id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2018-1213 | Dell EMC Isilon OneFS versions between 8.1.0.0 - 8.1.0.1, 8.0.1.0 - 8.0.1.2, and 8.0.0.0 - 8.0.0.6, versions 7.2.1.x, and version 7.1.1.11 and 8.1.0.2 is affected by a cross-site request forgery vulnerability. A malicious user may potentially exploit this vulnerability to send unauthorized requests to the server on behalf of authenticated users of the application. | [
"cpe:2.3:a:dell:emc_isilon_onefs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_isilon_onefs:7.1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:emc_isilon_onefs:8.1.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-crm9-gf54-3rf6 | The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity. | [] |
|
CVE-2022-31542 | The mandoku/mdweb repository through 2015-05-07 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [
"cpe:2.3:a:mdweb_project:mdweb:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-13134 | ZeroWdd studentmanager TeacherController. java editTeacher unrestricted upload | A vulnerability, which was classified as critical, was found in ZeroWdd studentmanager 1.0. Affected is the function addTeacher/editTeacher of the file src/main/Java/com/wdd/studentmanager/controller/TeacherController. java. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-286j-4758-jr9w | The remote administration client for RhinoSoft Serv-U 3.0 sends the user password in plaintext even when S/KEY One-Time Password (OTP) authentication is enabled, which allows remote attackers to sniff passwords. | [] |
|
CVE-2025-22365 | WordPress EMC2 Alert Boxes Plugin <= 1.3 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric McNiece EMC2 Alert Boxes allows Stored XSS.This issue affects EMC2 Alert Boxes: from n/a through 1.3. | [] |
CVE-2017-1000393 | Jenkins 2.73.1 and earlier, 2.83 and earlier users with permission to create or configure agents in Jenkins could configure a launch method called 'Launch agent via execution of command on master'. This allowed them to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Configuration of this launch method now requires the Run Scripts permission typically only granted to administrators. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] |
|
GHSA-cq7c-xqh4-2wgw | Unknown vulnerability in ObjectWeb Consortium C-JDBC before 1.3.1 allows local users to bypass intended access restrictions and obtain the cache results from another user. | [] |
|
GHSA-g4gg-mp54-wh67 | Use-after-free vulnerability in the server application in 3S CODESYS Gateway 2.3.9.27 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors. | [] |
|
CVE-2012-4425 | libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable. NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself. | [
"cpe:2.3:a:freedesktop:spice-gtk:-:*:*:*:*:*:*:*",
"cpe:2.3:a:gtk:libgio:-:*:*:*:*:*:*:*"
] |
|
CVE-2007-4804 | Multiple SQL injection vulnerabilities in AuraCMS 1.5rc allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) hal.php, (2) cetak.php, (3) lihat.php, (4) pesan.php, and (5) teman.php, different vectors than CVE-2007-4171. NOTE: the scripts may be accessed through requests to the product's top-level default URI, using the pilih parameter, in some circumstances. | [
"cpe:2.3:a:auracms:auracms:1.5_rc:*:*:*:*:*:*:*"
] |
|
GHSA-8p8j-74m4-qvqp | A Cross-site scripting (XSS) vulnerability in the content editor in Gis3W g3w-suite 3.5 allows remote authenticated users to inject arbitrary web script or HTML and gain privileges via the description parameter. | [] |
|
CVE-2023-31142 | Discourse's general category permissions could be set back to default | Discourse is an open source discussion platform. Prior to version 3.0.4 of the `stable` branch and version 3.1.0.beta5 of the `beta` and `tests-passed` branches, if a site has modified their general category permissions, they could be set back to the default. This issue is patched in version 3.0.4 of the `stable` branch and version 3.1.0.beta5 of the `beta` and `tests-passed` branches. A workaround, only if you are modifying the general category permissions, is to use a new category for the same purpose. | [
"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta4:*:*:beta:*:*:*"
] |
CVE-2009-1976 | Unspecified vulnerability in the HTTP Server component in Oracle Application Server 10.1.2.3 allows remote attackers to affect integrity via unknown vectors. | [
"cpe:2.3:a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*"
] |
|
CVE-2010-4344 | Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging. | [
"cpe:2.3:a:exim:exim:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
] |
|
CVE-2020-14346 | A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [
"cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-12123 | An issue was discovered in ONAP SDNC before Dublin. By executing sla/printAsXml with a crafted module parameter, an authenticated user can execute an arbitrary command. All SDC setups that include admportal are affected. | [
"cpe:2.3:a:onap:open_network_automation_platform:*:*:*:*:*:*:*:*"
] |
|
GHSA-w43v-qr8x-xq75 | Textpattern CMS v4.8.7 and older vulnerability exists through Sensitive Cookie in HTTPS Session Without 'Secure' Attribute via textpattern/lib/txplib_misc.php. The secure flag is not set for txp_login session cookie in the application. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site. | [] |
|
CVE-2014-7862 | The DCPluginServelet servlet in ManageEngine Desktop Central and Desktop Central MSP before build 90109 allows remote attackers to create administrator accounts via an addPlugInUser action. | [
"cpe:2.3:a:zohocorp:desktop_central:*:*:*:*:managed_service_providers:*:*:*",
"cpe:2.3:a:zohocorp:desktop_central:*:*:*:*:*:*:*:*"
] |
|
GHSA-7546-wrqf-3fph | AeroCMS v0.0.1 was discovered to contain multiple stored cross-site scripting (XSS) vulnerabilities via the comment_author and comment_content parameters at /post.php. These vulnerabilities allow attackers to execute arbitrary web scripts or HTML via a crafted payload. | [] |
|
GHSA-23cv-7mvx-jcq6 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Realty Workstation allows Authentication Bypass.This issue affects Realty Workstation: from n/a through 1.0.45. | [] |
|
GHSA-mg2f-g382-vvc6 | This vulnerability allows unauthenticated remote attackers to bypass authentication and gain partial data access to the vulnerable Trellix IPS Manager with garbage data in response mostly | [] |
|
GHSA-4j2r-57hh-r7q9 | Improper authentication in BIOS firmware[A1] for some Intel(R) NUC Kits before version RY0386 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2021-4211 | A potential vulnerability in the SMI callback function used in the SMBIOS event log driver in some Lenovo Desktop, ThinkStation, and ThinkEdge models may allow an attacker with local access and elevated privileges to execute arbitrary code. | [
"cpe:2.3:o:lenovo:a340-22icb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:a340-22icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:a340-22ick_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:a340-22ick:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:a340-24icb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:a340-24icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:a340-24ick_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:a340-24ick:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:a540-24icb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:a540-24icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:a540-27icb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:a540-27icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_5-14iob6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_5-14iob6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_510s-07icb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_510s-07icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_510s-07ick_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_510s-07ick:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-22ada6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-22ada6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-22iil5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-22iil5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-22itl6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-22itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24ada6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24ada6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24iil5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24iil5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-24itl6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-24itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_aio_3-27itl6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_aio_3-27itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_creator_5-14iob6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_creator_5-14iob6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideacentre_gaming_5-14iob6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideacentre_gaming_5-14iob6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:se30_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:se30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m700_tiny_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m700_tiny:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m70a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m70a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m710e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m710e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m710q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m710q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m710q_\\(10yc\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m710q_\\(10yc\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m710s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m710s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m710t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m710t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m720e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m720e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m75n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m75n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m810z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m810z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m820z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m820z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m90a_\\(gen_2\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m90a_\\(gen_2\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m910q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m910q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m910s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m910s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m910t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m910t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkcentre_m910x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkcentre_m910x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkstation_p320_tiny_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkstation_p320_tiny:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v30a-22iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v30a-22iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v30a-24iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v30a-24iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v410z_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v410z:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v50t-13iob_g2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v50t-13iob_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v520s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v520s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v530-15icb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v530-15icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v530-15icr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v530-15icr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v530s-07icb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v530s-07icb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v530s-07icr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v530s-07icr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v540-24iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v540-24iwl:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-5693 | The Slots Vacation - FREE Slots (aka com.scopely.slotsvacation) application 1.47.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:withbuddies:slots_vacation_-_free_slots_:1.47.2:*:*:*:*:android:*:*"
] |
|
GHSA-543r-3vv7-j78g | IBM System Storage Virtualization Engine TS7700 3957-VEC, 3948-VED and 3957-VEC could allow a remote authenticated user to obtain sensitive information, caused by improper filtering of URLs. By submitting a specially crafted HTTP GET request, an attacker could exploit this vulnerability to view application source code, system configuration information, or other sensitive data related to the Management Interface. IBM X-Force ID: 272651. | [] |
|
CVE-2024-20906 | Vulnerability in the Integrated Lights Out Manager (ILOM) product of Oracle Systems (component: System Management). Supported versions that are affected are 3, 4 and 5. Easily exploitable vulnerability allows high privileged attacker with network access via ICMP to compromise Integrated Lights Out Manager (ILOM). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Integrated Lights Out Manager (ILOM), attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Integrated Lights Out Manager (ILOM) accessible data as well as unauthorized read access to a subset of Integrated Lights Out Manager (ILOM) accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:5.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2011-1532 | Unspecified vulnerability in the SNMP component on the HP Photosmart D110 and B110; Photosmart Plus B210; Photosmart Premium C310, Fax All-in-One, and C510; and ENVY 100 D410 printers allows remote attackers to obtain sensitive information or modify data via vectors related to the Embedded Web Server (EWS). | [
"cpe:2.3:h:hp:envy_100_d410:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:photosmart_b110:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:photosmart_d110:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:photosmart_plus_b210:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:photosmart_premium_c310:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:photosmart_premium_c510:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:photosmart_premium_fax_all-in-one:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-19781 | An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal. | [
"cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:application_delivery_controller_firmware:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_gateway_firmware:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_gateway_firmware:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_gateway_firmware:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_gateway_firmware:12.1:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:gateway_firmware:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:*"
] |
|
GHSA-695r-9vmq-rpff | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Biplob Adhikari Accordions allows Stored XSS.This issue affects Accordions: from n/a through 2.3.5. | [] |
|
GHSA-pgxv-x8c2-8f48 | Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of blue values, which causes the underflow when decrementing by 2 in a context that assumes an even number of values. | [] |
|
GHSA-5863-jg7w-jf64 | An incorrect authorization vulnerability was identified in GitHub Enterprise Server, allowing for escalation of privileges in GraphQL API requests from GitHub Apps. This vulnerability allowed an app installed on an organization to gain access to and modify most organization-level resources that are not tied to a repository regardless of granted permissions, such as users and organization-wide projects. Resources associated with repositories were not impacted, such as repository file content, repository-specific projects, issues, or pull requests. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.7.1 and was fixed in versions 3.3.16, 3.4.11, 3.5.8, 3.6.4, 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program. | [] |
|
GHSA-v69j-g3wf-8pqx | An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-35400458. References: QC-CR#1098363. | [] |
|
GHSA-xrw7-56rh-2jrq | In the Linux kernel, the following vulnerability has been resolved:usb: musb: sunxi: Fix accessing an released usb phyCommit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on
exit") will cause that usb phy @glue->xceiv is accessed after released.register platform driver @sunxi_musb_driver
// get the usb phy @glue->xceiv
sunxi_musb_probe() -> devm_usb_get_phy().register and unregister platform driver @musb_driver
musb_probe() -> sunxi_musb_init()
use the phy here
//the phy is released here
musb_remove() -> sunxi_musb_exit() -> devm_usb_put_phy()register @musb_driver again
musb_probe() -> sunxi_musb_init()
use the phy here but the phy has been released at 2).
...Fixed by reverting the commit, namely, removing devm_usb_put_phy()
from sunxi_musb_exit(). | [] |
|
CVE-2023-4269 | User Activity Log < 1.6.6 - Subscriber+ Log Export | The User Activity Log WordPress plugin before 1.6.6 lacks proper authorisation when exporting its activity logs, allowing any authenticated users, such as subscriber to perform such action and retrieve PII such as email addresses. | [
"cpe:2.3:a:solwininfotech:user_activity_log:*:*:*:*:*:wordpress:*:*"
] |
GHSA-4m8c-6ghq-qm6f | SQL injection vulnerability in gallery.asp in Xigla Absolute Image Gallery XE allows remote attackers to execute arbitrary SQL commands via the categoryid parameter in a viewimage action. | [] |
|
CVE-2020-7352 | GOG Galaxy GalaxyClientService Privilege Escalation | The GalaxyClientService component of GOG Galaxy runs with elevated SYSTEM privileges in a Windows environment. Due to the software shipping with embedded, static RSA private key, an attacker with this key material and local user permissions can effectively send any operating system command to the service for execution in this elevated context. The service listens for such commands on a locally-bound network port, localhost:9978. A Metasploit module has been published which exploits this vulnerability. This issue affects the 2.0.x branch of the software (2.0.12 and earlier) as well as the 1.2.x branch (1.2.64 and earlier). A fix was issued for the 2.0.x branch of the affected software. | [
"cpe:2.3:a:gog:galaxy:*:*:*:*:*:windows:*:*"
] |
CVE-2018-12336 | Undocumented Factory Backdoor in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows the vendor to extract confidential information via remote root SSH access. | [
"cpe:2.3:o:ecos:secure_boot_stick_firmware:5.6.5:*:*:*:*:*:*:*",
"cpe:2.3:h:ecos:secure_boot_stick:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-25472 | WordPress Podlove Podcast Publisher Plugin <= 3.8.3 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher plugin <= 3.8.3 versions. | [
"cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*"
] |
GHSA-8qrg-fxff-9fcm | In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twiceThe km.state is not checked in driver's delayed work. When
xfrm_state_check_expire() is called, the state can be reset to
XFRM_STATE_EXPIRED, even if it is XFRM_STATE_DEAD already. This
happens when xfrm state is deleted, but not freed yet. As
__xfrm_state_delete() is called again in xfrm timer, the following
crash occurs.To fix this issue, skip xfrm_state_check_expire() if km.state is not
XFRM_STATE_VALID.Oops: general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] SMP
CPU: 5 UID: 0 PID: 7448 Comm: kworker/u102:2 Not tainted 6.11.0-rc2+ #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Workqueue: mlx5e_ipsec: eth%d mlx5e_ipsec_handle_sw_limits [mlx5_core]
RIP: 0010:__xfrm_state_delete+0x3d/0x1b0
Code: 0f 84 8b 01 00 00 48 89 fd c6 87 c8 00 00 00 05 48 8d bb 40 10 00 00 e8 11 04 1a 00 48 8b 95 b8 00 00 00 48 8b 85 c0 00 00 00 <48> 89 42 08 48 89 10 48 8b 55 10 48 b8 00 01 00 00 00 00 ad de 48
RSP: 0018:ffff88885f945ec8 EFLAGS: 00010246
RAX: dead000000000122 RBX: ffffffff82afa940 RCX: 0000000000000036
RDX: dead000000000100 RSI: 0000000000000000 RDI: ffffffff82afb980
RBP: ffff888109a20340 R08: ffff88885f945ea0 R09: 0000000000000000
R10: 0000000000000000 R11: ffff88885f945ff8 R12: 0000000000000246
R13: ffff888109a20340 R14: ffff88885f95f420 R15: ffff88885f95f400
FS: 0000000000000000(0000) GS:ffff88885f940000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2163102430 CR3: 00000001128d6001 CR4: 0000000000370eb0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
? die_addr+0x33/0x90
? exc_general_protection+0x1a2/0x390
? asm_exc_general_protection+0x22/0x30
? __xfrm_state_delete+0x3d/0x1b0
? __xfrm_state_delete+0x2f/0x1b0
xfrm_timer_handler+0x174/0x350
? __xfrm_state_delete+0x1b0/0x1b0
__hrtimer_run_queues+0x121/0x270
hrtimer_run_softirq+0x88/0xd0
handle_softirqs+0xcc/0x270
do_softirq+0x3c/0x50
</IRQ>
<TASK>
__local_bh_enable_ip+0x47/0x50
mlx5e_ipsec_handle_sw_limits+0x7d/0x90 [mlx5_core]
process_one_work+0x137/0x2d0
worker_thread+0x28d/0x3a0
? rescuer_thread+0x480/0x480
kthread+0xb8/0xe0
? kthread_park+0x80/0x80
ret_from_fork+0x2d/0x50
? kthread_park+0x80/0x80
ret_from_fork_asm+0x11/0x20
</TASK> | [] |
|
CVE-2005-4364 | Cross-site scripting (XSS) vulnerability in index.cfm in Hot Banana Web Content Management Suite 5.3 allows remote attackers to inject arbitrary web script or HTML via the keywords parameter. | [
"cpe:2.3:a:hot_banana:web_content_management_suite:5.3:*:*:*:*:*:*:*"
] |
|
CVE-2019-12660 | Cisco IOS XE Software ASIC Register Write Vulnerability | A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to write values to the underlying memory of an affected device. The vulnerability is due to improper input validation and authorization of specific commands that a user can execute within the CLI. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to modify the configuration of the device to cause it to be non-secure and abnormally functioning. | [
"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*"
] |
GHSA-cxrr-h279-673f | A logic issue was addressed with improved checks. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. Location data may be shared via iCloud links even if Location metadata is disabled via the Share Sheet. | [] |
|
GHSA-9pxw-j7jv-x8q2 | ChinaMobile PLC Wireless Router GPN2.4P21-C-CN devices with firmware W2001EN-00 have an Incorrect Access Control vulnerability via the cgi-bin/webproc?getpage=html/index.html subpage=wlsecurity URI, allowing an Attacker to change the Wireless Security Password. | [] |
|
GHSA-hpw9-grqm-8q7c | This vulnerability allows local attackers to escalate privileges on affected installations of xhyve. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The specific flaw exists within the e1000 virtual device. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-15056. | [] |
|
GHSA-cg6g-9fch-922g | Sysaid – sysaid Open Redirect - An Attacker can change the redirect link at the parameter "redirectURL" from"GET" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. | [] |
|
CVE-2009-2026 | Stack-based buffer overflow in a token searching function in the dtscore library in Data Transport Services in CA Software Delivery r11.2 C1, C2, C3, and SP4; Unicenter Software Delivery 4.0 C3; CA Advantage Data Transport 3.0 C1; and CA IT Client Manager r12 allows remote attackers to execute arbitrary code via crafted data. | [
"cpe:2.3:a:ca:advantage_data_transport:3.0:c1:*:*:*:*:*:*",
"cpe:2.3:a:ca:it_client_manager:r12:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:software_delivery:r11:c1:*:*:*:*:*:*",
"cpe:2.3:a:ca:software_delivery:r11:c2:*:*:*:*:*:*",
"cpe:2.3:a:ca:software_delivery:r11:c3:*:*:*:*:*:*",
"cpe:2.3:a:ca:software_delivery:r11:sp4:*:*:*:*:*:*",
"cpe:2.3:a:ca:unicenter_software_delivery:4.0:c3:*:*:*:*:*:*"
] |
|
CVE-2024-23302 | Couchbase Server before 7.2.4 has a private key leak in goxdcr.log. | [
"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-c324-3376-98jf | LCDS Laquis SCADA prior to version 4.1.0.4150 allows the opening of a specially crafted report format file that may cause an out of bounds read, which may cause a system crash, allow data exfiltration, or remote code execution. | [] |
|
GHSA-8j7p-2f86-r4gv | An XSS issue was discovered in VirtueMart before 3.2.14. All the textareas in the backend of the plugin can be closed by simply adding </textarea> to the value and saving the product/config. By editing back the product/config, the editor's browser will execute everything after the </textarea>, leading to a possible XSS. | [] |
|
CVE-2023-38411 | Improper access control in the Intel Smart Campus android application before version 9.4 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:smart_campus:*:*:*:*:*:android:*:*"
] |
|
GHSA-323h-xv5h-r9j9 | Adobe Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 17.012.30229 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2019-15129 | The Recruitment module in Humanica Humatrix 7 1.0.0.203 and 1.0.0.681 allows an unauthenticated attacker to access all candidates' files in the photo folder on the website by specifying a "user id" parameter and file name, such as in a recruitment_online/upload/user/[user_id]/photo/[file_name] URI. | [
"cpe:2.3:a:humanica:humatrix_7:1.0.0.203:*:*:*:*:*:*:*",
"cpe:2.3:a:humanica:humatrix_7:1.0.0.681:*:*:*:*:*:*:*"
] |
|
CVE-2019-15274 | Cisco TelePresence Collaboration Endpoint Software Command Injection Vulnerability | A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to perform command injections. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating as an administrative level user within the restricted shell and submitting malicious input to a specific command. A successful exploit could allow the attacker to execute previously staged code from the underlying filesystem. | [
"cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*"
] |
GHSA-xq48-pc3g-f75m | PHP remote file inclusion vulnerability in forum/forum.php in lustig.cms BETA 2.5 allows remote attackers to execute arbitrary PHP code via a URL in the view parameter. | [] |
|
GHSA-3r4h-x82w-7jgc | Docker Desktop before 3.6.0 suffers from incorrect access control. If a low-privileged account is able to access the server running the Windows containers, it can lead to a full container compromise in both process isolation and Hyper-V isolation modes. This security issue leads an attacker with low privilege to read, write and possibly even execute code inside the containers. | [] |
|
GHSA-jg74-qcg9-xpp9 | SQL Injection exists in the File Download Tracker 3.0 component for Joomla! via the dynfield[phone] or sess parameter. | [] |
|
CVE-2020-26230 | Deanonymization of COVID-19 positive users of Radar COVID | Radar COVID is the official COVID-19 exposure notification app for Spain. In affected versions of Radar COVID, identification and de-anonymization of COVID-19 positive users that upload Radar COVID TEKs to the Radar COVID server is possible. This vulnerability enables the identification and de-anonymization of COVID-19 positive users when using Radar COVID. The vulnerability is caused by the fact that Radar COVID connections to the server (uploading of TEKs to the backend) are only made by COVID-19 positives. Therefore, any on-path observer with the ability to monitor traffic between the app and the server can identify which users had a positive test. Such an adversary can be the mobile network operator (MNO) if the connection is done through a mobile network, the Internet Service Provider (ISP) if the connection is done through the Internet (e.g., a home network), a VPN provider used by the user, the local network operator in the case of enterprise networks, or any eavesdropper with access to the same network (WiFi or Ethernet) as the user as could be the case of public WiFi hotspots deployed at shopping centers, airports, hotels, and coffee shops. The attacker may also de-anonymize the user. For this additional stage to succeed, the adversary needs to correlate Radar COVID traffic to other identifiable information from the victim. This could be achieved by associating the connection to a contract with the name of the victim or by associating Radar COVID traffic to other user-generated flows containing identifiers in the clear (e.g., HTTP cookies or other mobile flows sending unique identifiers like the IMEI or the AAID without encryption). The former can be executed, for instance, by the Internet Service Provider or the MNO. The latter can be executed by any on-path adversary, such as the network provider or even the cloud provider that hosts more than one service accessed by the victim. The farther the adversary is either from the victim (the client) or the end-point (the server), the less likely it may be that the adversary has access to re-identification information. The vulnerability has been mitigated with the injection of dummy traffic from the application to the backend. Dummy traffic is generated by all users independently of whether they are COVID-19 positive or not. The issue was fixed in iOS in version 1.0.8 (uniform distribution), 1.1.0 (exponential distribution), Android in version 1.0.7 (uniform distribution), 1.1.0 (exponential distribution), Backend in version 1.1.2-RELEASE. For more information see the referenced GitHub Security Advisory. | [
"cpe:2.3:a:radarcovid:radar-covid-backend-dp3t-server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:radarcovid:radarcovid:*:*:uniform_distribution:*:*:android:*:*",
"cpe:2.3:a:radarcovid:radarcovid:*:*:uniform_distribution:*:*:iphone_os:*:*",
"cpe:2.3:a:radarcovid:radarcovid:*:*:exponential_distribution:*:*:android:*:*",
"cpe:2.3:a:radarcovid:radarcovid:*:*:exponential_distribution:*:*:iphone_os:*:*"
] |
CVE-2024-34488 | OFPMultipartReply in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via b.length=0. | [
"cpe:2.3:a:facuet:ryu:4.34:*:*:*:*:*:*:*"
] |
|
CVE-2019-14252 | An issue was discovered in the secure portal in Publisure 2.1.2. Once successfully authenticated as an administrator, one is able to inject arbitrary PHP code by using the adminCons.php form. The code is then stored in the E:\PUBLISURE\webservice\webpages\AdminDir\Templates\ folder even if removed from the adminCons.php view (i.e., the rogue PHP file can be hidden). | [
"cpe:2.3:a:publisure:publisure:2.1.2:*:*:*:*:*:*:*"
] |
|
GHSA-597x-9gj9-7q4x | The initial code parsing the manifest did not check the content of the file names yet later code assumed that it was checked and panicked when encountering illegal characters, resulting in a crash of Routinator. | [] |
|
CVE-2023-27130 | Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code via an arbitrarily supplied URL parameter. | [
"cpe:2.3:a:typecho:typecho:*:*:*:*:*:*:*:*"
] |
|
GHSA-9w6g-7jpw-87hf | Tokens in CTFd used for account activation and password resetting can be used interchangeably for these operations. When used, they are sent to the server as a GET parameter and they are not single use, which means, that during token expiration time an on-path attacker might reuse such a token to change user's password and take over the account. Moreover, the tokens also include base64 encoded user email.This issue impacts releases up to 3.7.4 and was addressed by pull request 2679 https://github.com/CTFd/CTFd/pull/2679 included in 3.7.5 release. | [] |
|
CVE-2023-2788 | Deactivated user can retain access using oauth2 api | Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.
| [
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost:7.10.0:*:*:*:*:*:*:*"
] |
CVE-2024-9813 | Codezips Pharmacy Management System register.php sql injection | A vulnerability, which was classified as critical, has been found in Codezips Pharmacy Management System 1.0. This issue affects some unknown processing of the file product/register.php. The manipulation of the argument category leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:codezips:pharmacy_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codezips:pharmacy_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-6xqj-wvgp-rqp8 | Missing permission checks in Jenkins Ansible Plugin allow enumerating credentials IDs | Jenkins Ansible Plugin 1.0 and earlier does not perform permission checks in methods implementing form validation.This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.An enumeration of credentials IDs in Ansible Plugin 1.1 requires the appropriate permissions. | [] |
GHSA-wh6m-89jx-v6xr | The parseSWF_ACTIONRECORD function in util/parser.c in libming through 0.4.8 allows remote attackers to have unspecified impact via a crafted swf file that triggers a memory allocation failure, a different vulnerability than CVE-2018-7876. | [] |
|
CVE-2021-42917 | Buffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream. | [
"cpe:2.3:a:kodi:kodi:*:*:*:*:*:*:*:*"
] |
|
GHSA-rxwh-qg5h-c55m | SQL injection vulnerability in default.asp in Okul Otomasyon Portal 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] |
|
GHSA-ph62-jhc9-4v9q | SQL injection vulnerability in the login page in Epiphany Cardio Server 3.3 allows remote attackers to execute arbitrary SQL commands via a crafted URL. | [] |
|
GHSA-q28w-jq68-2wfw | The Blog2Social: Social Media Auto Post & Scheduler WordPress plugin before 6.9.10 does not have authorisation in an AJAX action, and does not ensure that the URL to make a request to is an external one. As a result, any authenticated users, such as subscriber could perform SSRF attacks | [] |
|
CVE-2021-38955 | IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a local user with elevated privileges to cause a denial of service due to a file creation vulnerability in the audit commands. IBM X-Force ID: 211825. | [
"cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:*"
] |
|
CVE-2023-20085 | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script in the context of the affected interface or access sensitive, browser-based information. | [
"cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*"
] |
|
CVE-2018-13512 | The mintToken function of a smart contract implementation for SmartHomeCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:smarthomecoin_project:smarthomecoin:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-22702 | PartKeepr versions up to v1.4.0, in the functionality to upload attachments using a URL when creating a part does not validate that requests can be made to local ports, allowing an authenticated user to carry out SSRF attacks and port enumeration. | [
"cpe:2.3:a:partkeepr:partkeepr:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-1460 | WebKit in Google Chrome before Blink M11 contains a bad cast to RenderBlock when anonymous blocks are renderblocks. | [
"cpe:2.3:a:google:blink:*:*:*:*:*:chromium:*:*"
] |
|
GHSA-wc4w-3525-x87q | Vulnerability in the Oracle Service Bus product of Oracle Fusion Middleware (component: OSB Core Functionality). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Service Bus. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Service Bus accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [] |
|
CVE-2014-4274 | Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM. | [
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] |
|
GHSA-ffjc-ccp9-8jjj | Race condition in Microsoft Internet Explorer 6 SP1; 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 allows remote attackers to execute arbitrary code or perform other actions upon a page transition, with the permissions of the old page and the content of the new page, as demonstrated by setInterval functions that set location.href within a try/catch expression, aka the "bait & switch vulnerability" or "Race Condition Cross-Domain Information Disclosure Vulnerability." | [] |
|
GHSA-7c7f-3v76-7f48 | cPanel before 64.0.21 allows certain file-rename operations in the context of the root account via scripts/convert_roundcube_mysql2sqlite (SEC-254). | [] |
|
GHSA-cf8c-993c-j649 | Cross-site scripting (XSS) vulnerability in GanttProjectSchedulerPopup.jsp in IBM TRIRIGA Application Platform 3.2 and 3.3 before 3.3.0.2, 3.3.1 before 3.3.1.3, 3.3.2 before 3.3.2.2, and 3.4 before 3.4.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL. | [] |
|
CVE-2019-1361 | An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Information Disclosure Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"
] |
|
GHSA-qvcq-9fpx-fqgm | On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. At 0x9d01ef24 the value for the s_offset key is copied using strcpy to the buffer at $sp+0x2b0. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. | [] |
|
CVE-2012-0226 | SQL injection vulnerability in Invensys Wonderware Information Server 4.0 SP1 and 4.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:invensys:wonderware_information_server:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:invensys:wonderware_information_server:4.5:*:*:*:*:*:*:*"
] |
|
GHSA-25pp-6h88-3wpx | The Bulgarisation for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.14. This is due to missing or incorrect nonce validation on several functions. This makes it possible for unauthenticated attackers to generate and delete labels via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
CVE-2007-3882 | SQL injection vulnerability in index.php in Expert Advisor allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:popscript.com:expert_advisor:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-7037 | Avaya Equinox Conferencing XXE vulnerability | An XML External Entities (XXE) vulnerability in Media Server component of Avaya Equinox Conferencing could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system or even potentially lead to a denial of service. The affected versions of Avaya Equinox Conferencing includes all 9.x versions before 9.1.11. Equinox Conferencing is now offered as Avaya Meetings Server. | [
"cpe:2.3:a:avaya:equinox_conferencing:*:*:*:*:*:*:*:*"
] |
GHSA-xw39-hrhx-6f53 | In on_remove_iso_data_path of btm_iso_impl.h, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-236688764 | [] |
|
CVE-2009-0945 | Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*"
] |
|
CVE-2018-16435 | Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile. | [
"cpe:2.3:a:littlecms:little_cms_color_engine:2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-j5r5-3qc9-3h7c | The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | [] |
|
CVE-2015-2862 | Directory traversal vulnerability in Kaseya Virtual System Administrator (VSA) 7.x before 7.0.0.29, 8.x before 8.0.0.18, 9.0 before 9.0.0.14, and 9.1 before 9.1.0.4 allows remote authenticated users to read arbitrary files via a crafted HTTP request. | [
"cpe:2.3:a:kaseya:virtual_system_administrator:*:*:*:*:*:*:*:*"
] |
|
GHSA-5v5p-c4x4-9pp9 | IBM Curam Social Program Management 7.0.3 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site. IBM X-force ID: 144951. | [] |
|
CVE-2021-41300 | ECOA BAS controller - Insufficiently Protected Credentials-2 | ECOA BAS controller’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality. | [
"cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ecoa:ecs_router_controller-ecs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ecoa:riskbuster:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:*"
] |
GHSA-xpxv-4wqh-mpjg | An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. | [] |
|
CVE-2020-9596 | Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a security bypass vulnerability. Successful exploitation could lead to security feature bypass. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-13652 | TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow serviceName OS Command Injection (issue 4 of 5). | [
"cpe:2.3:o:tp-link:m7350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:m7350:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-35668 | RedisGraph 2.x through 2.2.11 has a NULL Pointer Dereference that leads to a server crash because it mishandles an unquoted string, such as an alias that has not yet been introduced. | [
"cpe:2.3:a:redislabs:redisgraph:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-31622 | An issue in the sqlc_make_policy_trig component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | [
"cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*"
] |
|
GHSA-7gvq-qwwx-xxf5 | Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering. | [] |
Subsets and Splits