id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2018-9529 | In ixheaacd_individual_ch_stream of ixheaacd_channel.c there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-112551874 | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-2209 | Buffer overflow in igcore15d.dll 15.1.2.0 and 15.2.0.0 for AccuSoft ImageGear, as used in Corel Paint Shop Pro Photo 11.20 and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted .CLP file. NOTE: some details were obtained from third party sources. | [
"cpe:2.3:a:accusoft:imagegear:*:*:*:*:*:*:*:*",
"cpe:2.3:a:corel:paint_shop_pro:11.20:*:*:*:*:*:*:*"
] |
|
CVE-2015-2293 | Multiple cross-site request forgery (CSRF) vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote attackers to hijack the authentication of certain users for requests that conduct SQL injection attacks via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page. | [
"cpe:2.3:a:yoast:wordpress_seo:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:wordpress_seo:1.6.0:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:wordpress_seo:1.6.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:wordpress_seo:1.6.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:wordpress_seo:1.6.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:wordpress_seo:1.7.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:wordpress_seo:1.7.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:wordpress_seo:1.7.3:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:wordpress_seo:1.7.3.1:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:wordpress_seo:1.7.3.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yoast:wordpress_seo:1.7.3.3:*:*:*:*:wordpress:*:*"
] |
|
GHSA-cjrc-87qf-22gg | TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_ The 41A414 function. | [] |
|
CVE-2021-38969 | IBM Spectrum Virtualize 8.2, 8.3, and 8.4 could allow an attacker to allow unauthorized access due to the reuse of support generated credentials. IBM X-Force ID: 212609. | [
"cpe:2.3:a:ibm:spectrum_virtualize:8.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_virtualize:8.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_virtualize:8.4.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2014-8951 | Unspecified vulnerability in Check Point Security Gateway R75, R76, R77, and R77.10, when UserCheck is enabled and the (1) Application Control, (2) URL Filtering, (3) DLP, (4) Threat Emulation, (5) Anti-Bot, or (6) Anti-Virus blade is used, allows remote attackers to cause a denial of service (fwk0 process crash, core dump, and restart) via a redirect to the UserCheck page. | [
"cpe:2.3:a:checkpoint:security_gateway:r75:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:security_gateway:r76:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:security_gateway:r77:*:*:*:*:*:*:*",
"cpe:2.3:a:checkpoint:security_gateway:r77.10:*:*:*:*:*:*:*"
] |
|
CVE-2020-2595 | Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: GraalVM Compiler). The supported version that is affected is 19.3.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. While the vulnerability is in Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GraalVM Enterprise Edition accessible data. CVSS 3.0 Base Score 5.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:graalvm:19.3.0.2:*:*:*:enterprise:*:*:*"
] |
|
GHSA-c69h-fp8v-vx97 | kcleanup.cpp in KDirStat 2.7.0 does not properly quote strings when deleting a directory, which allows remote attackers to execute arbitrary commands via a " (double quote) character in the directory name, a different vulnerability than CVE-2014-2528. | [] |
|
CVE-2025-39462 | WordPress Smart Agreements plugin <= 1.0.3 - Local File Inclusion vulnerability | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in teamzt Smart Agreements allows PHP Local File Inclusion. This issue affects Smart Agreements: from n/a through 1.0.3. | [] |
CVE-2019-10877 | In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled. | [
"cpe:2.3:a:teeworlds:teeworlds:0.7.2:*:*:*:*:*:*:*"
] |
|
GHSA-c3vg-6xr9-vmj9 | Stack-based buffer overflow in Mini-Stream Ripper 3.0.1.1 allows remote attackers to execute arbitrary code via a long entry in a .pls file. | [] |
|
CVE-2024-38460 | In SonarQube before 10.4 and 9.9.4 LTA, encrypted values generated using the Settings Encryption feature are potentially exposed in cleartext as part of the URL parameters in the logs (such as SonarQube Access Logs, Proxy Logs, etc). | [
"cpe:2.3:a:sonarsource:sonarqube:*:*:*:*:*:*:*:*"
] |
|
GHSA-97j3-hcxr-rx9m | Stack-based buffer overflow in Justsystem Ichitaro 9.x through 13.x, Ichitaro 2004, 2005, 2006, and Government 2006; Ichitaro for Linux; and FormLiner before 20060818 allows remote attackers to execute arbitrary code via long Unicode strings in a crafted document, as being actively exploited by malware such as Trojan.Tarodrop. NOTE: some details are obtained from third party information. | [] |
|
CVE-2018-16028 | Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-9015 | Drupal 6.x before 6.34 and 7.x before 7.34 allows remote attackers to hijack sessions via a crafted request, as demonstrated by a crafted request to a server that supports both HTTP and HTTPS sessions. | [
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-hw45-72c5-h6pw | Papoo CMS 3.6, and possibly earlier, does not verify user privileges when accessing the backend administration plugins, which allows remote authenticated users to (1) read the entire database by accessing the database backup plugin via a devtools/templates/newdump_backend.html argument in the template parameter to interna/plugin.php, (2) create plugins, (3) remove plugins, (4) enable debug mode, and have other unspecified impact. | [] |
|
GHSA-3453-7fw7-w5j4 | Improper Resolution of Path Equivalence in GitHub repository microweber-dev/whmcs_plugin prior to 0.0.4. | [] |
|
GHSA-7pmf-v687-c5v4 | fmwlan.c on D-Link DIR-615Jx10 devices has a stack-based buffer overflow via the formWlanSetup webpage parameter when f_radius_ip1 is malformed. | [] |
|
GHSA-h97w-669f-c7g8 | A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'. | [] |
|
CVE-2017-10953 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.0.14878. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the gotoURL method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5030. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:8.3.0.14878:*:*:*:*:*:*:*"
] |
|
CVE-2022-4041 | Privilege Escalation Vulnerability in Hitachi Storage Plug-in for VMware vCenter | Incorrect Privilege Assignment vulnerability in Hitachi Storage Plug-in for VMware vCenter allows remote authenticated users to cause privilege escalation.
This issue affects Hitachi Storage Plug-in for VMware vCenter: from 04.8.0 before 04.9.1.
| [
"cpe:2.3:a:hitachi:storage_plug-in:04.8.0:*:*:*:*:vmware_vcenter:*:*",
"cpe:2.3:a:hitachi:storage_plug-in:04.9.0:*:*:*:*:vmware_vcenter:*:*"
] |
CVE-2021-1217 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. | [
"cpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w_wireless-n_vpn_firewall:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_wireless-n_multifunction_vpn_router_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w_wireless-n_multifunction_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*"
] |
CVE-2017-9076 | The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-7r63-qvqc-2fch | Missing Authorization vulnerability in Shahjada Live Forms. This issue affects Live Forms: from n/a through 4.8.5. | [] |
|
GHSA-93px-8x98-j7p2 | A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. | [] |
|
CVE-2025-5436 | Multilaser Sirius RE016 cstecgi.cgi information disclosure | A vulnerability was found in Multilaser Sirius RE016 MLT1.0. It has been rated as problematic. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
CVE-2022-21884 | Local Security Authority Subsystem Service Elevation of Privilege Vulnerability | Local Security Authority Subsystem Service Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
GHSA-h7f9-rm4q-fwqw | SQL injection vulnerability in index.php in the com_profile component for Joomla! allows remote attackers to execute arbitrary SQL commands via the oid parameter. | [] |
|
GHSA-pgrc-mvjg-qfr7 | library/glob.html in the Python 2 and 3 documentation before 2016 has potentially misleading information about whether sorting occurs, as demonstrated by irreproducible cancer-research results. NOTE: the effects of this documentation cross application domains, and thus it is likely that security-relevant code elsewhere is affected. This issue is not a Python implementation bug, and there are no reports that NMR researchers were specifically relying on library/glob.html. In other words, because the older documentation stated "finds all the pathnames matching a specified pattern according to the rules used by the Unix shell," one might have incorrectly inferred that the sorting that occurs in a Unix shell also occurred for glob.glob. There is a workaround in newer versions of Willoughby nmr-data_compilation-p2.py and nmr-data_compilation-p3.py, which call sort() directly. | [] |
|
CVE-2019-15662 | An issue was discovered in Rivet Killer Control Center before 2.1.1352. IOCTL 0x120444 in KfeCo10X64.sys fails to validate an offset passed as a parameter during a memory operation, leading to an arbitrary read primitive that can be used as part of a chain to escalate privileges. | [
"cpe:2.3:a:killernetworking:killer_control_center:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-24004 | jshERP v3.3 is vulnerable to SQL Injection. The com.jsh.erp.controller.DepotHeadController: com.jsh.erp.utils.BaseResponseInfo findInOutDetail() function of jshERP does not filter `column` and `order` parameters well enough, and an attacker can construct malicious payload to bypass jshERP's protection mechanism in `safeSqlParse` method for sql injection. | [
"cpe:2.3:a:jishenghua:jsherp:3.3:*:*:*:*:*:*:*"
] |
|
GHSA-f88m-j96j-6cvj | Buffer overflow in the ulSetError function in util/ulError.cxx in PLIB 1.8.5, as used in TORCS 1.3.1 and other products, allows user-assisted remote attackers to execute arbitrary code via vectors involving a long error message, as demonstrated by a crafted acc file for TORCS. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2008-0091 | Directory traversal vulnerability in download2.php in AGENCY4NET WEBFTP 1 allows remote attackers to read and delete arbitrary files via a .. (dot dot) in the file parameter. | [
"cpe:2.3:a:agency4net:webftp:1:*:*:*:*:*:*:*"
] |
|
GHSA-cf44-r485-c599 | ieee80211_input.c in MadWifi before 0.9.3 does not properly process Channel Switch Announcement Information Elements (CSA IEs), which allows remote attackers to cause a denial of service (loss of communication) via a Channel Switch Count less than or equal to one, triggering a channel change. | [] |
|
CVE-2023-22103 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-5002 | The lynx gem before 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes. | [
"cpe:2.3:a:lynx_project:lynx:*:*:*:*:*:ruby:*:*"
] |
|
CVE-2017-2800 | A specially crafted x509 certificate can cause a single out of bounds byte overwrite in wolfSSL through 3.10.2 resulting in potential certificate validation vulnerabilities, denial of service and possible remote code execution. In order to trigger this vulnerability, the attacker needs to supply a malicious x509 certificate to either a server or a client application using this library. | [
"cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*"
] |
|
GHSA-9hm7-6x57-36rx | Skia, as used in Google Chrome before 22.0.1229.92, does not properly render text, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors. | [] |
|
CVE-2016-8341 | An issue was discovered in Ecava IntegraXor Version 5.0.413.0. The Ecava IntegraXor web server has parameters that are vulnerable to SQL injection. If the queries are not sanitized, the host's database could be subject to read, write, and delete commands. | [
"cpe:2.3:a:ecava:integraxor:5.0.413.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-2899 | An exploitable integer overflow exists in the TIFF loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.tif' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability. | [
"cpe:2.3:a:blender:blender:2.78c:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-20568 | An issue was discovered on Samsung mobile devices with O(8.x) and P(9.0) devices (Exynos and Qualcomm chipsets) software. A race condition causes a Use-After-Free. The Samsung ID is SVE-2019-15067 (September 2019). | [
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2005-0310 | Exponent 0.95 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) search.info.php, (2) permissions.info.php, (3) security.info.php, (4) formcontrol.php, or (5) file_modules.php, which reveals the path in an error message because the pathos_core_version variable is undefined. | [
"cpe:2.3:a:exponent:exponent:0.95:*:*:*:*:*:*:*"
] |
|
GHSA-h92q-fgpp-qhrq | CoreDNS Cache Poisoning via a birthday attack | CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack. | [] |
CVE-2011-4168 | Directory traversal vulnerability in hpmpa/jobDelivery/Default.asp in HP Managed Printing Administration before 2.6.4 allows remote attackers to create arbitrary files via crafted form data. | [
"cpe:2.3:a:hp:managed_printing_administration:*:*:*:*:*:*:*:*"
] |
|
GHSA-ggw4-86v7-f9rj | A vulnerability, which was classified as critical, has been found in Fanli2012 native-php-cms 1.0. This issue affects some unknown processing of the file /fladmin/article_dodel.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2015-4268 | Multiple cross-site scripting (XSS) vulnerabilities in the Infra Admin UI in Cisco Identity Services Engine (ISE) 1.2(1.198) and 1.3(0.876) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters in a (1) GET or (2) POST request, aka Bug ID CSCus16052. | [
"cpe:2.3:a:cisco:identity_services_engine_software:1.2\\(1.198\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine_software:1.3\\(0.876\\):*:*:*:*:*:*:*"
] |
|
GHSA-gpr4-gfq8-c66q | Buffer overflow in Kerberos 4 KDC program allows remote attackers to cause a denial of service via the e_msg variable in the kerb_err_reply function. | [] |
|
CVE-2021-1151 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Stored Cross-Site Scripting Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. The vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. | [
"cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
] |
CVE-2023-44248 | An improper access control vulnerability [CWE-284] in FortiEDRCollectorWindows version 5.2.0.4549 and below, 5.0.3.1007 and below, 4.0 all may allow a local attacker to prevent the collector service to start in the next system reboot by tampering with some registry keys of the service. | [
"cpe:2.3:a:fortinet:fortiedr:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:fortinet:fortiedr:4.0.0:*:*:*:*:windows:*:*"
] |
|
CVE-2023-5862 | Missing Authorization in hamza417/inure | Missing Authorization in GitHub repository hamza417/inure prior to Build95. | [
"cpe:2.3:a:hamza417:inure:build44:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build45:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build46:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build47:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build48:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build49:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build51:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build52:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build53:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build55:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build56:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build57:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build58:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build59:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build60:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build61:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build62:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build63:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build64:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build65:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build66:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build67:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build68:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build69:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build70:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build71:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build72:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build73:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build74:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build75:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build76:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build77:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build78:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build79:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build80:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build83:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build85:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build86:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build87:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build88:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build89:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build92:*:*:*:*:android:*:*",
"cpe:2.3:a:hamza417:inure:build94:*:*:*:*:android:*:*"
] |
GHSA-f347-937j-m78g | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fatek Automation FvDesigner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of FPJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18178. | [] |
|
CVE-2023-48360 | multimedia player has a UAF vulnerability |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer. | [
"cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*"
] |
CVE-2019-18916 | A potential security vulnerability has been identified for HP LaserJet Solution Software (for certain HP LaserJet Printers) which may lead to unauthorized elevation of privilege on the client. | [
"cpe:2.3:o:hp:color_laserjet_pro_mfp_m277_b3q11a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_pro_mfp_m277_b3q11a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:color_laserjet_pro_mfp_m277_b3q11v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_pro_mfp_m277_b3q11v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:color_laserjet_pro_mfp_m277_b3q10a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_pro_mfp_m277_b3q10a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:color_laserjet_pro_mfp_m277_b3q10v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_pro_mfp_m277_b3q10v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:color_laserjet_pro_mfp_m277_b3q17a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:color_laserjet_pro_mfp_m277_b3q17a:-:*:*:*:*:*:*:*"
] |
|
GHSA-mf23-wm84-g9x3 | IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136. | [] |
|
CVE-2017-13038 | The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:handle_mlppp(). | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] |
|
GHSA-hqrm-rrc5-v8pg | In the Linux kernel, the following vulnerability has been resolved:drm/qxl: Add check for drm_cvt_modeAdd check for the return value of drm_cvt_mode() and return the error if
it fails in order to avoid NULL pointer dereference. | [] |
|
GHSA-4q74-745q-555q | Heap-based buffer overflow in the OpenGifFile function in BiGif.dll in Black Ice Document Imaging SDK 10.95 allows remote attackers to execute arbitrary code via a long string argument to the GetNumberOfImagesInGifFile method in the BIImgFrm Control ActiveX control in biimgfrm.ocx. NOTE: some of these details are obtained from third party information. | [] |
|
GHSA-wp3j-rvfp-624h | RubyGems vulnerable to DNS hijack attack | RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack." | [] |
CVE-2004-0653 | Solaris 9, when configured as a Kerberos client with patch 112908-12 or 115168-03 and using pam_krb5 as an "auth" module with the debug feature enabled, records passwords in plaintext, which could allow local users to gain other user's passwords by reading log files. | [
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*"
] |
|
GHSA-9c9c-fvg8-fgwr | Insertion of Sensitive Information Into Sent Data vulnerability in ExtremePACS Extreme XDS allows Retrieve Embedded Sensitive Data.This issue affects Extreme XDS: before 3933. | [] |
|
GHSA-9qcm-mjc2-vxjr | Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file. | [] |
|
CVE-2022-20885 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. | [
"cpe:2.3:o:cisco:rv215w_firmware:1.0.3.55:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.0.3.55:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_firmware:1.0.3.55:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.0.3.55:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
] |
GHSA-frch-hv74-gh2h | SQL injection vulnerability in search.php in MyBulletinBoard (MyBB) 1.04 allows remote attackers to execute arbitrary SQL commands via the forums[] parameter. | [] |
|
GHSA-5chv-gxjv-3g37 | A vulnerability has been found in SourceCodester Prison Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /Employee/changepassword.php. The manipulation of the argument txtold_password/txtnew_password/txtconfirm_password leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263488. | [] |
|
CVE-2020-9428 | In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] |
|
CVE-2001-1103 | FTP Voyager ActiveX control before 8.0, when it is marked as safe for scripting (the default) or if allowed by the IObjectSafety interface, allows remote attackers to execute arbitrary commands. | [
"cpe:2.3:a:rhinosoft:ftp_voyager:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-46889 | Adobe Experience Manager | Improper Access Control (CWE-284) | Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized elevated access. Exploitation of this issue does not require user interaction. | [] |
GHSA-jfgj-q49c-3779 | An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. There is a use-after-free when SASL messages are received in an unexpected order. | [] |
|
GHSA-8phm-v3cp-486q | Hospital's Patient Records Management System v1.0 is vulnerable to SQL Injection via /hprms/classes/Master.php?f=delete_patient_history. | [] |
|
CVE-2019-15972 | Cisco Unified Communications Manager SQL Injection Vulnerability | A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability exists because the web-based management interface improperly validates SQL values. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database. | [
"cpe:2.3:a:cisco:unified_communications_manager:10.5\\(2.10000.5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.10000.6\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:12.0\\(1.10000.10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:12.5\\(1.10000.22\\):*:*:*:*:*:*:*"
] |
CVE-2025-23428 | WordPress QMean plugin <= 2.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound QMean – WordPress Did You Mean allows Reflected XSS. This issue affects QMean – WordPress Did You Mean: from n/a through 2.0. | [] |
GHSA-4435-68hj-c5gh | Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a (1) Accellent 5Views (aka .5vw) file, (2) I4B trace file, or (3) NETMON 2 capture file. | [] |
|
GHSA-29jj-mp7x-cw58 | D-Link DIR-X3260 prog.cgi SetWLanRadioSecurity Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-X3260 routers. Authentication is required to exploit this vulnerability.The specific flaw exists within the prog.cgi binary, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of a user-supplied string before copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21595. | [] |
|
CVE-2005-4378 | SQL injection vulnerability in Page.asp in Baseline CMS 1.95 and earlier allows remote attackers to execute arbitrary SQL commands via the SiteNodeID parameter. | [
"cpe:2.3:a:nma:baseline_cms:*:*:*:*:*:*:*:*"
] |
|
GHSA-qqgw-xrxj-r5fc | Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument. | [] |
|
CVE-2014-8033 | The play/modules component in Cisco WebEx Meetings Server allows remote attackers to obtain administrator access via crafted API requests, aka Bug ID CSCuj40421. | [
"cpe:2.3:a:cisco:webex_meetings_server:-:*:*:*:*:*:*:*"
] |
|
CVE-2005-0452 | Multiple cross-site scripting (XSS) vulnerabilities in Microsoft ASP.NET (.Net) 1.0 and 1.1 to SP1 allow remote attackers to inject arbitrary HTML or web script via Unicode representations for ASCII fullwidth characters that are converted to normal ASCII characters, including ">" and "<". | [
"cpe:2.3:a:microsoft:asp.net:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net:1.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net:1.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net:1.1:sp1:*:*:*:*:*:*"
] |
|
GHSA-vxmv-r24r-j66w | Roothub v2.6 was discovered to contain a SQL injection vulnerability via the nodeTitle parameter in the parentNode() function.. | [] |
|
GHSA-g8j6-372w-jg3p | Abuse of remote unlock in Find My Mobile prior to version 7.3.13.4 allows physical attacker to unlock the device remotely by resetting the Samsung Account password with SMS verification when user lost the device. | [] |
|
CVE-2023-28640 | Permissions bypass in Apiman could enable authenticated attacker to unpermitted API Key | Apiman is a flexible and open source API Management platform. Due to a missing permissions check, an attacker with an authenticated Apiman Manager account may be able to gain access to API keys they do not have permission for if they correctly guess the URL, which includes Organisation ID, Client ID, and Client Version of the targeted non-permitted resource. While not trivial to exploit, it could be achieved by brute-forcing or guessing common names. Access to the non-permitted API Keys could allow use of other users' resources without their permission (depending on the specifics of configuration, such as whether an API key is the only form of security). Apiman 3.1.0.Final resolved this issue. Users are advised to upgrade. The only known workaround is to restrict account access.
| [
"cpe:2.3:a:apiman:apiman:3.0.0:-:*:*:*:*:*:*"
] |
GHSA-2qm8-p8fp-jq4w | The kernel in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [] |
|
CVE-2018-13707 | The mintToken function of a smart contract implementation for YSS, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:yss_project:yss:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-2860 | Insufficient policy enforcement in Cookies in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to bypass cookie prefix restrictions via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] |
|
GHSA-7jmh-px2r-wgxv | IBM Rational Engineering Lifecycle Manager 5.0 through 6.0.6 could allow a malicious user to be allowed to view any view if he knows the URL link of a the view, and access information that should not be able to see. IBM X-Force ID: 153120. | [] |
|
GHSA-5vfc-fcp9-h5q8 | Certain switch models from PLANET Technology use an insecure hashing function to hash user passwords without being salted. Remote attackers with administrator privileges can read configuration files to obtain the hash values, and potentially crack them to retrieve the plaintext passwords. | [] |
|
GHSA-w584-8fxc-44jr | Cerner medico 26.00 has a Local Buffer Overflow (issue 1 of 3). | [] |
|
CVE-2011-4339 | ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file. | [
"cpe:2.3:a:ipmitool_project:ipmitool:1.8.11:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-7rgp-4j56-fm79 | Mattermost has Improper Check for Unusual or Exceptional Conditions | Mattermost versions 10.x <= 10.2 fail to accurately reflect missing settings, which allows confusion for admins regarding a Calls security-sensitive configuration via incorrect UI reporting. | [] |
CVE-2006-1564 | Untrusted search path vulnerability in libapache2-svn 1.3.0-4 for Subversion in Debian GNU/Linux includes RPATH values under the /tmp/svn directory for the (1) mod_authz_svn.so and (2) mod_dav_svn.so modules, which might allow local users to gain privileges by installing malicious libraries in that directory. | [
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*"
] |
|
GHSA-m2cf-78xh-gv6m | extensions/renderer/runtime_custom_bindings.cc in Google Chrome before 51.0.2704.79 does not consider side effects during creation of an array of extension views, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to extensions. | [] |
|
GHSA-3x89-96hq-8v55 | Directory traversal vulnerability in PHPJabbers Appointment Scheduler 2.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the id parameter in a pjActionDownload action to the pjBackup controller. | [] |
|
GHSA-96r8-3qv9-q756 | A vulnerability in the detection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to send data directly to the kernel of an affected device. The vulnerability exists because the software improperly filters Ethernet frames sent to an affected device. An attacker could exploit this vulnerability by sending crafted packets to the management interface of an affected device. A successful exploit could allow the attacker to bypass the Layer 2 (L2) filters and send data directly to the kernel of the affected device. A malicious frame successfully delivered would make the target device generate a specific syslog entry. | [] |
|
CVE-2010-0699 | Cross-site scripting (XSS) vulnerability in index.php in VideoSearchScript Pro 3.5 allows remote attackers to inject arbitrary web script or HTML via the q parameter. | [
"cpe:2.3:a:videosearchscript:videosearchscript_pro:3.5:*:*:*:*:*:*:*"
] |
|
CVE-2020-26893 | An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor could use a properly signed copy of ClamXAV 2 (running with an injected malicious dylib) to communicate with ClamXAV 3's helper tool and perform privileged operations. This occurs because of inadequate client verification in the helper tool. | [
"cpe:2.3:a:clamxav:clamxav:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-19324 | Xmidt cjwt through 1.0.1 before 2019-11-25 maps unsupported algorithms to alg=none, which sometimes leads to untrusted accidental JWT acceptance. | [
"cpe:2.3:a:xmidt:cjwt:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-36000 | Null dereference on MLIR on empty function attributes in TensorFlow | TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it gives a null dereference. We have patched the issue in GitHub commit aed36912609fc07229b4d0a7b44f3f48efc00fd0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*"
] |
GHSA-8p2r-rvjc-5v8f | Stored XSS in "Name", "Group Name" & "Title" in GitHub repository polonel/trudesk prior to v1.2.0. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse. | [] |
|
GHSA-47hv-qhm4-5v8h | The kernel-mode drivers in Microsoft Windows Server 2012 and Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." | [] |
|
CVE-2025-48275 | WordPress Visual Header <= 1.3 - Broken Access Control Vulnerability | Missing Authorization vulnerability in dastan800 Visual Header allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Visual Header: from n/a through 1.3. | [] |
GHSA-pcqh-qfj4-8h2g | An issue in Turing Video Turing Edge+ EVC5FD v.1.38.6 allows remote attacker to execute arbitrary code and obtain sensitive information via the cloud connection components. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.