id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-8fpj-2jpw-6jj2
|
A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this issue is the function strcpy of the component VirusPopUp. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-v556-6q84-9x6w
|
The file upload functionality in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2, when running "on hosts with dangerous security settings," has unknown impact and attack vectors, possibly related to dangerous filenames.
|
[] |
|
CVE-2012-2912
|
Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php.
|
[
"cpe:2.3:a:kolja_schleich:leaguemanager:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] |
|
GHSA-3jp6-q9cg-rvgj
|
Missing permission check in Jenkins build-publisher Plugin
|
Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers. At this time there is no known workaround or fix. The Build-Publisher plugin distribution has been suspended.
|
[] |
CVE-2009-4611
|
Mort Bay Jetty 6.x through 6.1.22 and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application.
|
[
"cpe:2.3:a:mortbay:jetty:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:alpha0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta14:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta15:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta16:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta17:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:betax:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.0:pre0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.0:pre1:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.0:pre2:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.0:pre3:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.1:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.2:pre0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.2:pre1:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.2:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.2:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.2:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.2:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.4:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.5:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.6:rc0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.12:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.12:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.12:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.12:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.12:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.15:pre0:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.15:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.15:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.15:rc4:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.15:rc5:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:6.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mortbay:jetty:7.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-xpxq-j6pj-5vxg
|
The RightFax web client uses predictable session numbers, which allows remote attackers to hijack user sessions.
|
[] |
|
GHSA-6ch8-h5p5-j54q
|
Cross-site scripting (XSS) vulnerability in register_domain.php in DRZES HMS 3.2 allows remote attackers to inject arbitrary web script or HTML via unspecified search parameters, possibly the "Domain Availability" field. NOTE: this issue was later reported to affect CONTROLzx (renamed from DRZES) 3.3.4.
|
[] |
|
GHSA-hx97-c52w-j6xr
|
The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.13.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
The issue was partially patched in version 3.13.6 of the plugin, and fully patched in 3.13.7.
|
[] |
|
GHSA-g848-pppp-vg6f
|
An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.
|
[] |
|
GHSA-8cjq-m469-phpm
|
Palo Alto Networks Terminal Services (aka TS) Agent 6.0, 7.0, and 8.0 before 8.0.1 uses weak permissions for unspecified resources, which allows attackers to obtain sensitive session information via unknown vectors.
|
[] |
|
GHSA-83qx-7q6j-787q
|
Cross Site Scripting vulnerability in phpkobo AjaxNewTicker v.1.0.5 allows a remote attacker to execute arbitrary code via a crafted payload to the ID parameter in the index.php component.
|
[] |
|
GHSA-wr4g-hvjj-f7fp
|
Cross Site Scripting vulnerability in Daylight Studio Fuel CMS v.1.5.2 allows an attacker to escalate privileges via the /fuel/blocks/ and /fuel/pages components.
|
[] |
|
CVE-2025-3918
|
Job Listings 0.1 - 0.1.1 - Unauthenticated Privilege Escalation via register_action Function
|
The Job Listings plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the register_action() function in versions 0.1 to 0.1.1. The plugin’s registration handler reads the client-supplied $_POST['user_role'] and passes it directly to wp_insert_user() without restricting to a safe set of roles. This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.
|
[] |
CVE-2018-16354
|
An issue was discovered in FHCRM through 2018-02-11. There is a SQL injection via the index.php/User/read limit parameter.
|
[
"cpe:2.3:a:fhcrm_project:fhcrm:*:*:*:*:*:*:*:*"
] |
|
GHSA-r4hx-h29x-6vfh
|
A privilege escalation vulnerability in the administrative user interface of CA Technologies CA Strong Authentication 9.0.x, 8.2.x, 8.1.x, 8.0.x, 7.1.x and CA Risk Authentication 9.0.x, 8.2.x, 8.1.x, 8.0.x, 3.1.x allows an authenticated attacker to gain additional privileges in some cases where an account has customized and limited privileges.
|
[] |
|
CVE-2018-4434
|
An out-of-bounds read was addressed with improved input validation. This issue affected versions prior to macOS Mojave 10.14.2.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-h366-2rx9-rhh8
|
A vulnerability, which was classified as problematic, was found in PHPGurukul Land Record System 1.0. Affected is an unknown function of the file /admin/add-property.php. The manipulation of the argument Land Subtype leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
GHSA-776f-3636-jh6h
|
Shape Services IM+ Mobile Instant Messenger for Pocket PC 3.10 stores usernames and passwords in plaintext in %PROGRAMFILES%\IMPlus\implus.cfg, which allows local users to obtain sensitive information by reading the file.
|
[] |
|
CVE-2023-36919
|
Information Disclosure in SAP Enable Now
|
In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Referrer-Policy response header is not implemented, allowing an unauthenticated attacker to obtain referrer details, resulting in information disclosure.
|
[
"cpe:2.3:a:sap:enable_now:-:*:*:*:*:*:*:*"
] |
GHSA-cjqc-xw23-pp7h
|
WebHybridClient.java in PayPal 5.3 and earlier for Android ignores SSL errors, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
|
[] |
|
GHSA-x742-63f3-9r94
|
SQL injection vulnerability in the "Content Types > Content Types" screen in dotCMS before 3.3.1 allows remote authenticated attackers to execute arbitrary SQL commands via the orderby parameter.
|
[] |
|
CVE-2024-0768
|
The Envo's Elementor Templates & Widgets for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to and including 1.4.4. This is due to missing or incorrect nonce validation on the ajax_theme_activation function. This makes it possible for unauthenticated attackers to activate arbitrary installed themes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:envothemes:envo\\'s_elementor_templates_\\&_widgets_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2024-12346
|
Talentera byt_cv_manager cross site scripting
|
A vulnerability has been found in Talentera up to 20241128 and classified as problematic. This vulnerability affects unknown code of the file /app/control/byt_cv_manager. The manipulation of the argument redirect_url leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The provided PoC only works in Mozilla Firefox. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:talentera:talentera:*:*:*:*:*:*:*:*"
] |
GHSA-9q2m-c78f-jqm4
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
|
[] |
|
GHSA-j49g-mp79-5vm5
|
coffe-script is malware
|
The `coffe-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.All versions have been unpublished from the npm registry.RecommendationIf you have found `coffe-script` installed in your environment, you should:Delete the packageClear your npm cacheEnsure it is not present in any other package.json files on your systemRegenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
[] |
CVE-2017-11835
|
Microsoft graphics in Windows 7 SP1 and Windows Server 2008 SP2 and R2 SP1 allows an attacker to potentially read data that was not intended to be disclosed due to the way that the Microsoft Windows Embedded OpenType (EOT) font engine parses specially crafted embedded fonts, aka "Windows EOT Font Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11832.
|
[
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
] |
|
CVE-2010-4966
|
Cross-site scripting (XSS) vulnerability in default.asp in ATCOM Netvolution allows remote attackers to inject arbitrary web script or HTML via the query parameter in a Search action.
|
[
"cpe:2.3:a:atcom:netvolution:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-3937
|
The MediaTek video driver in Android before 2016-10-05 allows attackers to gain privileges via a crafted application, aka Android internal bug 30030994 and MediaTek internal bug ALPS02834874.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-7250
|
The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
|
[
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*"
] |
|
CVE-2006-3339
|
secure/ConfigureReleaseNote.jspa in Atlassian JIRA 3.6.2-#156 allows remote attackers to obtain sensitive information via unspecified manipulations of the projectId parameter, which displays the installation path and other system information in an error message.
|
[
"cpe:2.3:a:atlassian:jira:3.6.2_156:*:*:*:*:*:*:*"
] |
|
GHSA-6rr3-hjv7-3j5j
|
On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, and 14.1.x versions prior to 14.1.4.6, when BIG-IP packet filters are enabled and a virtual server is configured with the type set to Reject, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
|
[] |
|
GHSA-25jw-9fgv-p5fh
|
An issue was discovered in Virtualmin 7.7. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Account Plans tab of System Settings via the Plan Name field. Whenever the module is accessed, the XSS payload is executed.
|
[] |
|
CVE-2024-38213
|
Windows Mark of the Web Security Feature Bypass Vulnerability
|
Windows Mark of the Web Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] |
GHSA-62mj-f382-xrp2
|
Cross-Site Request Forgery (CSRF) vulnerability in Ederson Peka Unlimited Page Sidebars allows Stored XSS. This issue affects Unlimited Page Sidebars: from n/a through 0.2.6.
|
[] |
|
GHSA-x9c6-vmcf-qhxr
|
Encrypted folders created by PRIMX ZONECENTRAL through 2023.5 can be modified by a local attacker (with appropriate privileges) so that specific file types are excluded from encryption temporarily. (This modification can, however, be detected, as described in the Administrator Guide.)
|
[] |
|
GHSA-pwj3-ccfm-6r93
|
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sysmanage/edit_manageadmin.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240992. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
|
[] |
|
GHSA-mxmh-88qh-9f26
|
SQL injection vulnerability in the ePO extension in McAfee Data Loss Prevention Endpoint (DLPe) before 9.3.400 allows remote authenticated ePO users to execute arbitrary SQL commands via unspecified vectors.
|
[] |
|
GHSA-8q72-q4wp-935g
|
save_profile.asp in WebEvents (Online Event Registration Template) 2.0 and earlier allows remote attackers to change the profiles, passwords, and other information for arbitrary users via a modified UserID parameter.
|
[] |
|
CVE-2023-32357
|
An authorization issue was addressed with improved state management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, macOS Big Sur 11.7.7, macOS Monterey 12.6.6, iOS 16.5 and iPadOS 16.5. An app may be able to retain access to system configuration files even after its permission is revoked.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-2j56-f322-jxrm
|
Cisco IOS XR 3.4.0 through 3.8.1 allows remote attackers to cause a denial of service (session reset) via a BGP UPDATE message with an invalid attribute, as demonstrated in the wild on 17 August 2009.
|
[] |
|
CVE-2008-3074
|
The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2) the filename of the first file in a tar archive, which is not properly handled by the VIM TAR plugin (tar.vim) v.10 through v.22, as demonstrated by the shellescape, tarplugin.v2, tarplugin, and tarplugin.updated test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3075. NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
|
[
"cpe:2.3:a:vim:tar.vim:v.10:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.11:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.12:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.13:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.14:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.15:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.16:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.17:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.18:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.19:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.20:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.21:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:tar.vim:v.22:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:vim:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:vim:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:vim:7.1.266:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:vim:7.1.314:*:*:*:*:*:*:*",
"cpe:2.3:a:vim:vim:7.2:*:*:*:*:*:*:*"
] |
|
CVE-2020-7907
|
In the JetBrains Scala plugin before 2019.2.1, some artefact dependencies were resolved over unencrypted connections.
|
[
"cpe:2.3:a:jetbrains:scala:*:*:*:*:*:jetbrains:*:*"
] |
|
GHSA-9m63-33q3-xq5x
|
Vela Server Has Insufficient Webhook Payload Data Verification
|
ImpactUsers with an enabled repository with access to repo level CI secrets in Vela are vulnerable to the exploit.Any user with access to the CI instance and the linked source control manager can perform the exploit.MethodBy spoofing a webhook payload with a specific set of headers and body data, an attacker could transfer ownership of a repository and its repo level secrets to a separate repository.These secrets could be exfiltrated by follow up builds to the repository.Patches`v0.26.3` — Image: `target/vela-server:v0.26.3`
`v0.25.3` — Image: `target/vela-server:v0.25.3`Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_There are no workarounds to the issue.References_Are there any links users can visit to find out more?_Please see linked CWEs (common weakness enumerators) for more information.
|
[] |
GHSA-p523-j8f3-523j
|
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct a situation where the same PID is used for running two different programs at different times, by leveraging a race condition during crafted use of posix_spawn.
|
[] |
|
CVE-2023-42537
|
An improper input validation in get_head_crc in libsaped prior to SMR Nov-2023 Release 1 allows local attackers to cause out-of-bounds read and write.
|
[
"cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*"
] |
|
CVE-2023-6274
|
Byzoro Smart S80 PHP File updatelib.php unrestricted upload
|
A vulnerability was found in Byzoro Smart S80 up to 20231108. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /sysmanage/updatelib.php of the component PHP File Handler. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246103. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:byzoro:smart_s80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:byzoro:smart_s80:-:*:*:*:*:*:*:*"
] |
CVE-2024-37209
|
WordPress User Rights Access Manager plugin <= 1.1.2 - Broken Access Control vulnerability
|
Access Control vulnerability in Prism IT Systems User Rights Access Manager allows .
This issue affects User Rights Access Manager: from n/a through 1.1.2.
|
[] |
CVE-2010-0166
|
The gfxTextRun::SanitizeGlyphRuns function in gfx/thebes/src/gfxFont.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 on Mac OS X, when the Core Text API is used, does not properly perform certain deletions, which allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via an HTML document containing invisible Unicode characters, as demonstrated by the U+FEFF, U+FFF9, U+FFFA, and U+FFFB characters.
|
[
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-jc83-hrxf-cqm9
|
Improper permissions for Intel(R) Quartus(R) Prime Pro Edition before version 21.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] |
|
GHSA-rmxq-q4j3-rg8f
|
In Emacs before 29.3, Gnus treats inline MIME contents as trusted.
|
[] |
|
CVE-2023-25164
|
Sensitive Information leak via Script File in TinaCMS
|
Tinacms is a Git-backed headless content management system with support for visual editing. Sites being built with @tinacms/cli >= 1.0.0 && < 1.0.9 which store sensitive values in the process.env variable are impacted. These values will be added in plaintext to the index.js file. If you're on a version prior to 1.0.0 this vulnerability does not affect you. If you are affected and your Tina-enabled website has sensitive credentials stored as environment variables (eg. Algolia API keys) you should rotate those keys immediately. This issue has been patched in @tinacms/[email protected]. Users are advised to upgrade. There are no known workarounds for this issue.
|
[
"cpe:2.3:a:tina:tinacms:*:*:*:*:*:node.js:*:*"
] |
GHSA-p96p-g4pw-m95p
|
The ansilove_ansi function in loaders/ansi.c in libansilove 1.0.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
|
[] |
|
GHSA-29w5-279f-vr72
|
In the Linux kernel, the following vulnerability has been resolved:wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_workThe workqueue might still be running, when the driver is stopped. To
avoid a use-after-free, call cancel_work_sync() in rtl8xxxu_stop().
|
[] |
|
GHSA-j76g-xrp2-hggj
|
A SQL injection vulnerability exists in the “logging export” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
|
[] |
|
CVE-2024-25434
|
A cross-site scripting (XSS) vulnerability in Pkp Ojs v3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Publicname parameter.
|
[] |
|
CVE-2024-42134
|
virtio-pci: Check if is_avq is NULL
|
In the Linux kernel, the following vulnerability has been resolved:
virtio-pci: Check if is_avq is NULL
[bug]
In the virtio_pci_common.c function vp_del_vqs, vp_dev->is_avq is involved
to determine whether it is admin virtqueue, but this function vp_dev->is_avq
may be empty. For installations, virtio_pci_legacy does not assign a value
to vp_dev->is_avq.
[fix]
Check whether it is vp_dev->is_avq before use.
[test]
Test with virsh Attach device
Before this patch, the following command would crash the guest system
After applying the patch, everything seems to be working fine.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2023-29933
|
llvm-project commit bd456297 was discovered to contain a segmentation fault via the component mlir::Block::getArgument.
|
[
"cpe:2.3:a:llvm:llvm:2022-12-11:*:*:*:*:*:*:*"
] |
|
CVE-2021-25967
|
CKAN - Stored Cross-Site Scripting (XSS) via SVG File Upload
|
In CKAN, versions 2.9.0 to 2.9.3 are affected by a stored XSS vulnerability via SVG file upload of users’ profile picture. This allows low privileged application users to store malicious scripts in their profile picture. These scripts are executed in a victim’s browser when they open the malicious profile picture
|
[
"cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*"
] |
GHSA-v4p3-h258-jr4j
|
Buffer overflow in the mtink status monitor, as included in the printer-drivers package in Mandrake Linux, allows local users to execute arbitrary code via a long HOME environment variable.
|
[] |
|
GHSA-3cgw-hfw7-wc7j
|
Duplicate Advisory: Grafana Stored Cross-site Scripting vulnerability
|
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of [GHSA-qrrg-gw7w-vp76](https://github.com/advisories/GHSA-qrrg-gw7w-vp76). This link is maintained to preserve external references.Original DescriptionGrafana is an open-source platform for monitoring and observability. Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized. An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description. Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.
|
[] |
CVE-2019-12421
|
When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi.
|
[
"cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-32561
|
A previously generated artifact by an administrator could be accessed by an attacker. The contents of this artifact could lead to authentication bypass. Fixed in version 6.4.1.
|
[
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*"
] |
|
GHSA-g6c6-9mmh-32cw
|
The <code>ms-msdt</code>, <code>search</code>, and <code>search-ms</code> protocols deliver content to Microsoft applications, bypassing the browser, when a user accepts a prompt. These applications have had known vulnerabilities, exploited in the wild (although we know of none exploited through Thunderbird), so in this release Thunderbird has blocked these protocols from prompting the user to open them.<br>*This bug only affects Thunderbird on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
|
[] |
|
CVE-2023-4967
|
Denial of service
|
Denial of Service in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA Virtual Server
|
[
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*",
"cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*"
] |
GHSA-cw54-cgwp-3c3v
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Hector Cabrera WordPress Popular Posts plugin <= 6.3.2 versions.
|
[] |
|
GHSA-h958-q9ch-hq7c
|
The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten.
|
[] |
|
CVE-2013-3918
|
The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted web page that is accessed by Internet Explorer, as exploited in the wild in November 2013, aka "InformationCardSigninHelper Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"
] |
|
GHSA-mjx6-524j-mf72
|
Multiple integer overflows in contrib/hstore/hstore_io.c in PostgreSQL 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact via vectors related to the (1) hstore_recv, (2) hstore_from_arrays, and (3) hstore_from_array functions in contrib/hstore/hstore_io.c; and the (4) hstoreArrayToPairs function in contrib/hstore/hstore_op.c, which triggers a buffer overflow. NOTE: this issue was SPLIT from CVE-2014-0064 because it has a different set of affected versions.
|
[] |
|
CVE-2024-27960
|
WordPress Email Subscription Popup plugin <= 1.2.20 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in I Thirteen Web Solution Email Subscription Popup allows Stored XSS.This issue affects Email Subscription Popup: from n/a through 1.2.20.
|
[] |
CVE-2009-0238
|
Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1; Excel Viewer 2003 Gold and SP3; Excel Viewer; Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1; and Excel in Microsoft Office 2004 and 2008 for Mac allow remote attackers to execute arbitrary code via a crafted Excel document that triggers an access attempt on an invalid object, as exploited in the wild in February 2009 by Trojan.Mdropper.AC.
|
[
"cpe:2.3:a:microsoft:excel:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel:2000:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:2003:gold:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:2003:sp3:*:*:*:*:*:*"
] |
|
CVE-2008-2850
|
SQL injection vulnerability in the TrailScout module 5.x before 5.x-1.4 for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified cookies, related to improper use of the Drupal database API.
|
[
"cpe:2.3:a:drupal:trailscout_module:5.x:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:trailscout_module:5.x_1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:trailscout_module:5.x_1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:trailscout_module:5.x_1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:trailscout_module:5.x_1.3:*:*:*:*:*:*:*"
] |
|
GHSA-cw3v-vrwg-6pv8
|
In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] |
|
CVE-2019-8635
|
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.5. An application may be able to execute arbitrary code with system privileges.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-8412
|
An issue was discovered on D-Link DCS-1100 and DCS-1130 devices. The device has a custom binary called mp4ts under the /var/www/video folder. It seems that this binary dumps the HTTP VERB in the system logs. As a part of doing that it retrieves the HTTP VERB sent by the user and uses a vulnerable sprintf function at address 0x0000C3D4 in the function sub_C210 to copy the value into a string and then into a log file. Since there is no bounds check being performed on the environment variable at address 0x0000C360 this results in a stack overflow and overwrites the PC register allowing an attacker to execute buffer overflow or even a command injection attack.
|
[
"cpe:2.3:o:dlink:dcs-1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-1130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dcs-1100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dcs-1100:-:*:*:*:*:*:*:*"
] |
|
GHSA-jh7w-p7gx-9479
|
Canon EOS Webcam Utility Pro for MAC OS version 2.3d
(2.3.29) and earlier contains an improper directory permissions vulnerability.
Exploitation of this vulnerability requires administrator access by a malicious
user. An attacker could modify the directory, potentially resulting in code
execution and ultimately leading to privilege escalation.
|
[] |
|
GHSA-xrfw-g6fh-r7xc
|
In the Linux kernel, the following vulnerability has been resolved:thermal/drivers/imx_sc_thermal: Fix refcount leak in imx_sc_thermal_probeof_find_node_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
Add missing of_node_put() to avoid refcount leak.
|
[] |
|
GHSA-f6m5-cxjc-8qwq
|
WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 might allow remote attackers to obtain access to an account idle since 2008 by leveraging an improper PHP dynamic type comparison for an MD5 hash.
|
[] |
|
GHSA-jg8f-6gxm-7343
|
An integer overflow in WatchGuard Firebox and XTM appliances allows an authenticated remote attacker to trigger a heap-based buffer overflow and potentially execute arbitrary code by initiating a firmware update with a malicious upgrade image. This vulnerability impacts Fireware OS before 12.7.2_U2, 12.x before 12.1.3_U8, and 12.2.x through 12.5.x before 12.5.9_U2.
|
[] |
|
GHSA-wvwg-gc54-gg4f
|
PHP remote file inclusion vulnerability in tagmin/delTagUser.php in TagIt! Tagboard 2.1.B Build 2 (tagit2b) allows remote attackers to execute arbitrary PHP code via a URL in the configpath parameter.
|
[] |
|
GHSA-8rf3-52xm-w6jc
|
Improper Restriction of Excessive Authentication Attempts vulnerability in Rameez Iqbal Real Estate Manager allows Password Brute Forcing. This issue affects Real Estate Manager: from n/a through 7.3.
|
[] |
|
CVE-2023-0791
|
Cross-site Scripting (XSS) - Stored in thorsten/phpmyfaq
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
[
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] |
GHSA-4c4c-7hrr-jfv2
|
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
|
[] |
|
CVE-2023-38740
|
IBM Db2 denial of service
|
IBM Db2 for Linux, UNIX, and Windows (includes Db2 Connect Server) 11.5 is vulnerable to a denial of service with a specially crafted SQL statement. IBM X-Force ID: 262613.
|
[
"cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*"
] |
CVE-2015-6304
|
Cross-site request forgery (CSRF) vulnerability in Cisco TelePresence Server software 3.0(2.24) allows remote attackers to hijack the authentication of arbitrary users, aka Bug IDs CSCut63718, CSCut63724, and CSCut63760.
|
[
"cpe:2.3:a:cisco:telepresence_server_software:3.0\\(2.24\\):*:*:*:*:*:*:*"
] |
|
CVE-2018-17688
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit PhantomPDF 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the setItems method of a ComboBox. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7069.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-6fcr-87qh-q4w5
|
A vulnerability, which was classified as problematic, has been found in MRCMS 3.1.2. Affected by this issue is some unknown functionality of the component Edit Article Page. The manipulation of the argument Title leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
GHSA-q9h6-px4c-2cqp
|
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34468, CVE-2021-34520.
|
[] |
|
CVE-2019-15890
|
libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
|
[
"cpe:2.3:a:libslirp_project:libslirp:4.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:4.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2003-1350
|
List Site Pro 2.0 allows remote attackers to hijack user accounts by inserting a "|" (pipe), which is used as a field delimiter, into the bannerurl field.
|
[
"cpe:2.3:a:list_site_pro:list_site_pro:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-22c9-qjc2-9748
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
|
[] |
|
CVE-2017-7158
|
An issue was discovered in certain Apple products. macOS before 10.13.2 is affected. The issue involves the "Screen Sharing Server" component. It allows attackers to obtain root privileges for reading files by leveraging screen-sharing access.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-48qx-xjhj-jpgg
|
Open Source SACCO Management System v1.0 is vulnerable to SQL Injection via /sacco_shield/manage_payment.php.
|
[] |
|
GHSA-874p-7vhq-fvhx
|
Multiple cross-site scripting (XSS) vulnerabilities in aWebBB 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) tname or (2) fpost parameters to (a) post.php; (3) fullname, (4) emailadd, (5) country, (6) sig, or (7) otherav parameters to (b) editac.php; or (8) fullname, (9) emailadd, or (10) country parameters to (c) register.php.
|
[] |
|
GHSA-5r5q-gm8c-56h4
|
Picasa3.exe in Google Picasa before 3.9.0 Build 137.69 allows remote attackers to trigger memory corruption via a crafted TIFF tag, as demonstrated using a KDC file with a DSLR-A100 model and certain sequences of tags.
|
[] |
|
GHSA-3w99-5f2g-rxfc
|
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1 and below which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could execute arbitrary JavaScript code in the victim’s browser.
|
[] |
|
CVE-2021-27855
|
FatPipe software allows privilege escalation
|
FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote, authenticated attacker with read-only privileges to grant themselves administrative privileges. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA001.
|
[
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:5.2.0:r34:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:6.1.2:r70p26:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:6.1.2:r70p45-m:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:6.1.2:r70p75-m:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:7.1.2:r39:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r129:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r144:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r150:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r156:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r161p12:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r161p16:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r161p17:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r161p2:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r161p20:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r161p26:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r161p3:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r164:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r164p4:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r164p5:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r165:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r180p2:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:9.1.2:r185:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p10:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p13:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p32:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p35:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p45:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p55:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p58:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p58s1:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p65:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p71:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.1.2:r60p82:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.2.2:r10:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.2.2:r25:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:ipvpn_firmware:10.2.2:r38:*:*:*:*:*:*",
"cpe:2.3:h:fatpipeinc:ipvpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:5.2.0:r34:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:6.1.2:r70p26:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:6.1.2:r70p45-m:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:6.1.2:r70p75-m:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:7.1.2:r39:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r129:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r144:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r150:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r156:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r161p12:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r161p16:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r161p17:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r161p2:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r161p20:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r161p26:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r161p3:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r164:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r164p4:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r164p5:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r165:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r180p2:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:9.1.2:r185:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p10:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p13:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p32:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p35:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p45:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p55:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p58:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p58s1:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p65:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p71:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.1.2:r60p82:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.2.2:r10:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.2.2:r25:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:warp_firmware:10.2.2:r38:*:*:*:*:*:*",
"cpe:2.3:h:fatpipeinc:warp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:5.2.0:r34:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:6.1.2:r70p26:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:6.1.2:r70p45-m:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:6.1.2:r70p75-m:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:7.1.2:r39:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r129:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r144:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r150:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r156:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r161p12:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r161p16:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r161p17:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r161p2:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r161p20:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r161p26:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r161p3:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r164:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r164p4:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r164p5:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r165:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r180p2:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:9.1.2:r185:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p10:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p13:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p32:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p35:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p45:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p55:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p58:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p58s1:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p65:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p71:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.1.2:r60p82:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.2.2:r10:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.2.2:r25:*:*:*:*:*:*",
"cpe:2.3:o:fatpipeinc:mpvpn_firmware:10.2.2:r38:*:*:*:*:*:*",
"cpe:2.3:h:fatpipeinc:mpvpn:-:*:*:*:*:*:*:*"
] |
GHSA-qm2f-w2gq-vqp6
|
The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted file may lead to arbitrary code execution.
|
[] |
|
CVE-2005-1352
|
Cross-site scripting (XSS) vulnerability in the ad.cgi script allows remote attackers to inject arbitrary web script or HTML via the argument.
|
[
"cpe:2.3:a:leif_m._wright:ad.cgi:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-15908
|
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
|
[
"cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-34347
|
WordPress Download Manager plugin <= 3.2.48 - Cross-Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in W3 Eden Download Manager plugin <= 3.2.48 at WordPress.
|
[
"cpe:2.3:a:wpdownloadmanager:wordpress_download_manager:*:*:*:*:*:wordpress:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.