id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
CVE-2007-6112
Buffer overflow in the PPP dissector Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*" ]
GHSA-pmx7-9647-m98m
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0, issue 1 of 2. A reflected cross-site scripting (XSS) vulnerability has been identified in the Zimbra webmail admin interface. This vulnerability occurs due to inadequate input validation of the packages parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file and crafting a URL containing its location in the packages parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.
[]
GHSA-495c-2h5g-mmx3
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bamboo Mcr Bamboo Columns plugin <= 1.6.1 versions.
[]
CVE-2020-35886
An issue was discovered in the arr crate through 2020-08-25 for Rust. An attacker can smuggle non-Sync/Send types across a thread boundary to cause a data race.
[ "cpe:2.3:a:arr_project:arr:*:*:*:*:*:rust:*:*" ]
CVE-2000-0501
Race condition in MDaemon 2.8.5.0 POP server allows local users to cause a denial of service by entering a UIDL command and quickly exiting the server.
[ "cpe:2.3:a:alt-n:mdaemon:2.8.5.0:*:*:*:*:*:*:*" ]
GHSA-68xm-7jcv-ph77
Autel MaxiCharger AC Wallbox Commercial Technician API Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of Autel MaxiCharger AC Wallbox Commercial charging stations. An attacker must first obtain a low-privileged authorization token in order to exploit this vulnerability.The specific flaw exists within the implementation of the Autel Technician API. The issue results from incorrect authorization. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Was ZDI-CAN-26325.
[]
GHSA-f74c-6mfp-rg2q
A Use of Weak Credentials vulnerability affecting the Wi-Fi network generated by a set of DJI drones could allow a remote attacker to derive the WPA2 PSK key and authenticate without permission to the drone’s Wi- Fi network. This, in turn, allows the attacker to perform unauthorized interaction with the network services exposed by the drone and to potentially decrypt the Wi-Fi traffic exchanged between the drone and the Android/IOS device of the legitimate user during QuickTransfer mode. Affected models are Mavic 3 Pro until v01.01.0300, Mavic 3 until v01.00.1200, Mavic 3 Classic until v01.00.0500, Mavic 3 Enterprise until v07.01.10.03, Matrice 300 until v57.00.01.00, Matrice M30 until v07.01.0022 and Mini 3 Pro until v01.00.0620.
[]
GHSA-gr4x-96qv-rrhg
In Crea8social 2018.2, there is Stored Cross-Site Scripting via a post.
[]
GHSA-8cr7-p557-8268
Maccms 10 allows CSRF via admin.php/admin/admin/info.html to add user accounts.
[]
GHSA-9qgv-jm4q-8gqq
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
[]
CVE-2017-7188
Zurmo 3.1.1 Stable allows a Cross-Site Scripting (XSS) attack with a base64-encoded SCRIPT element within a data: URL in the returnUrl parameter to default/toggleCollapse.
[ "cpe:2.3:a:zurmo:zurmo_crm:*:*:*:*:*:*:*:*" ]
CVE-2004-0310
Cross-site scripting (XSS) vulnerability in LiveJournal 1.0 and 1.1 allows remote attackers to execute Javascript as other users via the stylesheet, which does not strip the semicolon or parentheses, as demonstrated using a background:url.
[ "cpe:2.3:a:livejournal:livejournal:*:*:*:*:*:*:*:*" ]
GHSA-fp3q-76ww-6mv4
A CWE-119:Improper restriction of operations within the bounds of a memory buffer vulnerability exists in PowerLogic ION8650, ION8800, ION7650, ION7700/73xx, and ION83xx/84xx/85xx/8600 (see security notifcation for affected versions), which could cause the meter to reboot.
[]
CVE-2017-14322
The function in charge to check whether the user is already logged in init.php in Interspire Email Marketer (IEM) prior to 6.1.6 allows remote attackers to bypass authentication and obtain administrative access by using the IEM_CookieLogin cookie with a specially crafted value.
[ "cpe:2.3:a:interspire:email_marketer:*:*:*:*:*:*:*:*" ]
GHSA-5v2w-fx47-6rq2
In the Linux kernel, the following vulnerability has been resolved:batman-adv: fix panic during interface removalReference counting is used to ensure that batadv_hardif_neigh_node and batadv_hard_iface are not freed before/during batadv_v_elp_throughput_metric_update work is finished.But there isn't a guarantee that the hard if will remain associated with a soft interface up until the work is finished.This fixes a crash triggered by reboot that looks like this:Call trace: batadv_v_mesh_free+0xd0/0x4dc [batman_adv] batadv_v_elp_throughput_metric_update+0x1c/0xa4 process_one_work+0x178/0x398 worker_thread+0x2e8/0x4d0 kthread+0xd8/0xdc ret_from_fork+0x10/0x20(the batadv_v_mesh_free call is misleading, and does not actually happen)I was able to make the issue happen more reliably by changing hardif_neigh->bat_v.metric_work work to be delayed work. This allowed me to track down and confirm the fix.[[email protected]: prevent entering batadv_v_elp_get_throughput without soft_iface]
[]
CVE-2022-34008
Comodo Antivirus 12.2.2.8012 has a quarantine flaw that allows privilege escalation. To escalate privilege, a low-privileged attacker can use an NTFS directory junction to restore a malicious DLL from quarantine into the System32 folder.
[ "cpe:2.3:a:comodo:antivirus:12.2.2.8012:*:*:*:*:*:*:*" ]
CVE-2021-46387
ZyXEL ZyWALL 2 Plus Internet Security Appliance is affected by Cross Site Scripting (XSS). Insecure URI handling leads to bypass security restriction to achieve Cross Site Scripting, which allows an attacker able to execute arbitrary JavaScript codes to perform multiple attacks such as clipboard hijacking and session hijacking.
[ "cpe:2.3:o:zyxel:zywall_2_plus_internet_security_appliance_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zyxel:zywall_2_plus_internet_security_appliance:-:*:*:*:*:*:*:*" ]
GHSA-78x2-ww3j-6h5x
CoreText in Apple Mac OS X 10.4 through 10.4.10 allows attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted text content that triggers an access of an uninitialized object pointer.
[]
CVE-2025-22530
WordPress 아임포트 결제버튼 생성 플러그인 plugin <= 1.1.19 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SIOT 아임포트 결제버튼 생성 플러그인 allows Stored XSS.This issue affects 아임포트 결제버튼 생성 플러그인: from n/a through 1.1.19.
[]
CVE-2024-39911
1Panel SQL injection
1Panel is a web-based linux server management control panel. 1Panel contains an unspecified sql injection via User-Agent handling. This issue has been addressed in version 1.10.12-lts. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" ]
GHSA-pf2j-9qmp-jqr2
TypeORM vulnerable to MAID and Prototype Pollution
Prototype pollution vulnerability in the TypeORM package < 0.2.25 may allow attackers to add or modify Object properties leading to further denial of service or SQL injection attacks.
[]
GHSA-jxmq-rh3p-hmvp
, aka 'Microsoft Exchange Information Disclosure Vulnerability'.
[]
CVE-2022-4966
sequentech admin-console Election Description cross site scripting
A vulnerability was found in sequentech admin-console up to 6.1.7 and classified as problematic. Affected by this issue is some unknown functionality of the component Election Description Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 7.0.0-beta.1 is able to address this issue. The patch is identified as 0043a6b1e6e0f5abc9557e73f9ffc524fc5d609d. It is recommended to upgrade the affected component. VDB-258782 is the identifier assigned to this vulnerability.
[]
GHSA-c9pw-f4wp-22jr
SUKOHI Surpass Path Traversal vulnerability
A vulnerability has been found in SUKOHI Surpass and classified as critical. This vulnerability affects unknown code of the file `src/Sukohi/Surpass/Surpass.php`. The manipulation of the argument dir leads to pathname traversal. Upgrading to version 1.0.0 can address this issue. The name of the patch is d22337d453a2a14194cdb02bf12cdf9d9f827aa7. It is recommended to upgrade the affected component. VDB-217642 is the identifier assigned to this vulnerability.
[]
CVE-2013-1950
The svc_dg_getargs function in libtirpc 0.2.3 and earlier allows remote attackers to cause a denial of service (rpcbind crash) via a Sun RPC request with crafted arguments that trigger a free of an invalid pointer.
[ "cpe:2.3:a:libtirpc_project:libtirpc:*:*:*:*:*:*:*:*", "cpe:2.3:a:libtirpc_project:libtirpc:0.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:libtirpc_project:libtirpc:0.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:libtirpc_project:libtirpc:0.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:libtirpc_project:libtirpc:0.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:libtirpc_project:libtirpc:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:libtirpc_project:libtirpc:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:libtirpc_project:libtirpc:0.2.2:*:*:*:*:*:*:*" ]
CVE-2024-3062
Save as PDF by Pdfcrowd < 3.2.2 - Admin+ Stored XSS
The Save as Image Plugin by Pdfcrowd WordPress plugin before 3.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
GHSA-26jc-6p9c-5pc3
Cross-Site Request Forgery (CSRF) vulnerability in WP Spell Check WP Spell Check allows Cross Site Request Forgery. This issue affects WP Spell Check: from n/a through 9.21.
[]
CVE-2016-3593
Unspecified vulnerability in the Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters, a different vulnerability than CVE-2016-3574, CVE-2016-3575, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-2016-3580, CVE-2016-3581, CVE-2016-3582, CVE-2016-3583, CVE-2016-3590, CVE-2016-3591, CVE-2016-3592, CVE-2016-3594, CVE-2016-3595, and CVE-2016-3596.
[ "cpe:2.3:a:oracle:outside_in_technology:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:outside_in_technology:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:outside_in_technology:8.5.2:*:*:*:*:*:*:*" ]
CVE-2024-22084
An issue was discovered in Elspec G5 digital fault recorder versions 1.1.4.15 and before. Cleartext passwords and hashes are exposed through log files.
[ "cpe:2.3:a:elspec:g5_digital_fault_recorder:*:*:*:*:*:*:*:*" ]
CVE-2015-3307
The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (heap metadata corruption) or possibly have unspecified other impact via a crafted tar archive.
[ "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.6.7:*:*:*:*:*:*:*" ]
GHSA-2qpq-x4m7-gjf3
Weak encoding for password vulnerability exists in HMI ViewJet C-more series. If this vulnerability is exploited, authentication information may be obtained by a local authenticated attacker.
[]
GHSA-fc7x-ffxp-c9q2
Missing Authorization vulnerability in SoftLab Integrate Google Drive allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Integrate Google Drive: from n/a through 1.1.99.
[]
CVE-2019-4704
IBM Security Identity Manager Virtual Appliance 7.0.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 172014.
[ "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.2:*:*:*:*:*:*:*" ]
CVE-2005-0830
Multiple buffer overflows in Xzabite DYNDNSUpdate 0.6.15 and earlier, including the ipcheck function in dyndnsupdate.c, allow remote attackers who spoof a dyndns.org server to execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:xzabite:dyndnsupdate:0.6.15:*:*:*:*:*:*:*" ]
CVE-2011-1246
Microsoft Internet Explorer 8 does not properly handle content settings in HTTP responses, which allows remote web servers to obtain sensitive information from a different (1) domain or (2) zone via a crafted response, aka "MIME Sniffing Information Disclosure Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*", "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*" ]
GHSA-w3f6-cx38-wfwx
Possible use after free due to lack of null check while memory is being freed in FastRPC driver in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
[]
CVE-2024-1784
Limbas main_admin.php sql injection
A vulnerability classified as problematic was found in Limbas 5.2.14. Affected by this vulnerability is an unknown functionality of the file main_admin.php. The manipulation of the argument tab_group leads to sql injection. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254575. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:limbas:limbas:*:*:*:*:*:*:*:*" ]
GHSA-jr28-crcf-pgh6
A vulnerability was found in itwanger paicoding 1.0.3 and classified as problematic. Affected by this issue is some unknown functionality of the file /user/home?userId=1&homeSelectType=read of the component Browsing History Handler. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-rf5g-w3gw-grcm
The افزونه پیامک ووکامرس Persian WooCommerce SMS plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.0.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
CVE-2012-0511
Unspecified vulnerability in the OCI component in Oracle Database Server 10.2.0.3, 10.2.0.4, and 11.1.0.7 allows remote attackers to affect confidentiality and integrity via unknown vectors.
[ "cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*" ]
GHSA-5gmm-5672-7w8f
A Denial-of-Service vulnerability was discovered in the F-Secure and WithSecure products where aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine.
[]
CVE-2022-35087
SWFTools commit 772e55a2 was discovered to contain a segmentation violation via MovieAddFrame at /src/gif2swf.c.
[ "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*" ]
CVE-2007-2234
include/common.php in PunBB 1.2.14 and earlier does not properly handle a disabled ini_get function when checking the register_globals setting, which allows remote attackers to register global parameters, as demonstrated by an SQL injection attack on the search_id parameter to search.php.
[ "cpe:2.3:a:punbb:punbb:*:*:*:*:*:*:*:*" ]
CVE-2008-6279
RakhiSoftware Price Comparison Script (aka Shopping Cart) allows remote attackers to obtain sensitive information via an invalid PHPSESSID cookie, which reveals the installation path in an error message.
[ "cpe:2.3:a:rakhisoftware:rakhisoftware_shopping_cart:-:*:*:*:*:*:*:*" ]
GHSA-mqxq-gfh9-3ffc
PDF.js in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 enables excessive privileges for internal Workers, which might allow remote attackers to execute arbitrary code by leveraging a Same Origin Policy bypass.
[]
GHSA-hhg7-mpgg-68qf
Insecure creation of temporary directories in tmate-ssh-server 2.3.0 allows a local attacker to compromise the integrity of session handling.
[]
CVE-2009-3651
Cross-site scripting (XSS) vulnerability in the "Monitor browsers' feature in Browscap before 5.x-1.1 and 6.x-1.1, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header.
[ "cpe:2.3:a:mikeryan:browscap:*:*:*:*:*:*:*:*", "cpe:2.3:a:mikeryan:browscap:4.7.x-1.x-dev:*:*:*:*:*:*:*", "cpe:2.3:a:mikeryan:browscap:5.x-1.x-dev:*:*:*:*:*:*:*", "cpe:2.3:a:mikeryan:browscap:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mikeryan:browscap:6.x-1.x-dev:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
CVE-2008-1474
Multiple unspecified vulnerabilities in Roundup before 1.4.4 have unknown impact and attack vectors, some of which may be related to cross-site scripting (XSS).
[ "cpe:2.3:a:roundup-tracker:roundup:*:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre1:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre2:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.3.0:pre3:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.4.0:b1:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.4.0:b2:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.4.2:pr1:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.0:pr1:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.8:stable:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b1:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b2:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b3:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.0:b4:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b1:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b2:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.0:b3:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.8.0:b1:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.8.0:b2:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:0.9.0:b1:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:roundup-tracker:roundup:1.4.2:*:*:*:*:*:*:*" ]
GHSA-qmg9-jp26-j65g
libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server.
[]
CVE-2024-0629
The 2Checkout Payment Gateway for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the sniff_ins function in all versions up to, and including, 6.2. This makes it possible for unauthenticated attackers to make changes to orders and mark them as paid.
[ "cpe:2.3:a:nmedia:2checkout_payment_gateway:*:*:*:*:*:*:*:*" ]
CVE-2005-3884
Multiple SQL injection vulnerabilities in the search action in Zainu 2.0 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) term and (2) start parameters to index.php.
[ "cpe:2.3:a:zainu:zainu:2.0:*:*:*:*:*:*:*" ]
CVE-2022-47860
Lead Management System v1.0 is vulnerable to SQL Injection via the id parameter in removeProduct.php.
[ "cpe:2.3:a:lead_management_system_project:lead_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-jrhf-m3h4-v427
The WordPress Portfolio Builder – Portfolio Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'add_video' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to add arbitrary videos to any portfolio gallery.
[]
CVE-2012-3156
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:*" ]
GHSA-cfh5-3ghh-wfjx
Improper Verification of Cryptographic Signature in org.apache.httpcomponents:httpclient
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
[]
GHSA-q3xx-pg8c-jqh6
libdwarf 0.4.1 has a double free in _dwarf_exec_frame_instr in dwarf_frame.c.
[]
GHSA-r4mc-p68x-wx22
An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.
[]
GHSA-5r7m-w4rw-9q73
The Netlogon RPC Service in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, and R2, when the domain controller role is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted RPC packet, aka "Netlogon RPC Null dereference DOS Vulnerability."
[]
CVE-2010-3308
Buffer overflow in programs/pluto/xauth.c in the client in Openswan 2.6.26 through 2.6.28 might allow remote authenticated gateways to execute arbitrary code or cause a denial of service via a long cisco_banner (aka server_banner) field.
[ "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*", "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*", "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*" ]
CVE-2019-6658
On BIG-IP AFM 15.0.0-15.0.1, 14.0.0-14.1.2, 13.1.0-13.1.3.1, and 12.1.0-12.1.5, a vulnerability in the AFM configuration utility may allow any authenticated BIG-IP user to run an SQL injection attack.
[ "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*" ]
CVE-2023-46074
WordPress FreshMail For WordPress Plugin <= 2.3.2 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Borbis Media FreshMail For WordPress plugin <= 2.3.2 versions.
[ "cpe:2.3:a:borbis:freshmail_for_wordpress:*:*:*:*:*:wordpress:*:*" ]
CVE-2009-4317
Cross-site scripting (XSS) vulnerability in index.php in ScriptsEz Ez Cart allows remote attackers to inject arbitrary web script or HTML via the sid parameter in a showcat action.
[ "cpe:2.3:a:scriptsez:ez_cart:*:*:*:*:*:*:*:*" ]
GHSA-3qf2-xr2w-rc3p
Unspecified vulnerability in IBM Tivoli Monitoring Agent (ITMA), as used in IBM DB2 9.5 before FP9 on UNIX, allows local users to gain privileges via unknown vectors.
[]
CVE-2007-2949
Integer overflow in the seek_to_and_unpack_pixeldata function in the psd.c plugin in Gimp 2.2.15 allows remote attackers to execute arbitrary code via a crafted PSD file that contains a large (1) width or (2) height value.
[ "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*" ]
CVE-2004-2201
SQL injection vulnerability in DUware DUforum 3.0 through 3.1 allows remote attackers to execute arbitrary SQL commands via the FOR_ID parameter in messages.asp, (2) MSG_ID parameter in messageDetail.asp, or (3) password parameter in the login form.
[ "cpe:2.3:a:duware:duforum:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:duware:duforum:3.1:*:*:*:*:*:*:*" ]
GHSA-9c9p-2c27-pgw6
Windows Bluetooth Driver Elevation of Privilege Vulnerability.
[]
GHSA-5wwh-hcgf-hr8q
It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services.
[]
CVE-2020-1815
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00; Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00 have a memory leak vulnerability. The software does not sufficiently track and release allocated memory while parse certain message, the attacker sends the message continuously that could consume remaining memory. Successful exploit could cause memory exhaust.
[ "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*" ]
GHSA-3qgp-v6g6-crmv
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3118, CVE-2015-3124, CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132, CVE-2015-3136, CVE-2015-4428, CVE-2015-4430, and CVE-2015-5117.
[]
CVE-2023-45348
Apache Airflow: Configuration information leakage vulnerability
Apache Airflow, versions 2.7.0 and 2.7.1, is affected by a vulnerability that allows an authenticated user to retrieve sensitive configuration information when the "expose_config" option is set to "non-sensitive-only". The `expose_config` option is False by default. It is recommended to upgrade to a version that is not affected.
[ "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*" ]
GHSA-5vjw-v75v-7457
Auth. (subscriber+) Sensitive Data Exposure vulnerability in Phone Orders for WooCommerce plugin <= 3.7.1 on WordPress.
[]
GHSA-pj35-9jc4-v6rm
Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service.
[]
CVE-2018-16781
ffjpeg.dll in ffjpeg before 2018-08-22 allows remote attackers to cause a denial of service (FPE signal) via a progressive JPEG file that lacks an AC Huffman table.
[ "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*" ]
CVE-2006-4692
Argument injection vulnerability in the Windows Object Packager (packager.exe) in Microsoft Windows XP SP1 and SP2 and Server 2003 SP1 and earlier allows remote user-assisted attackers to execute arbitrary commands via a crafted file with a "/" (slash) character in the filename of the Command Line property, followed by a valid file extension, which causes the command before the slash to be executed, aka "Object Packager Dialogue Spoofing Vulnerability."
[ "cpe:2.3:o:microsoft:windows_server_2003:-:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*" ]
CVE-2025-29529
ITC Systems Multiplan/Matrix OneCard platform v3.7.4.1002 was discovered to contain a SQL injection vulnerability via the component Forgotpassword.aspx.
[]
GHSA-pj2c-h76w-vv6f
tiny-csrf has openly visible CSRF tokens
ImpactWeak encryption on CSRF so tokens can be read by malicious attackers.PatchesProblems have been patched as of v1.1.0WorkaroundsUpgrade to v1.1.0Referenceshttps://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.htmlFor more informationSubmit an issue at [the github repo](https://github.com/valexandersaulys/tiny-csrf)
[]
CVE-2005-0845
Directory traversal vulnerability in the Webmail interface in SurgeMail 2.2g3 allows remote authenticated users to write arbitrary files or directories via a .. (dot dot) in the attach_id parameter.
[ "cpe:2.3:a:netwin:surgemail:2.2g3:*:*:*:*:*:*:*" ]
CVE-2022-2325
Invitation Based Registrations <= 2.2.84 - Admin+ Stored Cross-Site Scripting
The Invitation Based Registrations WordPress plugin through 2.2.84 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:securebit:invitation_based_registrations:*:*:*:*:*:wordpress:*:*" ]
GHSA-2m8w-xj74-wv7h
A vulnerability, which was classified as critical, was found in SourceCodester Doctors Appointment System 1.0. Affected is an unknown function of the file /admin/add-new.php of the component Parameter Handler. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221826 is the identifier assigned to this vulnerability.
[]
CVE-2023-49857
WordPress Awesome Support plugin <= 6.1.7 - Broken Access Control vulnerability
Missing Authorization vulnerability in Awesome Support Team Awesome Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Support: from n/a through 6.1.7.
[ "cpe:2.3:a:awesomesupport:awesome_support_wordpress_helpdesk_\\&_support:-:*:*:*:*:wordpress:*:*" ]
CVE-2025-30023
The communication protocol used between client and server had a flaw that could lead to an authenticated user performing a remote code execution attack.
[]
CVE-2022-30716
Unprotected broadcast in sendIntentForToastDumpLog in DisplayToast prior to SMR Jun-2022 Release 1 allows untrusted applications to access toast message information from device.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
GHSA-rpfr-3prf-w7f2
In the Linux kernel, the following vulnerability has been resolved:usb: dwc3: gadget: check that event count does not exceed event buffer lengthThe event count is read from register DWC3_GEVNTCOUNT. There is a check for the count being zero, but not for exceeding the event buffer length. Check that event count does not exceed event buffer length, avoiding an out-of-bounds access when memcpy'ing the event. Crash log: Unable to handle kernel paging request at virtual address ffffffc0129be000 pc : __memcpy+0x114/0x180 lr : dwc3_check_event_buf+0xec/0x348 x3 : 0000000000000030 x2 : 000000000000dfc4 x1 : ffffffc0129be000 x0 : ffffff87aad60080 Call trace: __memcpy+0x114/0x180 dwc3_interrupt+0x24/0x34
[]
GHSA-c238-w6xv-cj4m
Citrix Gateway 11.1, 12.0, and 12.1 has an Inconsistent Interpretation of HTTP Requests.
[]
CVE-2021-21928
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘mac_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
[ "cpe:2.3:a:advantech:r-seenet:2.4.15:*:*:*:*:*:*:*" ]
CVE-2012-4111
The create certreq command in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq86563.
[ "cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*" ]
CVE-2023-20215
A vulnerability in the scanning engines of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass a configured rule, allowing traffic onto a network that should have been blocked. This vulnerability is due to improper detection of malicious traffic when the traffic is encoded with a specific content format. An attacker could exploit this vulnerability by using an affected device to connect to a malicious server and receiving crafted HTTP responses. A successful exploit could allow the attacker to bypass an explicit block rule and receive traffic that should have been rejected by the device.
[ "cpe:2.3:o:cisco:asyncos:11.7.0-406:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:11.7.0-418:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:11.7.1-006:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:11.7.1-020:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:11.7.1-049:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:11.7.2-011:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:11.8.0-414:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:11.8.1-023:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:11.8.3-018:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:11.8.3-021:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:12.0.1-268:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:12.0.3-007:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:12.5.1-011:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:12.5.2-007:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:12.5.4-005:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:12.5.5-004:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:14.0.2-012:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:14.0.3-014:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:14.0.4-005:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:14.5.0-498:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:14.5.1-008:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:14.5.1-016:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:web_security_appliance_s170:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:web_security_appliance_s190:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:web_security_appliance_s380:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:web_security_appliance_s390:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:web_security_appliance_s680:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:web_security_appliance_s690:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:web_security_appliance_s690x:-:*:*:*:*:*:*:*" ]
CVE-2014-2438
Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
CVE-2023-30090
Semcms Shop v4.2 was discovered to contain an arbitrary file uplaod vulnerability via the component SEMCMS_Upfile.php. This vulnerability allows attackers to execute arbitrary code via uploading a crafted PHP file.
[ "cpe:2.3:a:sem-cms:semcms:4.2:*:*:*:*:*:*:*" ]
GHSA-f5mh-3qjm-hxpc
Out-of-bounds read in parsing wbmp image in Samsung Notes prior to vaersion 4.4.26.71 allows local attackers to access out-of-bounds memory.
[]
GHSA-m66h-r9w4-mj7g
Traggo Server 0.3.0 is vulnerable to directory traversal via a crafted GET request.
[]
GHSA-p2xh-ccf8-ggqg
The "ConnectionFile" property in the DataSourceControl component in Office Web Components (OWC) 10 allows remote attackers to determine the existence of local files by detecting an exception.
[]
GHSA-f8p7-qq6w-9fjc
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 11.1, 10.9.1 and 10.8.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
[]
CVE-2008-7230
Unspecified vulnerability in Small Footprint CIM Broker (SFCB) before 1.2.5 has unknown impact and attack vectors.
[ "cpe:2.3:a:chris_buccella:small_footprint_cim_broker:*:*:*:*:*:*:*:*", "cpe:2.3:a:chris_buccella:small_footprint_cim_broker:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:chris_buccella:small_footprint_cim_broker:1.2.3:*:*:*:*:*:*:*" ]
GHSA-8hpv-ffwj-685g
Out of bounds read in IPC in Google Chrome prior to 89.0.4389.114 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
[]
GHSA-3m2m-wf44-wv2h
IBM Rational Quality Manager (RQM) 5.0 through 5.02 and 6.0 through 6.0.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133259.
[]
GHSA-xq84-67jm-4565
The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.
[]
GHSA-94jm-5vmh-jwwc
DeluxeBB 1.3 allows remote attackers to obtain sensitive information via a crafted page parameter to misc.php, which reveals the installation path in an error message. NOTE: this issue might be resultant from improperly controlled computation in tools.php that leads to a denial of service (CPU or memory consumption).
[]
CVE-2018-0109
A vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attacker to access sensitive data about the application. An attacker could exploit this vulnerability to obtain information to conduct additional reconnaissance attacks. The vulnerability is due to a design flaw in Cisco WebEx Meetings Server that could allow an attacker who is authenticated as root to gain shared secrets. An attacker could exploit the vulnerability by accessing the root account and viewing sensitive information. Successful exploitation could allow the attacker to discover sensitive information about the application. Cisco Bug IDs: CSCvg42664.
[ "cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*" ]
GHSA-4rm2-h745-5rf8
Multiple unspecified vulnerabilities in the Internet Key Exchange version 1 (IKEv1) implementation in HP HP-UX B.11.00, B.11.11, and B.11.23 running IPSec, HP Jetdirect 635n IPv6/IPsec Print Server, and HP Tru64 UNIX 5.1B-3 and 5.1B-2/PK4, allow remote attackers to cause a denial of service via certain IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the HP advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
[]