NGFW Module V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, NIP6600 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, Secospace USG6300 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE, Secospace USG6600 V500R001C00, V500R001C00SPC100, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC301, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200PWE, V500R001C20SPC300, V500R001C20SPC300B078, V500R001C20SPC300PWE, USG9500 V500R001C00, V500R001C00SPC200, V500R001C00SPC300, V500R001C00SPC303, V500R001C00SPC500, V500R001C00SPC500PWE, V500R001C00SPH303, V500R001C00SPH508, V500R001C20, V500R001C20SPC100, V500R001C20SPC100PWE, V500R001C20SPC101, V500R001C20SPC200, V500R001C20SPC200B062, V500R001C20SPC200PWE, V500R001C20SPC300B078, V500R001C20SPC300PWE has an out-of-bounds memory access vulnerability due to incompliance with the 4-byte alignment requirement imposed by the MIPS CPU. An attacker could exploit it to cause unauthorized memory access, which may further lead to system exceptions. | [] |
|
GHSA-94wc-5cm9-3ffq | Dell EMC Integrated Data Protection Appliance versions prior to 2.3 contain a stored cross-site scripting vulnerability. A remote malicious ACM admin user may potentially exploit this vulnerability to store malicious HTML or JavaScript code in Cloud DR add-on specific field. When victim users access the page through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable web application. | [] |
|
CVE-2024-27938 | SMTP Smuggling in Postal | Postal is an open source SMTP server. Postal versions less than 3.0.0 are vulnerable to SMTP Smuggling attacks which may allow incoming e-mails to be spoofed. This, in conjunction with a cooperative outgoing SMTP service, would allow for an incoming e-mail to be received by Postal addressed from a server that a user has 'authorised' to send mail on their behalf but were not the genuine author of the e-mail. Postal is not affected for sending outgoing e-mails as email is re-encoded with `<CR><LF>` line endings when transmitted over SMTP. This issue has been addressed and users should upgrade to Postal v3.0.0 or higher. Once upgraded, Postal will only accept End of DATA sequences which are explicitly `<CR><LF>.<CR><LF>`. If a non-compliant sequence is detected it will be logged to the SMTP server log. There are no workarounds for this issue. | [
"cpe:2.3:a:postalserver:postal:*:*:*:*:*:*:*:*"
] |
CVE-2017-3442 | Vulnerability in the Oracle Customer Interaction History component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2 and 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Customer Interaction History. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Customer Interaction History, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Customer Interaction History accessible data as well as unauthorized update, insert or delete access to some of Oracle Customer Interaction History accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [
"cpe:2.3:a:oracle:customer_interaction_history:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:customer_interaction_history:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:customer_interaction_history:12.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-r3x5-r85c-grp5 | In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any other requests. | [] |
|
GHSA-r68h-jhhj-9jvm | Validator.isValidSafeHTML is being deprecated and will be deleted from org.owasp.esapi:esapi in 1 year | ImpactThe `Validator.isValidSafeHTML` method can result in false negatives where it reports some input as safe (i.e., returns true), but really isn't, and using that same input as-is can in certain circumstances result in XSS vulnerabilities. Because this method cannot be fixed, it is being deprecated and will be removed in one years time from when this advisory is published. Full details may be found in [ESAPI Security Bulletin #12](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin12.pdf).Note that all versions of ESAPI, that have this method (which dates back to at least the ESAPI 1.3 release more than 15 years ago) have this issue and it will continue to exist until we remove these two methods in a future ESAPI release.PatchesThere is no patch. We do not believe that it is possible to patch this pretentiously named method other then perhaps renaming it to something like Validator.mightThisBeValidSafeHTML to dissuade developers from using it.WorkaroundsStop using this method. Note that `Validator.getValidSafeHTML` is believed to be safe to use with the default **antisamy-esapi.xml** AntiSamy policy file.Why is no CVE being filed?We outline the reasons in the section "Why no CVE for this issue?" in [ESAPI Security Bulletin #12](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin12.pdf). If after reading that, if _you_ still want to file a CVE or this, knock yourself out.References[CWE-79](https://cwe.mitre.org/data/definitions/79.html)
[CWE-80](https://cwe.mitre.org/data/definitions/80.html)
[ESAPI Security Bulletin #12](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin12.pdf)Final resolutionThis GitHub Security Advisory should now be considered remediated in [ESAPI versions 2.6.0.0](https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.6.0.0) and later as the deprecated methods have been removed from the ESAPI jar. | [] |
CVE-2014-3300 | The BVSMWeb portal in the web framework in Cisco Unified Communications Domain Manager (CDM) in Unified CDM Application Software before 10 does not properly implement access control, which allows remote attackers to modify user information via a crafted URL, aka Bug ID CSCum77041. | [
"cpe:2.3:a:cisco:unified_cdm_application_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_cdm_application_software:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_domain_manager:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-3340 | codeprojects Online Restaurant Management System combo_update.php sql injection | A vulnerability, which was classified as critical, has been found in codeprojects Online Restaurant Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/combo_update.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-5c6j-76f2-jq69 | Adobe Illustrator before CS6 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0780, CVE-2012-2024, CVE-2012-2025, and CVE-2012-2026. | [] |
|
GHSA-p27h-44p7-rh3w | Visiology Flipbox Software Suite before 2.7.0 allows directory traversal via %5c%2e%2e%2f because it does not sanitize filename parameters. | [] |
|
CVE-2020-14054 | SOKKIA GNR5 Vanguard WEB version 1.2 (build: 91f2b2c3a04d203d79862f87e2440cb7cefc3cd3) and hardware version 212 allows remote attackers to bypass admin authentication via a SQL injection attack that uses the User Name or Password field on the login page. | [
"cpe:2.3:o:sokkia:gnr5_vanguard_firmware:1.2:*:*:*:*:*:*:*",
"cpe:2.3:h:sokkia:gnr5_vanguard:212:*:*:*:*:*:*:*"
] |
|
CVE-2021-36922 | RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve unauthorized access to USB devices (Escalation of Privileges, Denial of Service, Code Execution, and Information Disclosure) via a crafted Device IO Control packet to a device. | [
"cpe:2.3:a:realtek:rtsupx_usb_utility_driver:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-1262 | Cross-site scripting (XSS) vulnerability in cgi-bin/mt/mt-wizard.cgi in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13, when the product is incompletely installed, allows remote attackers to inject arbitrary web script or HTML via the dbuser parameter, a different vulnerability than CVE-2012-0318. | [
"cpe:2.3:a:movabletype:movable_type_open_source:*:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.01:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.261:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:4.361:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.031:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_open_source:5.051:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.01:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.261:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:4.361:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.031:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_enterprise:5.051:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:*:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.01:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.261:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:4.361:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.031:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_advanced:5.051:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.01:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.31:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.32:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.36:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.261:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:4.361:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.03:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.04:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.05:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.06:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.031:*:*:*:*:*:*:*",
"cpe:2.3:a:movabletype:movable_type_pro:5.051:*:*:*:*:*:*:*"
] |
|
CVE-2022-20548 | In setParameter of EqualizerEffect.cpp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-240919398 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.