
id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2013-0559 | Unspecified vulnerability in IBM API Management 2.0 before 2.0.0.1 allows remote attackers to access tenant APIs, and consequently obtain sensitive information or modify data, via unknown vectors. | [
"cpe:2.3:a:ibm:api_management:2.0.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2011-3940 | nsvdec.c in libavcodec in FFmpeg 0.7.x before 0.7.12 and 0.8.x before 0.8.11, and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.5, and 0.8.x before 0.8.1, allows remote attackers to cause a denial of service (out-of-bounds read and write) via a crafted NSV file that triggers "use of uninitialized streams." | [
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*"
] |
|
CVE-2020-7252 | Unquoted service executable path | Unquoted service executable path in DXL Broker in McAfee Data eXchange Layer (DXL) Framework 6.0.0 and earlier allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files. | [
"cpe:2.3:a:mcafee:data_exchange_layer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2020-26710 | easy-parse v0.1.1 was discovered to contain a XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. | [
"cpe:2.3:a:easy-parse_project:easy-parse:0.1.1:*:*:*:*:python:*:*"
] |
|
CVE-2018-20669 | An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*"
] |
|
CVE-2002-0654 | Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked. | [
"cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.28:beta:win32:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.32:beta:win32:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.34:beta:win32:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*"
] |
|
CVE-2017-3767 | A local privilege escalation vulnerability was identified in the Realtek audio driver versions prior to 6.0.1.8224 in some Lenovo ThinkPad products. An attacker with local privileges could execute code with administrative privileges. | [
"cpe:2.3:o:realtek:audio_driver_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_11e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_13:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l460:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l470_kbl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l470_skl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l560:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p50s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p51s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p70:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p71:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1_yoga_12:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t440:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t440p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t440s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t450s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470s_skl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t540p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t560:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_w540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_w541:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_w550s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_tablet:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x240s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x270_kbl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x270_skl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_11e:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-2353 | The CHP Ads Block Detector plugin for WordPress is vulnerable to unauthorized plugin settings update and reset due to a missing capability check on the chp_abd_action function in versions up to, and including, 3.9.4. This makes it possible for subscriber-level attackers to change or reset plugin settings. CVE-2023-36509 appears to be a duplicate of this issue. | [
"cpe:2.3:a:sureshchand:chp_ads_block_detector:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-q7qq-f4xj-p23m | The Kaspersky Internet Security (aka com.kms.free) application 11.4.4.232 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2018-2776 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Group Replication GCS). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via XCom to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] |
|
CVE-2022-46295 | Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the Gaussian file format | [
"cpe:2.3:a:openbabel:open_babel:3.1.1:*:*:*:*:*:*:*"
] |
|
GHSA-jcxv-6f65-7hrx | Microsoft Exchange Server Security Feature Bypass Vulnerability | [] |
|
GHSA-fgqx-c62g-pm83 | The The Authors List plugin for WordPress is vulnerable to arbitrary shortcode execution via update_authors_list_ajax AJAX action in all versions up to, and including, 2.0.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. | [] |
|
GHSA-p6fp-5rvv-m3w2 | The XML API in TelePresence Codec (TC) 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, and 7.3.5 and Collaboration Endpoint (CE) 8.0.0, 8.0.1, and 8.1.0 in Cisco TelePresence Software mishandles authentication, which allows remote attackers to execute control commands or make configuration changes via an API request, aka Bug ID CSCuz26935. | [] |
|
GHSA-jpjm-vqwj-fx52 | Unspecified vulnerability in the Oracle Internet Directory component in Oracle Application Server 9.0.4.3, 10.1.2.0.2, 10.1.2.2, and 10.1.4.0, and Collaboration Suite 10.1.2, has unknown impact and remote attack vectors, aka AS08. | [] |
|
CVE-2016-3615 | Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML. | [
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] |
|
CVE-2011-3873 | Google Chrome before 14.0.835.202 does not properly implement shader translation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-r88p-v4gx-g8qr | Adobe Connect versions 12.3 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [] |
|
GHSA-9p28-hjc9-q5m3 | Unspecified vulnerability in CA IdentityMinder r12.0 through CR16, r12.5 before SP15, and r12.6 GA allows remote attackers to bypass intended access restrictions via unknown vectors. | [] |
|
CVE-2008-5158 | Client Software WinCom LPD Total 3.0.2.623 and earlier allows remote attackers to bypass authentication and perform administrative actions via vectors involving "simply skipping the auth stage." | [
"cpe:2.3:a:clientsoftware:wincome_mpd_total:*:*:*:*:*:*:*:*"
] |
|
GHSA-mhq6-64cp-3vx7 | It was found that usage of snprintf function in feature/locks translator of glusterfs server 3.8.4, as shipped with Red Hat Gluster Storage, was vulnerable to a format string attack. A remote, authenticated attacker could use this flaw to cause remote denial of service. | [] |
|
GHSA-7hx2-pgg7-f6rg | A vulnerability in the web-based interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface.
This vulnerability is due to insufficient validation of user-supplied input by the web-based interface of Cisco Webex Meetings. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | [] |
|
CVE-2024-48974 | Life2000 Ventilator does not perform proper file integrity checks when adopting firmware updates | The ventilator does not perform proper file integrity checks when adopting firmware updates. This makes it possible for an attacker to force unauthorized changes to the device's configuration settings and/or compromise device functionality by pushing a compromised/illegitimate firmware file. This could disrupt the function of the device and/or cause unauthorized information disclosure. | [
"cpe:2.3:o:baxter:life2000_ventilator_firmware:*:*:*:*:*:*:*:*"
] |
GHSA-c69j-pcc5-v392 | Server-Side Request Forgery (SSRF) vulnerability in Culqi.This issue affects Culqi: from n/a through 3.0.14. | [] |
|
GHSA-857r-3f6j-392f | Multiple buffer overflows in the XSL parser for IceCast 2.20 may allow attackers to cause a denial of service and possibly execute arbitrary code via (1) a long test value in an xsl:when tag, (2) a long test value in an xsl:if tag, or (3) a long select value in an xsl:value-of tag. | [] |
|
CVE-2024-31874 | IBM Security Verify Access Appliance denial of service | IBM Security Verify Access Appliance 10.0.0 through 10.0.7 uses uninitialized variables when deploying that could allow a local user to cause a denial of service. IBM X-Force ID: 287318. | [] |
CVE-2017-11437 | GitLab Enterprise Edition (EE) before 8.17.7, 9.0.11, 9.1.8, 9.2.8, and 9.3.8 allows an authenticated user with the ability to create a project to use the mirroring feature to potentially read repositories belonging to other users. | [
"cpe:2.3:a:gitlab:gitlab:8.5.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.12:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.13:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.12:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.13:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.12:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.7:*:*:*:enterprise:*:*:*"
] |
|
GHSA-wmqm-v462-vmr9 | Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] |
|
CVE-2023-29321 | Adobe Animate FLA files Use After Free Arbitrary code execution | Adobe Animate versions 22.0.9 (and earlier) and 23.0.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:animate:23.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:animate:23.0.1:*:*:*:*:*:*:*"
] |
GHSA-xxqg-cq6p-jpqq | Jenzabar JICS (aka Internet Campus Solution) before 9.0.1 Patch 3, 9.1 before 9.1.2 Patch 2, and 9.2 before 9.2.2 Patch 8 has session cookies that are a deterministic function of the username. There is a hard-coded password to supply a PBKDF feeding into AES to encrypt a username and base64 encode it to a client-side cookie for persistent session authentication. By knowing the key and algorithm, an attacker can select any username, encrypt it, base64 encode it, and save it in their browser with the correct JICSLoginCookie cookie format to impersonate any real user in the JICS database without the need for authenticating (or verifying with MFA if implemented). | [] |
|
GHSA-9fp8-gjq2-822p | A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.aspx component of GruppoSCAI RealGimm v1.1.37p38 allows attackers to read any file in the filesystem via supplying a crafted XML file. | [] |
|
GHSA-wwq6-8qmj-449j | http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028. | [] |
|
CVE-2011-0858 | Unspecified vulnerability in Oracle PeopleSoft Enterprise HRMS 9.0 Bundle #15 and 9.1 Bundle #5 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Talent Acquisition Manager. | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_hrms:9.0:bundle15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_hrms:9.1:bundle5:*:*:*:*:*:*"
] |
|
GHSA-jrxr-fwjr-rghr | Exposure of Sensitive Information vulnerability in getDefaultChipId in UwbAospAdapterService prior to SMR Jul-2023 Release 1 allows local attackers to access the UWB chipset Identifier. | [] |
|
CVE-2006-4968 | PHP remote file inclusion vulnerability in includes/functions_admin.php in PNphpBB 1.2g allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [
"cpe:2.3:a:postnuke_software_foundation:pnphpbb:1.2g:*:*:*:*:*:*:*"
] |
|
CVE-2016-0075 | The kernel in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application that makes an API call to access sensitive information in the registry, aka "Windows Kernel Local Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0073. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
] |
|
CVE-2024-38480 | "Piccoma" App for Android and iOS versions prior to 6.20.0 uses a hard-coded API key for an external service, which may allow a local attacker to obtain the API key. Note that the users of the app are not directly affected by this vulnerability. | [] |
|
CVE-2018-20378 | The L2CAP signaling channel implementation and SDP server implementation in OpenSynergy Blue SDK 3.2 through 6.0 allow remote, unauthenticated attackers to execute arbitrary code or cause a denial of service via malicious L2CAP configuration requests, in conjunction with crafted SDP communication over maliciously configured L2CAP channels. The attacker must have connectivity over the Bluetooth physical layer, and must be able to send raw L2CAP frames. This is related to L2Cap_HandleConfigReq in core/stack/l2cap/l2cap_sm.c and SdpServHandleServiceSearchAttribReq in core/stack/sdp/sdpserv.c. | [
"cpe:2.3:a:opensynergy:blue_sdk:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-9417 | In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-111450079 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-cfqx-4cch-8hgx | Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability Add Shortcodes Actions And Filters plugin <= 2.0.9 at WordPress. | [] |
|
CVE-2018-13760 | The mintToken function of a smart contract implementation for MoneyChainNet (MCN), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:moneychainnettoken_project:moneychainnettoken:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-36918 | bpf: Check bloom filter map value size | In the Linux kernel, the following vulnerability has been resolved:
bpf: Check bloom filter map value size
This patch adds a missing check to bloom filter creating, rejecting
values above KMALLOC_MAX_SIZE. This brings the bloom map in line with
many other map types.
The lack of this protection can cause kernel crashes for value sizes
that overflow int's. Such a crash was caught by syzkaller. The next
patch adds more guard-rails at a lower level. | [] |
GHSA-v4m9-5ffp-5x82 | ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function. | [] |
|
GHSA-p8rh-8mxv-5w8q | Cross-Site Request Forgery (CSRF) vulnerability in Veribo, Roland Murg WP Simple Booking Calendar.This issue affects WP Simple Booking Calendar: from n/a through 2.0.8.4. | [] |
|
GHSA-87xr-5223-mqpv | Multiple SQL injection vulnerabilities in e-Xoops (exoops) 1.08, and 1.05 Rev 1 through 3, allow remote attackers to execute arbitrary SQL commands via the (1) lid parameter to (a) mylinks/ratelink.php, (b) adresses/ratefile.php, (c) mydownloads/ratefile.php, (d) mysections/ratefile.php, and (e) myalbum/ratephoto.php in modules/; the (2) bid parameter to (f) modules/banners/click.php; and the (3) gid parameter to (g) modules/arcade/index.php in a show_stats and play_game action, related issues to CVE-2007-5104 and CVE-2007-6266. | [] |
|
GHSA-3628-rj84-6j8x | in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write. | [] |
|
GHSA-h8f8-w54h-wrj4 | Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | [] |
|
CVE-2012-3999 | Cross-site scripting (XSS) vulnerability in admin/login.php in Sticky Notes 0.3.09062012.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the username parameter. | [
"cpe:2.3:a:sayakbanerjee:sticky_notes:*:*:*:*:*:*:*:*"
] |
|
GHSA-952c-5r47-vpqf | The icmp6_send function in net/ipv6/icmp.c in the Linux kernel through 4.8.12 omits a certain check of the dst data structure, which allows remote attackers to cause a denial of service (panic) via a fragmented IPv6 packet. | [] |
|
GHSA-f768-8pvq-mm6r | Dolibarr vulnerable to Improper Validation of Specified Quantity in Input | Dolibarr 14.0.5 and prior versions are vulnerable to Improper Validation of Specified Quantity in Input. | [] |
CVE-2015-5129 | Heap-based buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK & Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5541. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-2951 | Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Configuration Manager). Supported versions that are affected are 8.55 and 8.56. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where PeopleSoft Enterprise PeopleTools executes to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*"
] |
|
GHSA-9w49-m7xh-5r39 | Cross-site scripting in papermerge | Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in Papermerge, a malicious document can be sent by email and is automatically uploaded into the Papermerge web application. Therefore, no authentication is required to exploit XSS if email consumption is configured. Otherwise authentication is required. | [] |
GHSA-4cx6-5w6j-4cvx | In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to control other running activities due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
CVE-2022-27897 | Palantir Gotham included an endpoint that would log arbitrary sized zip files. | Palantir Gotham versions prior to 3.22.11.2 included an unauthenticated endpoint that would load portions of maliciously crafted zip files to memory. An attacker could repeatedly upload a malicious zip file, which would allow them to exhaust memory resources on the dispatch server. | [
"cpe:2.3:o:palantir:gotham:*:*:*:*:*:*:*:*"
] |
GHSA-f8ph-3wg8-v87q | CDRRip.dll in Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. This is different from CVE-2021-38099. | [] |
|
CVE-2017-11345 | Stack buffer overflow in networkmap in Asuswrt-Merlin firmware for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to execute arbitrary code on the router by hosting a crafted device description XML document (that includes a serviceType element) at a URL specified within a Location header in an SSDP response. | [
"cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac66u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac58u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac58u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac55u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac55u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac52u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac52u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac51u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac51u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-n18u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-n18u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-n66u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-n66u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-n56u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-n56u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt_ac1200gu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt_ac1200gu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt_ac1200g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt_ac1200g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac1200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-ac53_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-ac53:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-n12hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_b1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-n12hp_b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-n12d1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-n12d1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-n12\\+_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-n12\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt_n12\\+_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt_n12\\+_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-n16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-n16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asuswrt-merlin_project:rt-n300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asuswrt-merlin_project:rt-n300:-:*:*:*:*:*:*:*"
] |
|
CVE-2005-0494 | The RgSecurity form in the HTTP server for the Thomson TCW690 cable modem running firmware 2.1 and software ST42.03.0a does not properly validate the password before performing changes, which allows remote attackers on the LAN to gain access via a direct POST request. | [
"cpe:2.3:h:thomson:thomson_cable_modem:tcw690:*:*:*:*:*:*:*"
] |
|
GHSA-qhpg-rfm9-mw4f | The Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'action' parameter in all versions up to, and including, 2.4.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] |
|
CVE-2024-2645 | Netentsec NS-ASG Application Security Gateway resetpwd.php xpath injection | A vulnerability classified as problematic has been found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /vpnweb/resetpwd/resetpwd.php. The manipulation of the argument UserId leads to improper neutralization of data within xpath expressions. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257283. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
GHSA-6g2w-257v-3c9f | Apache Camel information exposure vulnerability | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Camel. This issue affects Apache Camel from 3.X through <=3.14.8, from 3.18.X through <=3.18.7, from 3.20.X through <= 3.20.5, from 4.X through <= 4.0.0-M3.Users should upgrade to 3.14.9, 3.18.8, 3.20.6 or 3.21.0 and for users on Camel 4.x update to 4.0.0-RC1 | [] |
GHSA-85g9-r32q-9h5f | Cross-site scripting (XSS) vulnerability in the image processor in Zenphoto before 1.4.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2018-16868 | A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. | [
"cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*"
] |
|
GHSA-wjj2-66hj-pmf6 | ** DISPUTED ** Guidance Software EnCase allows user-assisted remote attackers to cause a denial of service via (1) a corrupted Microsoft Exchange database, which triggers an application crash when many options are selected; (2) a corrupted NTFS filesystem, which causes the application to report "memory allocation errors;" or (3) deeply nested directories, which trigger an application crash during an Expand All action. NOTE: the vendor disputes the significance of these vectors because the user can select fewer options, there is no operational impact, or the user can do less expansion. | [] |
|
GHSA-c5ww-jjpp-2wr5 | NetWare NFS mode 1 and 2 implements the "Read Only" flag in Unix by changing the ownership of a file to root, which allows local users to gain root privileges by creating a setuid program and setting it to "Read Only," which NetWare-NFS changes to a setuid root program. | [] |
|
CVE-2005-2321 | PHP remote file inclusion vulnerability in CaLogic 1.2.2 allows remote attackers to execute arbitrary code via the CLPATH parameter to (1) cl_minical.php, (2) clmcpreload.php, (3) mcconfig.php, or (4) mcpi-demo.php. | [
"cpe:2.3:a:calogic:calogic:1.2.2:*:*:*:*:*:*:*"
] |
|
GHSA-w42j-5h38-gj7v | Multiple cross-site scripting vulnerabilities in PostNuke 0.760-RC3 allow remote attackers to inject arbitrary web script or HTML via the (1) module parameter to admin.php or (2) op parameter to user.php. NOTE: the vendor reports that certain issues could not be reproduced for 760 RC3, or for .750. However, the op/user.php issue exists when the pnAntiCracker setting is disabled. | [] |
|
GHSA-6mjm-3w8w-26jh | A vulnerability classified as critical was found in koroket RedditOnRails. This vulnerability affects unknown code of the component Vote Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The name of the patch is 7f3c7407d95d532fcc342b00d68d0ea09ca71030. It is recommended to apply a patch to fix this issue. VDB-217594 is the identifier assigned to this vulnerability. | [] |
|
GHSA-4gx2-wfcv-mvp8 | Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484. | [] |
|
CVE-2024-1598 | Potential buffer overflow when handling UEFI variables | Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for Intel Gemini Lake.This issue affects:
SecureCore™ for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567.
| [
"cpe:2.3:a:phoenix:securecore_technology:-:*:*:*:*:*:*:*"
] |
GHSA-4874-wfww-j2mq | Buffer overflow in Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400 allows remote attackers to cause a denial of service (CPU crash and communication outage) via a malformed CIP packet. | [] |
|
GHSA-2p25-wrwc-3qp8 | An elevation of privilege vulnerability in the Broadcom bcmdhd driver. Product: Android. Versions: Android kernel. Android ID: A-63374465. References: B-V2017081501. | [] |
|
CVE-2024-48112 | A deserialization vulnerability in the component \controller\Index.php of Thinkphp v6.1.3 to v8.0.4 allows attackers to execute arbitrary code. | [
"cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-29990 | Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability | Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:azure_kubernetes_service_confidential_containers:*:*:*:*:*:*:*:*"
] |
GHSA-w929-482x-r269 | A vulnerability was reported in Lenovo PC Manager prior to version 2.8.90.11211 that could allow a local attacker to escalate privileges. | [] |
|
CVE-2022-40879 | kkFileView v4.1.0 is vulnerable to Cross Site Scripting (XSS) via the parameter 'errorMsg.' | [
"cpe:2.3:a:keking:kkfileview:4.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-rjw9-5xvx-3hwv | In Sophos Web Appliance (SWA) before 4.3.1.2, Session Fixation could occur, aka NSWA-1310. | [] |
|
CVE-2012-1093 | The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation. | [
"cpe:2.3:a:debian:x11-common:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-4hjw-gj2g-h3cx | Windows Kernel Elevation of Privilege Vulnerability | [] |
|
CVE-2019-0248 | Under certain conditions SAP Gateway of ABAP Application Server (fixed in SAP_GWFND 7.5, 7.51, 7.52, 7.53; SAP_BASIS 7.5) allows an attacker to access information which would otherwise be restricted. | [
"cpe:2.3:a:sap:netweaver:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:basis:7.5:*:*:*:*:*:*:*"
] |
|
CVE-2021-21744 | ZTE MF971R product has a configuration file control vulnerability. An attacker could use this vulnerability to modify the configuration parameters of the device, causing some security functions of the device to be disabled. | [
"cpe:2.3:o:zte:mf971r_firmware:v1.0.0b05:*:*:*:*:*:*:*",
"cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:mf971r_firmware:1v1.0.0b06:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:mf971r_firmware:2v1.0.0b03:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:mf971r_firmware:s2v1.0.0b03:*:*:*:*:*:*:*",
"cpe:2.3:o:zte:mf971r_firmware:sv1.0.0b05:*:*:*:*:*:*:*"
] |
|
GHSA-vpjc-3v2r-p99w | A Cross-Site Request Forgery (CSRF) in Academy LMS before v5.10 allows an attacker to arbitrarily create a page. | [] |
|
CVE-2023-37312 | D-Link DAP-2622 DDP Set Device Info Device Name Stack-based Buffer Overflow Remote Code Execution Vulnerability | D-Link DAP-2622 DDP Set Device Info Device Name Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20089. | [
"cpe:2.3:o:dlink:dap_2622_firmware:*:*:*:*:*:*:*:*"
] |
GHSA-qc7h-569f-c9vr | IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to obtain sensitive information caused by improper handling of Administrative Console data. This information could be used in further attacks against the system. IBM X-Force ID: 225347. | [] |
|
GHSA-vmwj-88gq-629h | On Juniper Networks Junos OS platforms with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak. If all the available memory is consumed, the traffic will be impacted and a reboot might be required. The following log can be seen if this issue happens. /kernel: rt_pfe_veto: Memory over consumed. Op 1 err 12, rtsm_id 0:-1, msg type 72 /kernel: rt_pfe_veto: free kmem_map memory = (20770816) curproc = kmd An administrator can use the following CLI command to monitor the status of memory consumption (ifstat bucket): user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 2588977 162708K - 19633958 <<<< user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 3021629 189749K - 22914415 <<<< This issue does not affect the following platforms: Juniper Networks MX Series. Juniper Networks PTX1000-72Q, PTX3000, PTX5000, PTX10001, PTX10002-60C, PTX10003_160C, PTX10003_80C, PTX10003_81CD, PTX10004, PTX10008, PTX10016 Series. Juniper Networks EX9200 Series. Juniper Networks ACX710, ACX6360 Series. Juniper Networks NFX Series. This issue affects Juniper Networks Junos OS: 17.1 versions 17.1R3 and above prior to 17.3R3-S11; 17.4 versions prior to 17.4R3-S5; 18.2 versions prior to 18.2R3-S7, 18.2R3-S8; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS prior to 17.1R3. | [] |
|
CVE-2017-6285 | NVIDIA libnvrm contains a possible out of bounds read due to a missing bounds check which could lead to local information disclosure. This issue is rated as moderate. Product: Android. Version: N/A. Android: A-64893156. Reference: N-CVE-2017-6285. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-38616 | SmartVista SVFE2 v2.2.22 was discovered to contain a SQL injection vulnerability via the UserForm:j_id90 parameter at /feegroups/tgrt_group.jsf. | [
"cpe:2.3:a:bpcbt:smartvista_front-end:*:*:*:*:*:*:*:*"
] |
|
GHSA-8786-r836-vpr3 | The ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via unspecified vectors. | [] |
|
GHSA-gxvv-xhxh-m3c6 | An issue was discovered in Mattermost Desktop App before 4.4.0. Prompting for HTTP Basic Authentication is mishandled, allowing phishing, aka MMSA-2020-0007. | [] |
|
GHSA-35p2-5vrh-m3p6 | DevDojo Voyager Arbitrary File Write | DevDojo Voyager through version 1.8.0 is vulnerable to bypassing the file type verification when an authenticated user uploads a file via /admin/media/upload. An authenticated user can upload a web shell causing arbitrary code execution on the server. | [] |
CVE-2024-25103 | Dynamic Link Library (DLL) Hijacking Vulnerability in CDAC AppSamvid Software | This vulnerability exists in AppSamvid software due to the usage of vulnerable and outdated components. An attacker with local administrative privileges could exploit this by placing malicious DLLs on the targeted system.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code on the targeted system. | [
"cpe:2.3:a:cdac:appsamvid_software:*:*:*:*:*:*:*:*"
] |
GHSA-frmv-64q7-356r | Mozilla Gecko before 5.0, as used in Firefox before 5.0 and Thunderbird before 5.0, does not block use of a cross-domain image as a WebGL texture, which allows remote attackers to obtain approximate copies of arbitrary images via a timing attack involving a crafted WebGL fragment shader. | [] |
|
GHSA-86qj-8cx4-9337 | The video carousel slider with lightbox plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] |
|
CVE-2012-0625 | WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-3700 | Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3695, CVE-2015-3696, CVE-2015-3697, CVE-2015-3698, CVE-2015-3699, CVE-2015-3701, and CVE-2015-3702. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-q24w-77p5-v6q8 | Wireshark 1.0.4 and earlier allows remote attackers to cause a denial of service via a long SMTP request, which triggers an infinite loop. | [] |
|
CVE-2023-40206 | WordPress WP 404 Auto Redirect to Similar Post Plugin <= 1.0.3 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in hwk-fr WP 404 Auto Redirect to Similar Post plugin <= 1.0.3 versions. | [
"cpe:2.3:a:hwk:wp_404_auto_redirect_to_similar_post:*:*:*:*:*:wordpress:*:*"
] |
GHSA-3368-v7m5-7xg6 | Paessler IPCheck Server Monitor before 5.3.3.639/640 does not properly implement a "list of acceptable host IP addresses in the probe settings," which has unknown impact and attack vectors. | [] |
|
CVE-2020-5829 | Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program. | [
"cpe:2.3:a:symantec:endpoint_protection_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection_manager:14.2:-:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection_manager:14.2:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection_manager:14.2:ru1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection_manager:14.2:ru1-mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection_manager:14.2:ru2:*:*:*:*:*:*"
] |
|
CVE-2022-24794 | Open Redirect in express-openid-connect | Express OpenID Connect is an Express JS middleware implementing sign on for Express web apps using OpenID Connect. Users of the `requiresAuth` middleware, either directly or through the default `authRequired` option, are vulnerable to an Open Redirect when the middleware is applied to a catch all route. If all routes under `example.com` are protected with the `requiresAuth` middleware, a visit to `http://example.com//google.com` will be redirected to `google.com` after login because the original url reported by the Express framework is not properly sanitized. This vulnerability affects versions prior to 2.7.2. Users are advised to upgrade. There are no known workarounds. | [
"cpe:2.3:a:auth0:express_openid_connect:*:*:*:*:*:node.js:*:*"
] |
Dataset Card for Dataset Name
This dataset has been generated with: https://github.com/vulnerability-lookup/VulnTrain
Based on data from the Vulnerability-Lookup instance operated by CIRCL: https://vulnerability.circl.lu/
The dataset is derived from CVE data provided by NIST and enriched with information from the CVE Program, FKIE, and Vulnrichment.
Dataset Details
Dataset Description
- Curated by: [More Information Needed]
- Funded by [optional]: [More Information Needed]
- Shared by [optional]: [More Information Needed]
- Language(s) (NLP): [More Information Needed]
- License: [More Information Needed]
Dataset Sources [optional]
- Repository: [More Information Needed]
- Paper [optional]: [More Information Needed]
- Demo [optional]: [More Information Needed]
Uses
Direct Use
[More Information Needed]
Out-of-Scope Use
[More Information Needed]
Dataset Structure
[More Information Needed]
Dataset Creation
Curation Rationale
[More Information Needed]
Source Data
Data Collection and Processing
[More Information Needed]
Who are the source data producers?
[More Information Needed]
Annotations [optional]
Annotation process
[More Information Needed]
Who are the annotators?
[More Information Needed]
Personal and Sensitive Information
[More Information Needed]
Bias, Risks, and Limitations
[More Information Needed]
Recommendations
Users should be made aware of the risks, biases and limitations of the dataset. More information needed for further recommendations.
Citation [optional]
BibTeX:
[More Information Needed]
APA:
[More Information Needed]
Glossary [optional]
[More Information Needed]
More Information [optional]
[More Information Needed]
Dataset Card Authors [optional]
[More Information Needed]
Dataset Card Contact
[More Information Needed]
- Downloads last month
- 488
Models trained or fine-tuned on CIRCL/vulnerability
