id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-j4f4-j4v7-f684 | Cisco Digital Media Manager (DMM) before 5.2 allows remote authenticated users to discover Cisco Digital Media Player credentials via vectors related to reading a (1) error log or (2) stack trace, aka Bug ID CSCtc46050. | [] |
|
GHSA-vj9p-w6vw-49xq | Cross-site scripting (XSS) vulnerability in the GUI login page in ADTRAN AOS before R10.8.1 on the NetVanta 7100 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-vq45-h9rf-2687 | Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Edge Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0156 and CVE-2016-0157. | [] |
|
CVE-2008-4481 | Cross-site scripting (XSS) vulnerability in Redmine 0.7.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:redmine:redmine:0.7.1:*:*:*:*:*:*:*"
] |
|
CVE-2005-0380 | Multiple PHP remote file inclusion vulnerabilities in (1) print_category.php, (2) login.php, (3) setup.php, (4) ask_password.php, or (5) error.php in ZeroBoard 4.1pl5 and earlier allow remote attackers to execute arbitrary PHP code by modifying the dir parameter to reference a URL on a remote web server that contains the code. | [
"cpe:2.3:a:zeroboard:zeroboard:4.1_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:zeroboard:zeroboard:4.1_pl3:*:*:*:*:*:*:*",
"cpe:2.3:a:zeroboard:zeroboard:4.1_pl4:*:*:*:*:*:*:*",
"cpe:2.3:a:zeroboard:zeroboard:4.1_pl5:*:*:*:*:*:*:*"
] |
|
CVE-2016-8221 | Privilege Escalation in Lenovo XClarity Administrator earlier than 1.2.0, if LXCA is used to manage rack switches or chassis with embedded input/output modules (IOMs), certain log files viewable by authenticated users may contain passwords for internal administrative LXCA accounts with temporary passwords that are used internally by LXCA code. | [
"cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-0170 | Windows Performance Monitor in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an information disclosure vulnerability due to the way it parses XML input, aka "Windows Performance Monitor Information Disclosure Vulnerability". | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] |
|
GHSA-gg7w-pw2r-x2cq | Apache Solr allows read access to host environmet variables | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess.The Solr Metrics API is protected by the "metrics-read" permission. Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission.This issue affects Apache Solr: from 9.0.0 before 9.3.0.Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API. | [] |
GHSA-c595-prjf-55w3 | Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed. | [] |
|
GHSA-xvvh-54m6-j663 | PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to SQL injection, as demonstrated by the email parameter in index.php or register.php. The SQL injection allows to dump the MySQL database and to bypass the login prompt. | [] |
|
GHSA-6cjc-w4j3-jjh8 | A vulnerability has been identified in Omnivise T3000 Application Server (All versions). Affected devices allow authenticated users to export diagnostics data. The corresponding API endpoint is susceptible to path traversal and could allow an authenticated attacker to download arbitrary files from the file system. | [] |
|
CVE-2015-1700 | Microsoft SharePoint Server 2007 SP3, SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, and SharePoint Foundation 2013 SP1 allow remote authenticated users to execute arbitrary code via crafted page content, aka "Microsoft SharePoint Page Content Vulnerabilities." | [
"cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*"
] |
|
CVE-2012-1543 | Unspecified vulnerability in the JavaFX component in Oracle Java SE JavaFX 2.2.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an invalid type cast in the JSObject class. | [
"cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:javafx:2.2.3:*:*:*:*:*:*:*"
] |
|
CVE-2024-47291 | Permission vulnerability in the ActivityManagerService (AMS) module
Impact: Successful exploitation of this vulnerability may affect availability. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-13428 | WP Job Portal <= 2.2.6 - Insecure Direct Object Reference to Unauthenticated Company Logo Deletion | The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.6 via the deleteCompanyLogo() due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to delete arbitrary company logos. | [] |
CVE-2023-36307 | ZPLGFA 1.1.1 allows attackers to cause a panic (because of an integer index out of range during a ConvertToGraphicField call) via an image of zero width. NOTE: it is unclear whether there are common use cases in which this panic could have any security consequence | [
"cpe:2.3:a:simonwaldherr:zplgfa:1.1.1:*:*:*:*:go:*:*"
] |
|
CVE-2022-48714 | bpf: Use VM_MAP instead of VM_ALLOC for ringbuf | In the Linux kernel, the following vulnerability has been resolved:
bpf: Use VM_MAP instead of VM_ALLOC for ringbuf
After commit 2fd3fb0be1d1 ("kasan, vmalloc: unpoison VM_ALLOC pages
after mapping"), non-VM_ALLOC mappings will be marked as accessible
in __get_vm_area_node() when KASAN is enabled. But now the flag for
ringbuf area is VM_ALLOC, so KASAN will complain out-of-bound access
after vmap() returns. Because the ringbuf area is created by mapping
allocated pages, so use VM_MAP instead.
After the change, info in /proc/vmallocinfo also changes from
[start]-[end] 24576 ringbuf_map_alloc+0x171/0x290 vmalloc user
to
[start]-[end] 24576 ringbuf_map_alloc+0x171/0x290 vmap user | [] |
CVE-2006-3571 | Multiple cross-site scripting (XSS) vulnerabilities in interna/hilfe.php in Papoo 3 RC3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) titel or (2) ausgabe parameters. | [
"cpe:2.3:a:papoo:papoo:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:papoo:papoo:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:papoo:papoo:3.0.0_rc3:*:*:*:*:*:*:*"
] |
|
GHSA-vjcf-4947-pvqf | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none. | [] |
|
GHSA-v9fp-3459-p6h9 | FreeBSD VFS cache (vfs_cache) allows local users to cause a denial of service by opening a large number of files. | [] |
|
CVE-2024-22724 | An issue was discovered in osCommerce v4, allows local attackers to bypass file upload restrictions and execute arbitrary code via administrator profile photo upload feature. | [
"cpe:2.3:a:oscommerce:oscommerce:-:*:*:*:*:*:*:*"
] |
|
GHSA-f8x4-v4p8-66f9 | The WeChat module in YzmCMS 3.7.1 has reflected XSS via the admin/module/init.html echostr parameter, related to the valid function in application/wechat/controller/index.class.php. | [] |
|
GHSA-x3cr-crpx-mg4r | TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain an unauthenticated remote command execution (RCE) vulnerability via multiple parameters in the "setOpModeCfg" function. This security issue allows an attacker to take complete control of the device. In detail, exploitation allows unauthenticated, remote attackers to execute arbitrary system commands with administrative privileges (i.e., as user "root"). | [] |
|
GHSA-xx8c-x7pm-mwj6 | Incorrect default permissions for the Intel(R) RXT for Chromebook application, all versions, may allow an authenticated user to potentially enable information disclosure via local access. | [] |
|
CVE-2019-1229 | Dynamics On-Premise Elevation of Privilege Vulnerability | An elevation of privilege vulnerability exists in Dynamics On-Premise v9. An attacker who successfully exploited the vulnerability could leverage a customizer privilege within Dynamics to gain control of the Web Role hosting the Dynamics installation.
To exploit this vulnerability, an attacker needs to have credentials for a user that has permission to author customized business rules in Dynamics, and persist XAML script in a way that causes it to be interpreted as code.
The update addresses the vulnerability by restricting XAML activities to a whitelisted set.
| [
"cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:on-premises:*:*:*"
] |
GHSA-5x2f-7539-frwf | WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message. | [] |
|
GHSA-7j3v-wgjr-qm6m | An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a script file called "get_file.sh" which allows a user to retrieve any file stored in the "cmh-ext" folder on the device. However, the "filename" parameter is not validated correctly and this allows an attacker to directory traverse outside the /cmh-ext folder and read any file on the device. It is necessary to create the folder "cmh-ext" on the device which can be executed by an attacker first in an unauthenticated fashion and then execute a directory traversal attack. | [] |
|
GHSA-pmjf-334r-5j9j | The web server used by MikroTik RouterOS version 6 is affected by a heap memory corruption issue. A remote and unauthenticated attacker can corrupt the server's heap memory by sending a crafted HTTP request. As a result, the web interface crashes and is immediately restarted. The issue was fixed in RouterOS 6.49.10 stable. RouterOS version 7 is not affected. | [] |
|
CVE-2022-37163 | Bminusl IHateToBudget v1.5.7 employs a weak password policy which allows attackers to potentially gain unauthorized access to the application via brute-force attacks. Additionally, user passwords are hashed without a salt or pepper making it much easier for tools like hashcat to crack the hashes. | [
"cpe:2.3:a:ihatetobudget_project:ihatetobudget:1.5.7:*:*:*:*:*:*:*"
] |
|
CVE-2023-45614 | There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
| [
"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-44175 | Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetMacFilterCfg. | [
"cpe:2.3:o:tenda:ac18_firmware:15.03.05.19:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*"
] |
|
GHSA-5676-g54g-65x9 | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7353. | [] |
|
CVE-2014-5748 | The wK12olslogin (aka com.wK12olslogin) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:wk12olslogin_project:wk12olslogin:0.1:*:*:*:*:android:*:*"
] |
|
CVE-2025-20003 | Improper link resolution before file access ('Link Following') for some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
GHSA-cp98-q7wc-wv8q | Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow in the function formSetSysToolDDNS. This vulnerability allows attackers to cause a Denial of Service (DoS) via the ddnsDomain parameter. | [] |
|
GHSA-qr4q-v2vr-8c5h | Unspecified vulnerability in the data export function in testMaker before 3.0p10 allows test authors to obtain access to export data via unknown vectors. | [] |
|
CVE-2020-2566 | Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Attachments / File Upload). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:applications_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_framework:12.1.3:*:*:*:*:*:*:*"
] |
|
CVE-2025-6725 | Cross-Site Scripting (XSS) in PdfViewer | In the PdfViewer component, a Cross-Site Scripting (XSS) vulnerability is possible if a specially-crafted document has already been loaded and the user engages with a tool that requires the DOM to be re-rendered. | [] |
CVE-2014-2856 | Cross-site scripting (XSS) vulnerability in scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function. | [
"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4:b1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4:b2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4:b3:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.5:b1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.5:b2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.6:b1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:*"
] |
|
GHSA-x4cp-m7j4-f347 | An issue was discovered in Mattermost Server before 5.8.0. It does not always generate a robots.txt file. | [] |
|
CVE-2024-37227 | WordPress Newsletters plugin <= 4.9.7 - Cross Site Request Forgery (CSRF) vulnerability | Cross Site Request Forgery (CSRF) vulnerability in Tribulant Newsletters.This issue affects Newsletters: from n/a through 4.9.7. | [
"cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:*"
] |
GHSA-rrhm-pxgh-hw46 | Ipswitch IMail Server 2006 before 2006.21 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving an "overwritten destructor." | [] |
|
GHSA-439p-jwxg-8ffc | PHP Scripts Mall Muslim Matrimonial Script allows arbitrary file upload via admin/mydetails_edit.php. | [] |
|
CVE-2000-0900 | Directory traversal vulnerability in ssi CGI program in thttpd 2.19 and earlier allows remote attackers to read arbitrary files via a "%2e%2e" string, a variation of the .. (dot dot) attack. | [
"cpe:2.3:a:acme_labs:thttpd:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:acme_labs:thttpd:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:acme_labs:thttpd:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:acme_labs:thttpd:2.19:*:*:*:*:*:*:*"
] |
|
GHSA-gw9h-2w6g-5jgq | A CWE-502: Deserialization of untrusted data vulnerability exists that could allow an attacker
logged in with a user level account to gain higher privileges by providing a harmful serialized
object. | [] |
|
CVE-2023-42829 | The issue was addressed with additional restrictions on the observability of app states. This issue is fixed in macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to access SSH passphrases. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-qx59-vmgp-6rg3 | The Enable SVG, WebP & ICO Upload WordPress plugin through 1.0.3 does not sanitize SVG file contents, leading to a Cross-Site Scripting vulnerability. | [] |
|
GHSA-wqfw-3h2h-7vwc | An exploitable heap overflow vulnerability exists in the WkbProgramLow function of WibuKey Network server management, version 6.40.2402.500. A specially crafted TCP packet can cause a heap overflow, potentially leading to remote code execution. An attacker can send a malformed TCP packet to trigger this vulnerability. | [] |
|
GHSA-95xm-hxh5-9538 | A security vulnerability in HPE Integrated Lights-Out 5 (iLO 5) prior to v1.37 could be locally exploited to bypass the security restrictions for firmware updates. | [] |
|
GHSA-m8mg-43rw-v68q | SimpliSafe Original has Unencrypted Sensor Transmissions, which allows physically proximate attackers to obtain potentially sensitive information about the specific times when alarm-system events occur. | [] |
|
GHSA-4wfj-w835-wr77 | D-Link DAP-2622 DDP Configuration Backup Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20064. | [] |
|
CVE-2023-47786 | WordPress LayerSlider Plugin <= 7.7.9 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LayerSlider plugin <= 7.7.9 versions. | [
"cpe:2.3:a:layerslider:layerslider:*:*:*:*:*:wordpress:*:*"
] |
CVE-2010-0389 | The admin server in Sun Java System Web Server 7.0 Update 6 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an HTTP request that lacks a method token. | [
"cpe:2.3:a:sun:java_system_web_server:7.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:7.0:update_7:*:*:*:*:*:*"
] |
|
CVE-2022-38066 | An OS command injection vulnerability exists in the httpd SNMP functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted HTTP response can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability. | [
"cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
"cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-22158 | MediaKind (formerly Ericsson) RX8200 5.13.3 devices are vulnerable to multiple reflected and stored XSS. An attacker has to inject JavaScript code directly in the "path" or "Services+ID" parameters and send the URL to a user in order to exploit reflected XSS. In the case of stored XSS, an attacker must modify the "name" parameter with the malicious code. | [
"cpe:2.3:o:mediakind:rx8200_firmware:5.13.3:*:*:*:*:*:*:*",
"cpe:2.3:h:mediakind:rx8200:-:*:*:*:*:*:*:*"
] |
|
GHSA-pmcj-7mgc-5vfw | This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in macOS Monterey 12.6.1, macOS Big Sur 11.7.1, macOS Ventura 13. An app may be able to modify protected parts of the file system | [] |
|
GHSA-w84c-2mv5-2rqj | The Dattch - The Lesbian App (aka com.dattch.dattch.app) application 0.30 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2015-1464 | RT (aka Request Tracker) before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to hijack sessions via an RSS feed URL. | [
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.9:*:*:*:*:*:*:*"
] |
|
CVE-2020-8941 | Unchecked buffer overrun in enc_untrusted_inet_pton | An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading past commit 8fed5e334131abaf9c5e17307642fbf6ce4a57ec | [
"cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*"
] |
CVE-2017-1371 | Builder tools running in the IBM TRIRIGA Application Platform 3.3, 3.4, and 3.5 contains a vulnerability that could allow an authenticated user to execute Builder tool actions they do not have access to. IBM X-Force ID: 126864. | [
"cpe:2.3:a:ibm:tririga_application_platform:3.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.2.2:*:*:*:*:*:*:*"
] |
|
GHSA-v9rq-6m39-qhfv | Directory traversal vulnerability in WebSEAL in IBM Tivoli Access Manager for e-business 6.1.1 before 6.1.1-TIV-AWS-FP0001 on AIX allows remote attackers to read arbitrary files via a %uff0e%uff0e (encoded dot dot) in a URI. | [] |
|
GHSA-67qp-9m3v-p64q | Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'add1' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database. | [] |
|
GHSA-3m69-935c-w2hj | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12438. | [] |
|
GHSA-w62c-jf7f-2m62 | Cross-Site Request Forgery (CSRF) vulnerability in Jason Rouet Weather Station plugin <= 3.8.12 versions. | [] |
|
GHSA-vfp4-xx6m-7vf6 | Cryptographic Issues in ECK | Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK. | [] |
CVE-2020-23945 | A SQL injection vulnerability exists in Victor CMS V1.0 in the cat_id parameter of the category.php file. This parameter can be used by sqlmap to obtain data information in the database. | [
"cpe:2.3:a:victor_cms_project:victor_cms:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-w8vw-x82m-vg68 | Insecure permissions in the packaging of tomcat allow local users that win a race during package installation to escalate to root | [] |
|
CVE-2014-7947 | OpenJPEG before r2944, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, pi.c, t1.c, t2.c, and tcd.c. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-mvgc-r3vf-rg8q | An issue was discovered in certain Apple products. iOS before 11 is affected. The issue involves the "Sandbox Profiles" component. It allows attackers to determine whether arbitrary files exist via a crafted app. | [] |
|
CVE-2006-4955 | Directory traversal vulnerability in the downloadfile servlet in Neon WebMail for Java before 5.08 allows remote attackers to read arbitrary files via a .. (dot dot) sequence in the (1) savefolder and (2) savefilename parameters. | [
"cpe:2.3:a:neosys:neon_webmail:5.06:*:java:*:*:*:*:*",
"cpe:2.3:a:neosys:neon_webmail:5.07:*:java:*:*:*:*:*"
] |
|
GHSA-9xmm-cpf8-rgmx | An issue was discovered in the HDF HDF5 1.8.20 library. There is an out of bounds read in H5L_extern_query at H5Lexternal.c. | [] |
|
CVE-2018-21096 | Certain NETGEAR devices are affected by CSRF. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10. | [
"cpe:2.3:o:netgear:wac120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wac505_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnap210_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnap210:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndap620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndap620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnd930_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnd930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*"
] |
|
GHSA-xxwr-v6hc-32hm | Dell Storage Integration Tools for VMware (DSITV) 06.01.00.016 contain an information disclosure vulnerability. A local low-privileged malicious user could potentially exploit this vulnerability to retrieve an encryption key that could aid in further attacks. | [] |
|
CVE-2025-23249 | NVIDIA NeMo Framework contains a vulnerability where a user could cause a deserialization of untrusted data by remote code execution. A successful exploit of this vulnerability might lead to code execution and data tampering. | [] |
|
GHSA-chg5-w539-53mr | A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to inject malicious code via a network.We have already fixed the vulnerability in the following version:
Video Station 5.7.2 ( 2023/11/23 ) and later | [] |
|
CVE-2019-6547 | Delta Industrial Automation CNCSoft, CNCSoft ScreenEditor Version 1.00.84 and prior. An out-of-bounds read vulnerability may cause the software to crash due to lacking user input validation for processing project files. | [
"cpe:2.3:a:deltaww:screeneditor:*:*:*:*:*:*:*:*"
] |
|
GHSA-735q-mc2p-r2jc | Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.74, R8900 before 1.0.4.28, R9000 before 1.0.4.28, XR500 before 2.3.2.56, XR700 before 1.0.1.10, and RAX120 before 1.0.0.78. | [] |
|
CVE-2023-20027 | Cisco IOS XE Software Virtual Fragmentation Reassembly Denial of Service Vulnerability | A vulnerability in the implementation of the IPv4 Virtual Fragmentation Reassembly (VFR) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper reassembly of large packets that occurs when VFR is enabled on either a tunnel interface or on a physical interface that is configured with a maximum transmission unit (MTU) greater than 4,615 bytes. An attacker could exploit this vulnerability by sending fragmented packets through a VFR-enabled interface on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. | [
"cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.10s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.8c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c8200-1n-4t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c8200l-1n-4t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c8500l-8s4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*"
] |
CVE-2013-1389 | Unspecified vulnerability in Adobe ColdFusion 9.0 before Update 11, 9.0.1 before Update 10, 9.0.2 before Update 5, and 10 before Update 10 allows remote attackers to execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:adobe:coldfusion:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:9.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:9.0.1:update_9:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:9.0.2:update_4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:10.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:10.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:coldfusion:10.0:update4:*:*:*:*:*:*"
] |
|
GHSA-8jf3-x896-4634 | BMC Track-It! 11.4 before Hotfix 3 exposes an unauthenticated .NET remoting configuration service (ConfigurationService) on port 9010. This service contains a method that can be used to retrieve a configuration file that contains the application database name, username and password as well as the domain administrator username and password. These are encrypted with a fixed key and IV ("NumaraIT") using the DES algorithm. The domain administrator username and password can only be obtained if the Self-Service component is enabled, which is the most common scenario in enterprise deployments. | [] |
|
CVE-2008-6074 | Directory traversal vulnerability in frame.php in phpcrs 2.06 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the importFunction parameter. | [
"cpe:2.3:a:phpcrs:phpcrs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcrs:phpcrs:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcrs:phpcrs:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcrs:phpcrs:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcrs:phpcrs:2.02:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcrs:phpcrs:2.03:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcrs:phpcrs:2.04:*:*:*:*:*:*:*",
"cpe:2.3:a:phpcrs:phpcrs:2.05:*:*:*:*:*:*:*"
] |
|
CVE-2022-49500 | wl1251: dynamically allocate memory used for DMA | In the Linux kernel, the following vulnerability has been resolved:
wl1251: dynamically allocate memory used for DMA
With introduction of vmap'ed stacks, stack parameters can no
longer be used for DMA and now leads to kernel panic.
It happens at several places for the wl1251 (e.g. when
accessed through SDIO) making it unuseable on e.g. the
OpenPandora.
We solve this by allocating temporary buffers or use wl1251_read32().
Tested on v5.18-rc5 with OpenPandora. | [] |
CVE-2003-0212 | handleAccept in rinetd before 0.62 does not properly resize the connection list when it becomes full and sets an array index incorrectly, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large number of connections. | [
"cpe:2.3:a:rinetd:rinetd:0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:rinetd:rinetd:0.61:*:*:*:*:*:*:*"
] |
|
CVE-2020-29611 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, iCloud for Windows 12.0, watchOS 7.2. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-0909 | Cross-site scripting (XSS) vulnerability in browse.asp in Schoolwires Academic Portal allows remote attackers to inject arbitrary web script or HTML via the c parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:schoolwires:academic_portal:*:*:*:*:*:*:*:*"
] |
|
GHSA-jffc-hfc6-pjf5 | Cross-site scripting (XSS) vulnerability in Simple Machines Forum (SMF) 2.0.2 allows remote attackers to inject arbitrary web script or HTML via the scheduled parameter to index.php. | [] |
|
GHSA-hfrp-5qw2-x2qm | A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause a stack-based buffer overflow, potentially leading to remote code execution when an attacker sends specially crafted alarm cache data messages. Affected Products: IGSS Data Server - IGSSdataServer.exe (Versions prior to V15.0.0.22170) | [] |
|
CVE-2023-1246 | Files or Directories Accessible to External Parties in Saysis Starcities | Files or Directories Accessible to External Parties vulnerability in Saysis Starcities allows Collect Data from Common Resource Locations.This issue affects Starcities: through 1.3.
| [
"cpe:2.3:a:saysis:starcities:*:*:*:*:*:*:*:*"
] |
CVE-2013-3119 | Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3114. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
] |
|
GHSA-44qr-8pf6-6q33 | The Cpanel::JSON::XS package before 4.33 for Perl performs out-of-bounds accesses in a way that allows attackers to obtain sensitive information or cause a denial of service. | [] |
|
CVE-2023-42651 | In engineermode, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | [
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-42555 | A Cross-Site Request Forgery (CSRF) in the component admin_room_removed.php of Hotel Management System commit 91caab8 allows attackers to escalate privileges. | [
"cpe:2.3:a:vaibhavverma9999:hotel_management_system:*:*:*:*:*:*:*:*"
] |
|
GHSA-7p33-98c3-h5r5 | IBM Sterling B2B Integrator Standard Edition 5.2.6.0 through 6.1.1.0 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 207506. | [] |
|
GHSA-j4x7-chwp-xcr5 | An issue was discovered in the CommentBox extension for MediaWiki through 1.35.2. Via crafted configuration variables, a malicious actor could introduce XSS payloads into various layers. | [] |
|
CVE-2018-21102 | NETGEAR ReadyNAS devices before 6.9.3 are affected by CSRF. | [
"cpe:2.3:o:netgear:readynas_os_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-5wg2-pmq5-5v8v | splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions. | [] |
|
GHSA-fmh2-qxcv-pr3h | FOSCAM FHD X1 1.14.2.4 devices allow attackers (with physical UART access) to login via the ipc.fos~ password. | [] |
|
CVE-2020-6116 | An arbitrary code execution vulnerability exists in the rendering functionality of Nitro Software, Inc.’s Nitro Pro 13.13.2.242. When drawing the contents of a page using colors from an indexed colorspace, the application can miscalculate the size of a buffer when allocating space for its colors. When using this allocated buffer, the application can write outside its bounds and cause memory corruption which can lead to code execution. A specially crafted document must be loaded by a victim in order to trigger this vulnerability. | [
"cpe:2.3:a:gonitro:nitro_pro:13.13.2.242:*:*:*:*:*:*:*",
"cpe:2.3:a:gonitro:nitro_pro:13.16.2.300:*:*:*:*:*:*:*"
] |
|
GHSA-7qxw-w45x-p9g9 | Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow. | [] |
|
CVE-2021-40968 | Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the newpassword2 parameter. | [
"cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.