id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2024-5473 | Simple Photoswipe <= 0.1 - Admin+ Stored XSS | The Simple Photoswipe WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [
"cpe:2.3:a:wordpress_plugin:simple_photoswipe:*:*:*:*:*:*:*:*"
] |
GHSA-86f9-hf9f-rqq8 | IBM Maximo Asset Management 6.2 through 6.2.8, 7.1 before 7.1.1.12, and 7.5 before 7.5.0.5 allows remote authenticated users to gain privileges via unspecified vectors, a different vulnerability than CVE-2013-5382. | [] |
|
GHSA-g668-x6wm-whp7 | When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. | [] |
|
CVE-2015-6303 | The Cisco Spark application 2015-07-04 for mobile operating systems does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate, aka Bug IDs CSCut36742 and CSCut36844. | [
"cpe:2.3:a:cisco:spark:2015-07-04_base:*:*:*:*:*:*:*"
] |
|
GHSA-vwxj-c2x7-fp2v | Stack-based buffer overflow in Hamster Audio Player 0.3a allows remote attackers to execute arbitrary code via a long string in a (1) .m3u or (2) .hpl playlist file. | [] |
|
GHSA-p6w9-3jwp-mx86 | Unauth. Stored Cross-Site Scripting (XSS) vulnerability in UserFeedback Team User Feedback plugin <= 1.0.7 versions. | [] |
|
CVE-2018-14059 | Pimcore allows XSS via Users, Assets, Data Objects, Video Thumbnails, Image Thumbnails, Field-Collections, Objectbrick, Classification Store, Document Types, Predefined Properties, Predefined Asset Metadata, Quantity Value, and Static Routes functions. | [
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] |
|
GHSA-q36r-q874-43q3 | strongSwan 4.2.6 and earlier allows remote attackers to cause a denial of service (daemon crash) via an IKE_SA_INIT message with a large number of NULL values in a Key Exchange payload, which triggers a NULL pointer dereference for the return value of the mpz_export function in the GNU Multiprecision Library (GMP). | [] |
|
GHSA-3v8w-83qw-5vpf | A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset. | [] |
|
CVE-2021-42524 | Adobe Animate BMP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file. | [
"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2014-1550 | Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:24.6:*:*:*:*:*:*:*"
] |
|
GHSA-279q-3xp7-xvgp | CommuniLink Internet Limited CLink Office v2.0 was discovered to contain multiple SQL injection vulnerabilities via the username and password parameters. | [] |
|
GHSA-r2p2-ghmw-h7xw | BIOTRONIK CardioMessenger II, The affected products do not properly enforce mutual authentication with the BIOTRONIK Remote Communication infrastructure. | [] |
|
GHSA-g8h6-gmhw-mc7m | LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191. | [] |
|
GHSA-f9xc-wx3m-8p85 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] |
|
GHSA-5g39-p52c-vm53 | Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formexeCommand function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string. | [] |
|
GHSA-w5xh-5hmg-2rv2 | The Inventory Solution component in the Management Agent in the client in Symantec Altiris IT Management Suite (ITMS) through 7.6 HF7 allows local users to bypass intended application-blacklist restrictions via unspecified vectors. | [] |
|
CVE-2010-2611 | SQL injection vulnerability in show_search_result.php in i-netsolution Job Search Engine allows remote attackers to execute arbitrary SQL commands via the keyword parameter. | [
"cpe:2.3:a:i-netsolution:job_search_engine_script:*:*:*:*:*:*:*:*"
] |
|
GHSA-6r97-fp62-rh53 | An uninitialized pointer issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0). | [] |
|
CVE-2019-1208 | A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1236. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2009-0733 | Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions. | [
"cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-25429 | Tenda AC9 v15.03.2.21 was discovered to contain a buffer overflow via the time parameter in the saveparentcontrolinfo function. | [
"cpe:2.3:o:tenda:ac9_firmware:15.03.2.21:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-49570 | gpio: gpio-xilinx: Fix integer overflow | In the Linux kernel, the following vulnerability has been resolved:
gpio: gpio-xilinx: Fix integer overflow
Current implementation is not able to configure more than 32 pins
due to incorrect data type. So type casting with unsigned long
to avoid it. | [] |
CVE-2016-9489 | ManageEngine Applications Manager 12 and 13 is vulnerable to privilege escalation and authentication bypass | In ManageEngine Applications Manager 12 and 13 before build 13200, an authenticated user is able to alter all of their own properties, including own group, i.e. changing their group to one with higher privileges like "ADMIN". A user is also able to change properties of another user, e.g. change another user's password. | [
"cpe:2.3:a:zohocorp:manageengine_applications_manager:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_applications_manager:13.0:*:*:*:*:*:*:*"
] |
CVE-2015-3086 | Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK & Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3077 and CVE-2015-3084. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.169:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
GHSA-rhh8-vf3p-5mx3 | Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.<br />*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107. | [] |
|
CVE-2006-2049 | Cross-site scripting (XSS) vulnerability in dcboard.cgi in DCScripts DCForumLite 3.0 allows remote attackers to inject arbitrary web script or HTML via the az parameter. | [
"cpe:2.3:a:dcscripts:dcforumlite:3.0:*:*:*:*:*:*:*"
] |
|
GHSA-6w47-7mpv-4v7c | IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.12 could allow a remote attacker to cause a denial of service by sending a chunked transfer-encoding HTTP/2 request. IBM X-Force ID: 184441. | [] |
|
CVE-2013-5973 | VMware ESXi 4.0 through 5.5 and ESX 4.0 and 4.1 allow local users to read or modify arbitrary files by leveraging the Virtual Machine Power User or Resource Pool Administrator role for a vCenter Server Add Existing Disk action with a (1) -flat, (2) -rdm, or (3) -rdmp filename. | [
"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.0:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.0:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.1:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5:*:*:*:*:*:*:*"
] |
|
CVE-2016-0351 | IBM Security Identity Manager Virtual Appliance 7.0.x before 7.0.1.3-ISS-SIM-IF0001 does not set the secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. IBM X-Force ID: 111890. | [
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-6mr3-4w8x-ffcp | Unrestricted file upload vulnerability in the Worksheet designer in SpagoBI before 4.1 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in an unspecified directory, aka "XSS File Upload." | [] |
|
GHSA-rr98-pccv-8m4w | ean_leading_zeroes in backend/upcean.c in Zint Barcode Generator 2.19.1 has a stack-based buffer overflow that is reachable from the C API through an application that includes the Zint Barcode Generator library code. | [] |
|
GHSA-q4wq-jhgh-jg2v | In multiple locations, there is a possible way to corrupt memory due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
CVE-2023-46249 | authentik potential installation takeover when default admin user is deleted | authentik is an open-source Identity Provider. Prior to versions 2023.8.4 and 2023.10.2, when the default admin user has been deleted, it is potentially possible for an attacker to set the password of the default admin user without any authentication. authentik uses a blueprint to create the default admin user, which can also optionally set the default admin users' password from an environment variable. When the user is deleted, the `initial-setup` flow used to configure authentik after the first installation becomes available again. authentik 2023.8.4 and 2023.10.2 fix this issue. As a workaround, ensure the default admin user (Username `akadmin`) exists and has a password set. It is recommended to use a very strong password for this user, and store it in a secure location like a password manager. It is also possible to deactivate the user to prevent any logins as akadmin. | [
"cpe:2.3:a:goauthentik:authentik:*:*:*:*:*:*:*:*"
] |
CVE-2018-11412 | In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] |
|
GHSA-pmc5-xxrh-gw9h | A vulnerability was found in SourceCodester Establishment Billing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ajax.php?action=delete_block. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273157 was assigned to this vulnerability. | [] |
|
CVE-2015-7971 | Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c. | [
"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-6760 | Dataprobe iBootBar (with 2007-09-20 and possibly later beta firmware) allows remote attackers to bypass authentication, and conduct power-cycle attacks on connected devices, via a DCCOOKIE cookie. | [
"cpe:2.3:o:dataprobe:ibootbar_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dataprobe:ibootbar:-:*:*:*:*:*:*:*"
] |
|
GHSA-8cj6-498x-25v9 | The TCP/IP implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (reboot) via a crafted packet that terminates a TCP connection, aka "TCP FIN WAIT Vulnerability." | [] |
|
CVE-2024-10261 | Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction <= 2.13.0 - Unauthenticated Arbitrary Shortcode Execution | The The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.13.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. | [
"cpe:2.3:a:cozmoslabs:paid_member_subscriptions:*:*:*:*:*:*:*:*"
] |
CVE-2023-48894 | Incorrect Access Control vulnerability in jshERP V3.3 allows attackers to obtain sensitive information via the doFilter function. | [
"cpe:2.3:a:huaxiaerp:jsherp:3.3:*:*:*:*:*:*:*"
] |
|
CVE-2024-38235 | Windows Hyper-V Denial of Service Vulnerability | Windows Hyper-V Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.6293:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.6293:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2700:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.3197:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.3197:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.4894:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.4169:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.4169:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.4894:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:10.0.22631.4169:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:10.0.22631.4169:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1128:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.1742:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.1742:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20766:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7336:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7336:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] |
CVE-2013-4689 | J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1R before 12.1R6, 12.1X44 before 12.1X44-D15, 12.1x45 before 12.1X45-D10, 12.2 before 12.2R3, 12.3 before 12.3R2, and 13.1 before 13.1R3 allow remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism and hijack the authentication of administrators for requests that (1) create new administrator accounts or (2) have other unspecified impacts. | [
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x44:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.1x45:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.1:*:*:*:*:*:*:*"
] |
|
CVE-2023-1381 | WP Meta SEO < 4.5.5 - Author+ PHAR Deserialization | The WP Meta SEO WordPress plugin before 4.5.5 does not validate image file paths before attempting to manipulate the image files, leading to a PHAR deserialization vulnerability. Furthermore, the plugin contains a gadget chain which may be used in certain configurations to achieve remote code execution. | [
"cpe:2.3:a:joomunited:wp_meta_seo:*:*:*:*:*:wordpress:*:*"
] |
CVE-2017-1349 | IBM Sterling B2B Integrator Standard Edition 5.2 stores potentially sensitive information from HTTP sessions that could be read by a local user. IBM X-Force ID: 126525. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*"
] |
|
GHSA-fvjq-8mc2-j6v3 | CentOS-WebPanel.com (aka CWP) CentOS Web Panel through 0.9.8.740 allows XSS via the admin/index.php module parameter. | [] |
|
GHSA-r2fj-j5gm-xjr5 | An issue in TVS Motor Company Limited TVS Connet Android v.4.5.1 and iOS v.5.0.0 allows a remote attacker to obtain sensitive information via an insecure API endpoint | [] |
|
GHSA-46pf-6w9r-96r9 | grub2 allowed attackers with access to the grub shell to access files on the encrypted disks. | [] |
|
CVE-2012-1918 | Multiple directory traversal vulnerabilities in (1) compose.php and (2) libs/Atmail/SendMsg.php in @Mail WebMail Client in AtMail Open-Source before 1.05 allow remote attackers to read arbitrary files via a .. (dot dot) in the Attachment[] parameter. | [
"cpe:2.3:a:atmail:atmail_open:*:*:open-source:*:*:*:*:*"
] |
|
GHSA-hm36-5wqj-h637 | appconfig.php in ownCloud before 4.0.6 does not properly restrict access, which allows remote authenticated users to edit app configurations via unspecified vectors. NOTE: this can be leveraged by unauthenticated remote attackers using CVE-2012-4393. | [] |
|
CVE-2018-17478 | Incorrect array position calculations in V8 in Google Chrome prior to 70.0.3538.102 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-16782 | libimageworsener.a in ImageWorsener 1.3.2 has a buffer overflow in the bmpr_read_rle_internal function in imagew-bmp.c. | [
"cpe:2.3:a:entropymine:imageworsener:1.3.2:*:*:*:*:*:*:*"
] |
|
GHSA-4x4w-8h8m-c5q7 | ** UNSUPPORTED WHEN ASSIGNED ** A remote insecure deserialization vulnerability exixsts in VMWare Hyperic Agent 5.8.6. Exploitation of this vulnerability enables a malicious authenticated user to run arbitrary code or malware within a Hyperic Agent instance and its host operating system with the privileges of the Hyperic Agent process (often SYSTEM on Windows platforms). NOTE: prior exploitation of CVE-2022-38650 results in the disclosure of the authentication material required to exploit this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [] |
|
CVE-2008-6666 | Multiple cross-site scripting (XSS) vulnerabilities in Kronos webTA allow remote attackers to inject arbitrary web script or HTML via the description field to (1) servlet/com.threeis.webta.H710selProject and (2) servlet/com.threeis.webta.H720editProjectInfo. NOTE: BID:29610 states that the initial report was incorrect, but the reason for this conclusion is unknown. | [
"cpe:2.3:a:kronos:kronos_webta:-:*:*:*:*:*:*:*"
] |
|
GHSA-x65v-v924-92w9 | Under certain circumstances exacqVision Web Services will not enforce secure web communications (HTTPS) | [] |
|
CVE-2022-43143 | A cross-site scripting (XSS) vulnerability in Beekeeper Studio v3.6.6 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the error modal container. | [
"cpe:2.3:a:beekeeperstudio:beekeeper-studio:3.6.6:*:*:*:*:*:*:*"
] |
|
CVE-2024-41646 | Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 ROS2 navigation2 v.humble allows an attacker to execute arbitrary code via a crafted script to the nav2_dwb_controller. | [
"cpe:2.3:a:openrobotics:robot_operating_system:2:humble:*:*:*:*:*:*",
"cpe:2.3:a:openrobotics:robot_operating_system:2:iron:*:*:*:*:*:*"
] |
|
GHSA-9rcx-r2cj-mhvq | VMware vRealize Operations contains an information disclosure vulnerability. A low-privileged malicious actor with network access can access log files that lead to information disclosure. | [] |
|
GHSA-h6f5-8jj5-cxhr | xwiki-platform vulnerable to Remote Code Execution in Annotations | ImpactThe annotation displayer does not execute the content in a restricted context. This allows executing anything with the right of the author of any document by annotating the document.To reproduce: add an annotation with the content `{{groovy}}print "hello"{{/groovy}}` and click the yellow scare to get a display of the annotation inline.The result is "hello" but it should be an error suggesting that it's not allowed to use the groovy macro.PatchesThis has been patched in XWiki 13.10.11, 14.4.7 and 14.10.WorkaroundsThere is no easy workaround except to upgrade.Referenceshttps://jira.xwiki.org/browse/XWIKI-20360https://jira.xwiki.org/browse/XWIKI-20384For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])AttributionThis vulnerability has been reported by René de Sain @renniepak. | [] |
CVE-2025-2210 | aitangbao springboot-manager add cross site scripting | A vulnerability has been found in aitangbao springboot-manager 3.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /sysJob/add. The manipulation of the argument name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
GHSA-8pc9-qhj9-cjc3 | SQL injection vulnerability in cisco/services/PhonecDirectory.php in Fonality Trixbox 2.2.4 allows remote attackers to execute arbitrary SQL commands via the ID parameter. | [] |
|
GHSA-w7x9-c9q2-r2r6 | HEIF Image Extensions Remote Code Execution Vulnerability | [] |
|
GHSA-5ccm-hxhv-w693 | A vulnerability, which was classified as critical, has been found in Tenda TX9 22.03.02.10. This issue affects the function sub_42C014 of the file /goform/PowerSaveSet. The manipulation of the argument time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261857 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-r63h-2v62-7gwc | An issue has been discovered in GitLab CE/EE affecting all versions starting from 1.2 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An issue was found that allows someone to abuse a discrepancy between the Web application display and the git command line interface to social engineer victims into cloning non-trusted code. | [] |
|
CVE-2016-4957 | ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547. | [
"cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*",
"cpe:2.3:a:ntp:ntp:4.3.92:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"
] |
|
CVE-2017-8175 | The Bastet of some Huawei mobile phones with software earlier than Vicky-AL00AC00B167 versions, earlier than Victoria-AL00AC00B167 versions, earlier than Warsaw-AL00C00B191 versions has an insufficient input validation vulnerability due to the lack of parameter validation. An attacker may trick a user into installing a malicious APP. The APP can modify specific parameter to cause system reboot. | [
"cpe:2.3:a:huawei:vicky-al00a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:victoria-al00a:*:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:warsaw-al00:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-6880 | Buffer overflow in Cerberus FTP Server 8.0.10.3 allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long MLST command. | [
"cpe:2.3:a:cerberus:cerberus_ftp_server:8.0.10.3:*:*:*:*:*:*:*"
] |
|
GHSA-4gjj-r7w8-42cq | Jerome Gamez Firebase Admin SDK for PHP Incorrect Access Control vulnerability | Jerome Gamez Firebase Admin SDK for PHP version from 3.2.0 to 3.8.0 contains a Incorrect Access Control vulnerability in `src/Firebase/Auth/IdTokenVerifier.php` does not verify for token signature that can result in JWT with any email address and user ID could be forged from an actual token, or from thin air. This attack appear to be exploitable via Attacker would only need to know email address of the victim on most cases.. This vulnerability appears to have been fixed in 3.8.1. | [] |
CVE-2018-1310 | Apache NiFi JMS Deserialization issue because of ActiveMQ client vulnerability. Malicious JMS content could cause denial of service. See ActiveMQ CVE-2015-5254 announcement for more information. The fix to upgrade the activemq-client library to 5.15.3 was applied on the Apache NiFi 1.6.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | [
"cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*"
] |
|
GHSA-wj5c-9284-hw75 | Vulnerability in the Oracle Hospitality RES 3700 component of Oracle Food and Beverage Applications. The supported version that is affected is 5.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Hospitality RES 3700. While the vulnerability is in Oracle Hospitality RES 3700, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Hospitality RES 3700. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). | [] |
|
CVE-2025-22711 | WordPress Image Source Control Lite Plugin <= 2.29.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Thomas Maier Image Source Control allows Reflected XSS. This issue affects Image Source Control: from n/a through 2.29.0. | [] |
GHSA-xwr5-mcxm-cm87 | This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution. | [] |
|
CVE-2024-39669 | In the Console in Soffid IAM before 3.5.39, necessary checks were not applied to some Java objects. A malicious agent could possibly execute arbitrary code in the Sync Server and compromise security. | [
"cpe:2.3:a:soffid:iam:*:*:*:*:*:*:*:*"
] |
|
GHSA-22q9-m8j5-x7xg | cute_png v1.05 was discovered to contain a heap buffer overflow via the cp_make32() function at cute_png.h. | [] |
|
CVE-2023-4220 | Chamilo LMS Unauthenticated Big Upload File Remote Code Execution | Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell. | [
"cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*"
] |
CVE-2020-12418 | Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] |
|
GHSA-gq6m-mjcr-3rrh | APKs without proper permission may bind to CallEnhancementService and can lead to unauthorized access to call status in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, APQ8096AU, APQ8098, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, Nicobar, QCA6574AU, QCS605, QM215, SA6155P, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SM6150, SM8150, SM8250, SXR2130 | [] |
|
GHSA-72gm-pp6q-gpx5 | ChakraCore RCE Vulnerability | ChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930. | [] |
CVE-2024-4754 | Stored XSS in Next4Biz's BPM | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Next4Biz CRM & BPM Software Business Process Manangement (BPM) allows Stored XSS.This issue affects Business Process Manangement (BPM): from 6.6.4.4 before 6.6.4.5. | [] |
GHSA-cm69-2c6j-6pvp | A remote cross-site request forgery (csrf) vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.4; Prior to 8.8.0.1, 8.7.1.2, 8.6.0.8, 8.5.0.12, 8.3.0.15. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability. | [] |
|
GHSA-f265-j59f-f7vh | Multiple SQL injection vulnerabilities in the Downloads module for PHP-Nuke 7.6 allow remote attackers to inject arbitrary web script or HTML via (1) the email or url parameters in the Add function, (2) the min parameter in the viewsdownload function, or (3) the min parameter in the search function. | [] |
|
CVE-2005-1240 | Directory traversal vulnerability in the third party tool from Castlehill, as used to secure the iSeries AS/400 FTP server, allows remote attackers to access arbitrary files, including those from qsys.lib, via ".." sequences in a GET request. | [
"cpe:2.3:a:castlehill:secure_net:*:*:*:*:*:*:*:*"
] |
|
GHSA-f8x9-gxvg-7838 | In all Qualcomm products with Android releases from CAF using the Linux kernel, a kernel fault can occur when doing certain operations on a read-only virtual address in userspace. | [] |
|
GHSA-56cx-256p-gj3x | SQL injection vulnerability in the mc_project_get_attachments function in api/soap/mc_project_api.php in MantisBT before 1.2.18 allows remote attackers to execute arbitrary SQL commands via the project_id parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1609. | [] |
|
GHSA-r375-22x8-pwjm | Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to conduct cross-site scriptings attacks via the sms.php dialogs. | [] |
|
CVE-2024-41098 | ata: libata-core: Fix null pointer dereference on error | In the Linux kernel, the following vulnerability has been resolved:
ata: libata-core: Fix null pointer dereference on error
If the ata_port_alloc() call in ata_host_alloc() fails,
ata_host_release() will get called.
However, the code in ata_host_release() tries to free ata_port struct
members unconditionally, which can lead to the following:
BUG: unable to handle page fault for address: 0000000000003990
PGD 0 P4D 0
Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 10 PID: 594 Comm: (udev-worker) Not tainted 6.10.0-rc5 #44
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:ata_host_release.cold+0x2f/0x6e [libata]
Code: e4 4d 63 f4 44 89 e2 48 c7 c6 90 ad 32 c0 48 c7 c7 d0 70 33 c0 49 83 c6 0e 41
RSP: 0018:ffffc90000ebb968 EFLAGS: 00010246
RAX: 0000000000000041 RBX: ffff88810fb52e78 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff88813b3218c0 RDI: ffff88813b3218c0
RBP: ffff88810fb52e40 R08: 0000000000000000 R09: 6c65725f74736f68
R10: ffffc90000ebb738 R11: 73692033203a746e R12: 0000000000000004
R13: 0000000000000000 R14: 0000000000000011 R15: 0000000000000006
FS: 00007f6cc55b9980(0000) GS:ffff88813b300000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000003990 CR3: 00000001122a2000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
<TASK>
? __die_body.cold+0x19/0x27
? page_fault_oops+0x15a/0x2f0
? exc_page_fault+0x7e/0x180
? asm_exc_page_fault+0x26/0x30
? ata_host_release.cold+0x2f/0x6e [libata]
? ata_host_release.cold+0x2f/0x6e [libata]
release_nodes+0x35/0xb0
devres_release_group+0x113/0x140
ata_host_alloc+0xed/0x120 [libata]
ata_host_alloc_pinfo+0x14/0xa0 [libata]
ahci_init_one+0x6c9/0xd20 [ahci]
Do not access ata_port struct members unconditionally. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2020-11971 | Apache Camel's JMX is vulnerable to Rebind Flaw. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.x, 3.0.0 up to 3.1.0 is affected. Users should upgrade to 3.2.0. | [
"cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-m54w-j3mh-r5p3 | An exploitable heap overflow vulnerability in the AcCellMargin handling code in Autodesk Advance Steel 2018, Autodesk AutoCAD 2018, Autodesk AutoCAD Architecture 2018, Autodesk AutoCAD Electrical 2018, Autodesk AutoCAD Map 3D 2018, Autodesk AutoCAD Mechanical 2018, Autodesk AutoCAD MEP 2018, Autodesk AutoCAD P&ID 2018, Autodesk AutoCAD Plant 3D 2018, Autodesk AutoCAD LT 2018, and Autodesk Civil 3D 2018. A specially crafted DXF file with too many cell margins populating an AcCellMargin object may cause a heap overflow, resulting in code execution. | [] |
|
CVE-2015-5330 | ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value. | [
"cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*"
] |
|
GHSA-5ch6-f66f-xfpj | The OpenType Font (OTF) format driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 performs an incorrect integer calculation during font processing, which allows local users to gain privileges via a crafted application, aka "OpenType Font Validation Vulnerability." | [] |
|
GHSA-8g65-2hpp-8gjf | An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server’s functionality for handling file uploads and the associated validation processes. | [] |
|
GHSA-j45j-3c7p-vf8f | Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects. | [] |
|
CVE-2009-1920 | The JScript scripting engine 5.1, 5.6, 5.7, and 5.8 in JScript.dll in Microsoft Windows, as used in Internet Explorer, does not properly load decoded scripts into memory before execution, which allows remote attackers to execute arbitrary code via a crafted web site that triggers memory corruption, aka "JScript Remote Code Execution Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:-:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*"
] |
|
CVE-2024-2043 | The EleForms – All In One Form Integration including DB for Elementor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check when downloading form submissions in all versions up to, and including, 2.9.9.7. This makes it possible for unauthenticated attackers to view form submissions. | [] |
|
CVE-2024-7679 | Improper neutralization special element in hyperlinks | In Progress Telerik UI for WinForms versions prior to 2024 Q3 (2024.3.924), a command injection attack is possible through improper neutralization of hyperlink elements. | [
"cpe:2.3:a:telerik:ui_for_winforms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:telerik:ui_for_wpf:*:*:*:*:*:*:*:*"
] |
CVE-2022-20341 | In ConnectivityService, there is a possible bypass of network permissions due to a missing permission check. This could lead to local information disclosure of tethering interfaces with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-162952629 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-1002102 | In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using a secret, configMap, projected or downwardAPI volume can trigger deletion of arbitrary files/directories from the nodes where they are running. | [
"cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-4202 | Guidance Software EnCase Enterprise Edition (EEE) 6 does not properly verify the identity of the acquisition target during communication with the EnCase Servlet (EEE servlet), which might allow remote attackers to spoof the disk image. | [
"cpe:2.3:a:guidance_software:encase:6.0:*:enterprise_edition:*:*:*:*:*"
] |
|
CVE-2000-1193 | Performance Metrics Collector Daemon (PMCD) in Performance Copilot in IRIX 6.x allows remote attackers to cause a denial of service (resource exhaustion) via an extremely long string to the PMCD port. | [
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*"
] |
|
GHSA-r2mp-4cvm-jjmc | A vulnerability was found in Any-Capture Any Sound Recorder 2.93. It has been declared as problematic. This vulnerability affects unknown code of the component Registration Handler. The manipulation of the argument User Name/Key Code leads to memory corruption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-251674 is the identifier assigned to this vulnerability. | [] |
Subsets and Splits