id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-c924-vw78-h587 | Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 through 6.1, and (5) ZoneAlarm 6.0 allow remote attackers to bypass the "Advanced Program Control and OS Firewall filters" setting via URLs in "HTML Modal Dialogs" (window.location.href) contained within JavaScript tags. | [] |
|
CVE-2024-33543 | WordPress WP Time Slots Booking Form plugin <= 1.2.06 - Broken Access Control vulnerability | Missing Authorization vulnerability in CodePeople WP Time Slots Booking Form.This issue affects WP Time Slots Booking Form: from n/a through 1.2.06. | [
"cpe:2.3:a:codepeople:wp_time_slots_booking_form:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codepeople:wp_time_slots_booking_form:*:*:*:*:*:wordpress:*:*"
] |
CVE-2009-2117 | uye_paneli.php in phPortal 1.0 allows remote attackers to bypass authentication and obtain administrative access by setting the kulladi cookie to a valid username. | [
"cpe:2.3:a:phportal:phportal:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-17925 | PHP Scripts Mall Professional Service Script has XSS via the admin/general_settingupd.php website_title parameter. | [
"cpe:2.3:a:ordermanagementscript:professional_service_script:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-13826 | An XML external entity vulnerability in the XOG functionality, in CA PPM 14.3 and below, 14.4, 15.1, 15.2 CP5 and below, and 15.3 CP2 and below, allows remote attackers to conduct server side request forgery attacks. | [
"cpe:2.3:a:broadcom:project_portfolio_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:project_portfolio_management:14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:project_portfolio_management:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:project_portfolio_management:15.2:cp5:*:*:*:*:*:*",
"cpe:2.3:a:ca:project_portfolio_management:15.3:cp2:*:*:*:*:*:*"
] |
|
GHSA-7fmv-j8g9-pp43 | inetd on Sun Solaris 10, when debug logging is enabled, allows local users to write to arbitrary files via a symlink attack on the /var/tmp/inetd.log temporary file. | [] |
|
CVE-2022-2760 | In affected versions of Octopus Deploy it is possible to reveal the Space ID of spaces that the user does not have access to view in an error message when a resource is part of another Space. | [
"cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-m3qq-9rcv-84v8 | Improper handling of received malformed FTMR request frame can lead to reachable assertion while responding with FTM1 frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking | [] |
|
CVE-2021-43701 | CSZ CMS 1.2.9 has a Time and Boolean-based Blind SQL Injection vulnerability in the endpoint /admin/export/getcsv/article_db, via the fieldS[] and orderby parameters. | [
"cpe:2.3:a:cszcms:csz_cms:1.2.9:*:*:*:*:*:*:*"
] |
|
GHSA-wvph-mf6h-fpww | The WP Church Donation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several donation form submission parameters in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-r4p3-fhf3-gwvv | Sourcecodester Free and Open Source inventory management system 1.0 is vulnerable to Cross Site Scripting (XSS) via the Add supplier function. | [] |
|
CVE-2021-4033 | Cross-Site Request Forgery (CSRF) in kevinpapst/kimai2 | kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) | [
"cpe:2.3:a:kimai:kimai_2:*:*:*:*:*:*:*:*"
] |
CVE-2001-1190 | The default PAM files included with passwd in Mandrake Linux 8.1 do not support MD5 passwords, which could result in a lower level of password security than intended. | [
"cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*"
] |
|
GHSA-gcvv-jgrq-94cr | IBM RELM 4.0, 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [] |
|
GHSA-29w6-c52g-m8jc | C5 Firefly III CSV Injection. | SummaryCSV injection is a vulnerability where untrusted user input in CSV files can lead to unauthorized access or data manipulation.
In my subsequent testing of the application.DetailsI discovered that there is an option to "Export Data" from the web app to your personal computer, which exports a "csv" file that can be opened with Excel software that supports macros.P.S
I discovered that the web application's is offering a demo-site that anyone may access to play with the web application. So, there's a chance that someone will export the data (CVS) from the demo site and execute it on their PC, giving the malicious actor a complete control over their machine. (if a user enters a malicious payload to the website).PoCYou can check out my vulnerability report if you need more details/PoC with screenshots: (removed by JC5)ImpactAn attacker can exploit this by entering a specially crafted payload to one of the fields, and when a user export the csv file using the "Export Data" function, the attacker can potentiality can RCE.Addendum by JC5, the developer of Firefly IIIThere is zero impact on normal users, even on vulnerable versions. | [] |
CVE-2021-29822 | IBM Tivoli Netcool/OMNIbus_GUI 8.1.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204349. | [
"cpe:2.3:a:ibm:tivoli_netcool\\/omnibus_gui:8.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-r4hr-57mh-jv58 | High Availability Linux Project Heartbeat 1.2.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files. | [] |
|
CVE-2025-4268 | TOTOLINK A720R cstecgi.cgi missing authentication | A vulnerability has been found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input RebootSystem leads to missing authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-j8pf-3vjv-773q | , aka 'Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-17134, CVE-2020-17136. | [] |
|
CVE-2014-2201 | The Message Transfer Service (MTS) in Cisco NX-OS before 6.2(7) on MDS 9000 devices and 6.0 before 6.0(2) on Nexus 7000 devices allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a large volume of crafted traffic, aka Bug ID CSCtw98915. | [
"cpe:2.3:o:cisco:nx-os:6.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(1n\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(3n\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:6.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*"
] |
|
GHSA-rh57-95h4-wx3g | The read_header function in libavcodec/shorten.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via an invalid channel count, related to "freeing invalid addresses." | [] |
|
CVE-2023-6309 | moses-smt mosesdecoder trans_result.php os command injection | A vulnerability, which was classified as critical, was found in moses-smt mosesdecoder up to 4.0. This affects an unknown part of the file contrib/iSenWeb/trans_result.php. The manipulation of the argument input1 leads to os command injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246135. | [
"cpe:2.3:a:moses-smt:mosesdecoder:*:*:*:*:*:*:*:*"
] |
GHSA-5pf8-g8g3-8798 | Deserialization of Untrusted Data vulnerability in G5Theme ERE Recently Viewed – Essential Real Estate Add-On.This issue affects ERE Recently Viewed – Essential Real Estate Add-On: from n/a through 1.3. | [] |
|
CVE-2010-1636 | The btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the btrfs functionality in the Linux kernel 2.6.29 through 2.6.32, and possibly other versions, does not ensure that a cloned file descriptor has been opened for reading, which allows local users to read sensitive information from a write-only file descriptor. | [
"cpe:2.3:o:linux:linux_kernel:2.6.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.29.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.30.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.31.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*"
] |
|
CVE-2004-1377 | The (1) fixps (aka fixps.in) and (2) psmandup (aka psmandup.in) scripts in a2ps before 4.13 allow local users to overwrite arbitrary files via a symlink attack on temporary files. | [
"cpe:2.3:a:gnu:a2ps:4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:a2ps:4.13b:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-hp65-4pq5-qqw7 | Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708. | [] |
|
GHSA-ghjh-7rvr-7jmm | Missing Authorization vulnerability in RabbitLoader.This issue affects RabbitLoader: from n/a through 2.19.13. | [] |
|
GHSA-5g5j-x767-23r3 | A vulnerability has been identified in LOGO! CMR2020 (All versions < V2.2), LOGO! CMR2040 (All versions < V2.2), SIMATIC RTU 3000 family (All versions). The underlying TCP/IP stack does not properly calculate the random numbers used as ISN (Initial Sequence Numbers). An adjacent attacker with network access to the LAN interface could interfere with traffic, spoof the connection and gain access to sensitive information. | [] |
|
CVE-2021-21003 | Denial of Service Vulnerability in Phoenix Contact FL SWITCH SMCS series products | In Phoenix Contact FL SWITCH SMCS series products in multiple versions fragmented TCP-Packets may cause a Denial of Service of Web-, SNMP- and ICMP-Echo services. The switching functionality of the device is not affected. | [
"cpe:2.3:o:phoenixcontact:fl_switch_smcs_16tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smcs_16tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smcs_14tx\\/2fx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smcs_14tx\\/2fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smcs_14tx\\/2fx-sm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smcs_14tx\\/2fx-sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smcs_8gt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smcs_8gt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smcs_6gt\\/2sfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smcs_6gt\\/2sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smcs_8tx-pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smcs_8tx-pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smcs_4tx-pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smcs_4tx-pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smcs_8tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smcs_8tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smcs_6tx\\/2sfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smcs_6tx\\/2sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smn_6tx\\/2pof-pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smn_6tx\\/2pof-pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smn_8tx-pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smn_8tx-pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smn_6tx\\/2fx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smn_6tx\\/2fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_smn_6tx\\/2fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_smn_6tx\\/2fx_sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_nat_smn_8tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_nat_smn_8tx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_nat_smn_8tx-m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_nat_smn_8tx-m:-:*:*:*:*:*:*:*"
] |
GHSA-xv2m-fg2f-xrrw | The Java Remote Management Interface of all versions of Orlansoft ERP was discovered to contain a vulnerability due to insecure deserialization of user-supplied content, which can allow attackers to execute arbitrary code via a crafted serialized Java object. | [] |
|
GHSA-7qqg-m879-q5xj | Incorrect default permissions in some Intel(R) GPA software installers before version 2023.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
GHSA-www2-x2jr-73pc | 6kbbs 7.1 and 8.0 allows CSRF via portalchannel_ajax.php (id or code parameter) or admin.php (fileids parameter). | [] |
|
CVE-2023-21328 | In Package Installer, there is a possible way to determine whether an app is installed, without query permissions, due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
GHSA-69fr-p5cc-p429 | Norton, Avira, Avast and AVG Antivirus for Windows may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. | [] |
|
CVE-2019-2796 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
] |
|
CVE-2025-36573 | Dell Smart Dock Firmware, versions prior to 01.00.08.01, contain an Insertion of Sensitive Information into Log File vulnerability. A user with local access could potentially exploit this vulnerability, leading to Information disclosure. | [] |
|
CVE-2023-32354 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, iOS 16.5 and iPadOS 16.5. An app may be able to disclose kernel memory. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-6xff-36r8-rhfg | Broken access control in Advanced Authentication versions prior to 6.4.1.1 and 6.3.7.2 | [] |
|
CVE-2023-5477 | Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*"
] |
|
GHSA-g33r-c4mc-9962 | In the Linux kernel, the following vulnerability has been resolved:net: Add rx_skb of kfree_skb to raw_tp_null_args[].Yan Zhai reported a BPF prog could trigger a null-ptr-deref [0]
in trace_kfree_skb if the prog does not check if rx_sk is NULL.Commit c53795d48ee8 ("net: add rx_sk to trace_kfree_skb") added
rx_sk to trace_kfree_skb, but rx_sk is optional and could be NULL.Let's add kfree_skb to raw_tp_null_args[] to let the BPF verifier
validate such a prog and prevent the issue.Now we fail to load such a prog:libbpf: prog 'drop': -- BEGIN PROG LOAD LOG --
0: R1=ctx() R10=fp0
; int BPF_PROG(drop, struct sk_buff *skb, void *location, @ kfree_skb_sk_null.bpf.c:21
0: (79) r3 = *(u64 *)(r1 +24)
func 'kfree_skb' arg3 has btf_id 5253 type STRUCT 'sock'
1: R1=ctx() R3_w=trusted_ptr_or_null_sock(id=1)
; bpf_printk("sk: %d, %d\n", sk, sk->__sk_common.skc_family); @ kfree_skb_sk_null.bpf.c:24
1: (69) r4 = *(u16 *)(r3 +16)
R3 invalid mem access 'trusted_ptr_or_null_'
processed 2 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
-- END PROG LOAD LOG --Note this fix requires commit 838a10bd2ebf ("bpf: Augment raw_tp
arguments with PTR_MAYBE_NULL").[0]:
BUG: kernel NULL pointer dereference, address: 0000000000000010
PF: supervisor read access in kernel mode
PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
PREEMPT SMP
RIP: 0010:bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d
Call Trace:
<TASK>
? __die+0x1f/0x60
? page_fault_oops+0x148/0x420
? search_bpf_extables+0x5b/0x70
? fixup_exception+0x27/0x2c0
? exc_page_fault+0x75/0x170
? asm_exc_page_fault+0x22/0x30
? bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d
bpf_trace_run4+0x68/0xd0
? unix_stream_connect+0x1f4/0x6f0
sk_skb_reason_drop+0x90/0x120
unix_stream_connect+0x1f4/0x6f0
__sys_connect+0x7f/0xb0
__x64_sys_connect+0x14/0x20
do_syscall_64+0x47/0xc30
entry_SYSCALL_64_after_hwframe+0x4b/0x53 | [] |
|
GHSA-53fg-3j53-939q | libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds. | [] |
|
GHSA-2xq3-5ppq-3g78 | The ANSendForBrowserReview method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, and CVE-2015-7623. | [] |
|
GHSA-g662-fqhc-2vp3 | Incorrectly limiting the path to a restricted directory vulnerability in Badger Meter Monitool that affects versions up to 4.6.3 and earlier. This vulnerability allows an authenticated attacker to retrieve any file from the device using the download-file functionality. | [] |
|
CVE-2018-14072 | libsixel 1.8.1 has a memory leak in sixel_decoder_decode in decoder.c, image_buffer_resize in fromsixel.c, and sixel_decode_raw in fromsixel.c. | [
"cpe:2.3:a:libsixel_project:libsixel:1.8.1:*:*:*:*:*:*:*"
] |
|
CVE-2008-3106 | Unspecified vulnerability in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier allows remote attackers to access URLs via unknown vectors involving processing of XML data by an untrusted (1) application or (2) applet, a different vulnerability than CVE-2008-3105. | [
"cpe:2.3:a:sun:jdk:*:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*"
] |
|
GHSA-hcgf-86c7-xfvc | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
|
CVE-2024-52376 | WordPress Boat Rental Plugin for WordPress plugin <= 1.0.1 - Arbitrary File Upload vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in cmsMinds Boat Rental Plugin for WordPress allows Upload a Web Shell to a Web Server.This issue affects Boat Rental Plugin for WordPress: from n/a through 1.0.1. | [
"cpe:2.3:a:cmsminds:boat_rental_plugin_for_wordpress:*:*:*:*:*:*:*:*"
] |
CVE-2022-1750 | The Sticky Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ popup_title' parameter in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admin level capabilities and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue mostly affects sites where unfiltered_html has been disabled for administrators and on multi-site installations where unfiltered_html is disabled for administrators. | [
"cpe:2.3:a:sticky_popup_project:sticky_popup:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2015-1659 | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1662 and CVE-2015-1665. | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
CVE-2017-11185 | The gmp plugin in strongSwan before 5.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature. | [
"cpe:2.3:a:strongswan:strongswan:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-8710 | A remote code execution issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The plugin implemented a page redraw AJAX function accessible to anyone without any authentication. WordPress shortcode markup in the "shortcode" parameters would be evaluated. Normally unauthenticated users can't evaluate shortcodes as they are often sensitive. | [
"cpe:2.3:a:woocommerce-filter:woocommerce_products_filter:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2016-10579 | Chromedriver is an NPM wrapper for selenium ChromeDriver. Chromedriver before 2.26.1 downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:chromedriver_project:chromedriver:*:*:*:*:*:node.js:*:*"
] |
|
GHSA-7xm3-983m-rxjr | The regex implementation in Google V8, as used in Google Chrome before 19.0.1084.46, allows remote attackers to cause a denial of service (invalid write operation) or possibly have unspecified other impact via unknown vectors. | [] |
|
CVE-2019-14936 | Easy!Appointments 1.3.2 plugin for WordPress allows Sensitive Information Disclosure (Username and Password Hash). | [
"cpe:2.3:a:easyappointments:easy\\!appointments:1.3.2:*:*:*:*:wordpress:*:*"
] |
|
GHSA-4j63-gr7g-p9pj | Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 does not encrypt XML RPC sessions from operator workstations, which allows remote attackers to discover Administrator credentials by sniffing the network, aka Bug ID CSCtb83505. | [] |
|
GHSA-pgww-xf46-h92r | lxml vulnerable to Cross-site Scripting | A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code. | [] |
GHSA-vcw3-hwj8-8j82 | A SQL Injection vulnerability exists in the Graph Template component in Centreon Web 24.04.x before 24.04.3, 23.10.x before 23.10.13, 23.04.x before 23.04.19, and 22.10.x before 22.10.23. | [] |
|
GHSA-hj73-xx75-phmm | ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario. | [] |
|
CVE-2020-24352 | An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:5.0.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:5.0.0:rc1:*:*:*:*:*:*"
] |
|
CVE-2001-1229 | Buffer overflows in (1) Icecast before 1.3.9 and (2) libshout before 1.0.4 allow remote attackers to cause a denial of service (crash) and execute arbitrary code. | [
"cpe:2.3:a:icecast:icecast:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libshout:libshout:*:*:*:*:*:*:*:*"
] |
|
GHSA-883h-frwq-888p | Siemens 3568i WAP mobile phones allows remote attackers to cause a denial of service (crash) via an SMS message containing unusual characters. | [] |
|
GHSA-3fq7-xp3x-g73j | Cross-site scripting (XSS) vulnerability in wp-plugins-net/index.php in the WP Plugin Manager (wppm) plugin 1.6.4.b and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filter parameter. | [] |
|
GHSA-jrp5-65w7-pcg2 | Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. | [] |
|
GHSA-xmff-792p-8m73 | Insecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack before version 1.0.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2022-48966 | net: mvneta: Prevent out of bounds read in mvneta_config_rss() | In the Linux kernel, the following vulnerability has been resolved:
net: mvneta: Prevent out of bounds read in mvneta_config_rss()
The pp->indir[0] value comes from the user. It is passed to:
if (cpu_online(pp->rxq_def))
inside the mvneta_percpu_elect() function. It needs bounds checkeding
to ensure that it is not beyond the end of the cpu bitmap. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*"
] |
CVE-2021-3538 | A flaw was found in github.com/satori/go.uuid in versions from commit 0ef6afb2f6cdd6cdaeee3885a95099c63f18fc8c to d91630c8510268e75203009fe7daf2b8e1d60c45. Due to insecure randomness in the g.rand.Read function the generated UUIDs are predictable for an attacker. | [
"cpe:2.3:a:satori:uuid:-:*:*:*:*:go:*:*"
] |
|
CVE-2019-12788 | An issue was discovered in Photodex ProShow Producer v9.0.3797 (an application that runs with Administrator privileges). It is possible to perform a buffer overflow via a crafted file. | [
"cpe:2.3:a:photodex:proshow_producer:9.0.3797:*:*:*:*:*:*:*"
] |
|
GHSA-4h7h-x876-6f32 | Stack-based buffer overflow vulnerability in bootloader prior to SMR Jun-2024 Release 1 allows physical attackers to overwrite memory. | [] |
|
CVE-2022-26809 | Remote Procedure Call Runtime Remote Code Execution Vulnerability | Remote Procedure Call Runtime Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
CVE-2022-49416 | wifi: mac80211: fix use-after-free in chanctx code | In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: fix use-after-free in chanctx code
In ieee80211_vif_use_reserved_context(), when we have an
old context and the new context's replace_state is set to
IEEE80211_CHANCTX_REPLACE_NONE, we free the old context
in ieee80211_vif_use_reserved_reassign(). Therefore, we
cannot check the old_ctx anymore, so we should set it to
NULL after this point.
However, since the new_ctx replace state is clearly not
IEEE80211_CHANCTX_REPLACES_OTHER, we're not going to do
anything else in this function and can just return to
avoid accessing the freed old_ctx. | [] |
CVE-2019-9151 | An issue was discovered in the HDF HDF5 1.10.4 library. There is an out of bounds read in the function H5VM_memcpyvv in H5VM.c when called from H5D__compact_readvv in H5Dcompact.c. | [
"cpe:2.3:a:hdfgroup:hdf5:1.10.4:*:*:*:*:*:*:*"
] |
|
CVE-2010-1814 | WebKit in Apple iOS before 4.1 on the iPhone and iPod touch, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors involving form menus. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:apple:ipod_touch:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"
] |
|
CVE-2017-10888 | BOOK WALKER for Windows Ver.1.2.9 and earlier, BOOK WALKER for Mac Ver.1.2.5 and earlier allow an attacker to access local files via unspecified vectors. | [
"cpe:2.3:a:bookwalker:book_walker:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] |
|
GHSA-rxx9-3cw7-g286 | A elevation of privilege vulnerability in the MediaTek accessory detector driver. Product: Android. Versions: Android kernel. Android ID: A-36136137. References: M-ALPS03361477. | [] |
|
CVE-2022-31879 | Online Fire Reporting System 1.0 is vulnerable to SQL Injection via the date parameter. | [
"cpe:2.3:a:online_fire_reporting_system_project:online_fire_reporting_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-35462 | OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x6c0bc3. | [
"cpe:2.3:a:otfcc_project:otfcc:0.10.4:*:*:*:*:*:*:*"
] |
|
GHSA-f4rm-54hw-fq9v | SQL injection vulnerability in check_vote.php in Weekly Drawing Contest 0.0.1 allows remote attackers to execute arbitrary SQL commands via the order parameter. | [] |
|
GHSA-jgh4-jhhw-f27m | Cross-site scripting (XSS) vulnerability in the Web UI in IBM Spectrum Control (formerly Tivoli Storage Productivity Center) 5.2.x before 5.2.11 allows remote authenticated users to inject arbitrary web script or HTML via an embedded string. | [] |
|
GHSA-h94c-v9h6-hf45 | The Kredeum NFTs, the easiest way to sell your NFTs directly on your WordPress site plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'kredeum_opensky' shortcode in all versions up to, and including, 1.6.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-f4x6-mr29-4g4q | The does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | [] |
|
CVE-2017-11212 | Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to text output. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
GHSA-4j9f-8935-x53p | The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the object_id input parameter. | [] |
|
GHSA-h8mj-33h3-x93p | Privilege Escalation (subscriber+) vulnerability in Pop-up plugin <= 1.1.5 at WordPress. | [] |
|
GHSA-f9x4-3x96-w2vf | mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files. | [] |
|
CVE-2023-51034 | TOTOlink EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution via the cstecgi.cgi UploadFirmwareFile interface. | [
"cpe:2.3:o:totolink:ex1200l_firmware:9.3.5u.6146_b20201023:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:ex1200l:-:*:*:*:*:*:*:*"
] |
|
GHSA-4r2g-6q9v-69ff | Microsoft ActiveSync 4.1, as used in Windows Mobile 5.0, uses weak encryption (XOR obfuscation with a fixed key) when sending the user's PIN/Password over the USB connection from the host to the device, which might make it easier for attackers to decode a PIN/Password obtained by (1) sniffing or (2) spoofing the docking process. | [] |
|
GHSA-6rcr-7f7h-w6qx | The CUPS service, as used in SUSE Linux before 20070720 and other Linux distributions, allows remote attackers to cause a denial of service via unspecified vectors related to an incomplete fix for CVE-2007-0720 that introduced a different denial of service problem in SSL negotiation. | [] |
|
GHSA-9446-w3xx-qr8h | Race condition in the lighttpd module in Cisco IOS XR 5.1 and earlier on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (process reload) by establishing many TCP sessions, aka Bug ID CSCuq45239. | [] |
|
GHSA-45gq-c98p-x3m6 | A vulnerability has been found in isoftforce Dreamer CMS up to 4.0.1 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.3 is able to address this issue. It is recommended to upgrade the affected component. VDB-219334 is the identifier assigned to this vulnerability. | [] |
|
GHSA-f7cp-hjx9-fw4w | An Unrestricted Upload issue was discovered in Marel Food Processing Systems M3000 terminal associated with the following systems: A320, A325, A371, A520 Master, A520 Slave, A530, A542, A571, Check Bin Grader, FlowlineQC T376, IPM3 Dual Cam v132, IPM3 Dual Cam v139, IPM3 Single Cam v132, P520, P574, SensorX13 QC flow line, SensorX23 QC Master, SensorX23 QC Slave, Speed Batcher, T374, T377, V36, V36B, and V36C; M3210 terminal associated with the same systems as the M3000 terminal identified above; M3000 desktop software associated with the same systems as the M3000 terminal identified above; MAC4 controller associated with the same systems as the M3000 terminal identified above; SensorX23 X-ray machine; SensorX25 X-ray machine; and MWS2 weighing system. This vulnerability allows an attacker to modify the operation and upload firmware changes without detection. | [] |
|
GHSA-x5h7-6c5j-qhg6 | A SQL Injection vulnerability was found in /admin/bwdates-reports-details.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the fromdate POST request parameter. | [] |
|
CVE-2021-42782 | Stack buffer overflow issues were found in Opensc before version 0.22.0 in various places that could potentially crash programs using the library. | [
"cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] |
|
CVE-2023-21253 | In multiple locations, there is a possible way to crash multiple system services due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
GHSA-64fg-mcxw-p5ww | An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in dwg_encode_entity in common_entity_data.spec. | [] |
|
CVE-2024-9059 | Royal Elementor Addons and Template <= 1.7.1001 - Authenticated (Contributor+) DOM-Based Stored Cross-Site Scripting via Google Maps Widget | The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Google Maps widget in all versions up to, and including, 1.7.1001 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*"
] |
GHSA-j77g-rccp-fpvv | A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code or cause the web-based management process on the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The attacker must have valid administrator credentials. This vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the web-based management process to restart, resulting in a DoS condition. | [] |
|
CVE-2022-1210 | LibTIFF tiff2ps resource consumption | A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:libtiff:libtiff:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"
] |
CVE-2025-47170 | Microsoft Word Remote Code Execution Vulnerability | Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. | [] |
CVE-2023-25670 | TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize | TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a null point error in QuantizedMatMulWithBiasAndDequantize with MKL enabled. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
| [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] |
CVE-2016-2119 | libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.