id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
|---|---|---|---|
CVE-2021-39774
|
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-205989472
|
[
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-0191
|
Cross-site scripting (XSS) vulnerability in admin.php in MKPortal allows remote attackers to inject arbitrary web script or HTML via two certain fields in a contents_new operation in the ad_contents section.
|
[
"cpe:2.3:a:mkportal:mkportal:*:*:*:*:*:*:*:*"
] |
|
GHSA-4859-gpc7-4j66
|
Command Injection in dot
|
All versions of dot are vulnerable to Command Injection. The template compilation may execute arbitrary commands if an attacker can inject code in the template or if a Prototype Pollution-like vulnerability can be exploited to alter an Object's prototype.
|
[] |
GHSA-rc3x-wm42-6mc5
|
cPanel before 55.9999.141 allows arbitrary code execution in the context of the root account because of MakeText interpolation (SEC-89).
|
[] |
|
GHSA-f4f7-96rj-qrp5
|
OpenAM Consortium Edition version 14.0.0 provided by OpenAM Consortium contains an open redirect vulnerability (CWE-601). When accessing an affected server through some specially crafted URL, the user may be redirected to an arbitrary website.
|
[] |
|
CVE-2014-7979
|
Cross-site scripting (XSS) vulnerability in the SimpleCorp theme 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the "administer themes" permission to inject arbitrary web script or HTML via vectors related to theme settings.
|
[
"cpe:2.3:a:drupal:simplecorp:7.x-1.0:*:*:*:*:*:*:*"
] |
|
GHSA-3crv-xrq6-c4hq
|
** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype."
|
[] |
|
CVE-2015-10042
|
Dovgalyuk AIBattle procedures.php registerUser sql injection
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in Dovgalyuk AIBattle. Affected by this vulnerability is the function registerUser of the file site/procedures.php. The manipulation of the argument postLogin leads to sql injection. The identifier of the patch is 448e9880aac18ae7832f8d065e03e46ce0f1d3e3. It is recommended to apply a patch to fix this issue. The identifier VDB-218305 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[
"cpe:2.3:a:aibattle_project:aibattle:*:*:*:*:*:*:*:*"
] |
GHSA-cf79-3x47-jx24
|
Volmarg Personal Management System 1.4.65 is vulnerable to Cross Site Request Forgery (CSRF) allowing attackers to execute arbitrary code and obtain sensitive information via the SameSite cookie attribute defaults value set to none
|
[] |
|
GHSA-4h5c-5g25-v7fh
|
TYPO3 Cross-Site Scripting in Form Framework
|
Failing to properly encode user input, frontend forms handled by the form framework (system extension “form”) are vulnerable to cross-site scripting.
|
[] |
GHSA-g8c8-8m7v-7v94
|
PHP file inclusion vulnerability in index.php in PHP iCalendar 2.0a2 through 2.0.1 allows remote attackers to execute arbitrary PHP code and include arbitrary local files via the phpicalendar cookie. NOTE: this is not a cross-site scripting (XSS) issue as claimed by the original researcher.
|
[] |
|
CVE-2018-11635
|
Use of a Hard-coded Cryptographic Key used to protect cookie session data in /var/www/xms/application/config/config.php in the administrative console in Dialogic PowerMedia XMS through 3.5 allows remote attackers to bypass authentication.
|
[
"cpe:2.3:a:dialogic:powermedia_xms:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-8605
|
code-projects Inventory Management Registration Form registration.php cross site scripting
|
A vulnerability classified as problematic was found in code-projects Inventory Management 1.0. This vulnerability affects unknown code of the file /view/registration.php of the component Registration Form. The manipulation with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:code-projects:inventory_management:1.0:*:*:*:*:*:*:*"
] |
GHSA-332r-78jx-2j2m
|
An issue was discovered in Cobbler through 3.3.1. Routines in several files use the HTTP protocol instead of the more secure HTTPS.
|
[] |
|
CVE-2023-27904
|
Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers.
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] |
|
GHSA-cj67-vf86-qmx6
|
There is an elevation of privilege breakout vulnerability in the Windows EXE installer in Scooter Beyond Compare 4.2.0 through 4.4.2 before 4.4.3. Affected versions allow a logged-in user to run applications with elevated privileges via the Clipboard Compare tray app after installation.
|
[] |
|
GHSA-gp9r-98j2-7524
|
Multiple SQL injection vulnerabilities in login.php in 2daybiz Auction Script allow remote attackers to execute arbitrary SQL commands via (1) the login field (aka the username parameter), and possibly (2) the password field, to index.php. NOTE: some of these details are obtained from third party information.
|
[] |
|
CVE-2023-41353
|
Chunghwa Telecom NOKIA G-040W-Q - Weak Password Requirements
|
Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of weak password requirements. A remote attacker with regular user privilege can easily infer the administrator password from system information after logging system, resulting in admin access and performing arbitrary system operations or disrupt service.
|
[
"cpe:2.3:o:nokia:g-040w-q_firmware:g040wqr201207:*:*:*:*:*:*:*",
"cpe:2.3:h:nokia:g-040w-q:-:*:*:*:*:*:*:*"
] |
GHSA-w5mg-8gpq-pmwq
|
XS Command-Line Interface (CLI) user sessions with the SAP HANA Extended Application Services (XS), version 1, advanced server may have an unintentional prolonged period of validity. Consequently, a platform user could access controller resources via active CLI session even after corresponding authorizations have been revoked meanwhile by an administrator user. Similarly, an attacker who managed to gain access to the platform user's session might misuse the session token even after the session has been closed.
|
[] |
|
GHSA-rmmw-wrwp-3vrq
|
Buffer overflow in Tor before 0.1.2.15, when using BSD natd support, allows remote attackers to cause a denial of service via unspecified vectors.
|
[] |
|
GHSA-99r5-cmq9-gw22
|
Norton App Lock prior to version 1.3.0.329 can be susceptible to a bypass exploit. In this type of circumstance, the exploit can allow the user to circumvent the app to prevent it from locking the device, thereby allowing the individual to gain device access.
|
[] |
|
GHSA-57w4-vrmq-368j
|
The OJPEGPostDecode function in tif_ojpeg.c in LibTIFF 3.9.0 and 3.9.2, as used in tiff2ps, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF image, related to "downsampled OJPEG input."
|
[] |
|
CVE-2021-43579
|
A stack-based buffer overflow in image_load_bmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.
|
[
"cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-26872
|
Password reset interception via API
|
AMI Megarac Password reset interception via API
|
[
"cpe:2.3:a:ami:megarac_spx:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ami:megarac_spx:13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h300s:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h410s:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h500s:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h610c:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h615c:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_baseboard_management_controller:h700s:*:*:*:*:*:*:*",
"cpe:2.3:o:ami:megarac_sp-x:12:-:*:*:*:*:*:*",
"cpe:2.3:o:ami:megarac_sp-x:13:-:*:*:*:*:*:*"
] |
GHSA-3hqm-9m87-w2r2
|
Missing Authorization vulnerability in Apasionados Comment Blacklist Updater allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Comment Blacklist Updater: from n/a through 1.1.0.
|
[] |
|
GHSA-vhw3-82w5-42p7
|
In the Linux kernel, the following vulnerability has been resolved:rxrpc: fix a race in rxrpc_exit_net()Current code can lead to the following race:CPU0 CPU1rxrpc_exit_net()
rxrpc_peer_keepalive_worker()
if (rxnet->live)rxnet->live = false;
del_timer_sync(&rxnet->peer_keepalive_timer);cancel_work_sync(&rxnet->peer_keepalive_work);rxrpc_exit_net() exits while peer_keepalive_timer is still armed,
leading to use-after-free.syzbot report was:ODEBUG: free active (active state 0) object type: timer_list hint: rxrpc_peer_keepalive_timeout+0x0/0xb0
WARNING: CPU: 0 PID: 3660 at lib/debugobjects.c:505 debug_print_object+0x16e/0x250 lib/debugobjects.c:505
Modules linked in:
CPU: 0 PID: 3660 Comm: kworker/u4:6 Not tainted 5.17.0-syzkaller-13993-g88e6c0207623 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:505
Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd 00 1c 26 8a 4c 89 ee 48 c7 c7 00 10 26 8a e8 b1 e7 28 05 <0f> 0b 83 05 15 eb c5 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3
RSP: 0018:ffffc9000353fb00 EFLAGS: 00010082
RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000
RDX: ffff888029196140 RSI: ffffffff815efad8 RDI: fffff520006a7f52
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815ea4ae R11: 0000000000000000 R12: ffffffff89ce23e0
R13: ffffffff8a2614e0 R14: ffffffff816628c0 R15: dffffc0000000000
FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe1f2908924 CR3: 0000000043720000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
__debug_check_no_obj_freed lib/debugobjects.c:992 [inline]
debug_check_no_obj_freed+0x301/0x420 lib/debugobjects.c:1023
kfree+0xd6/0x310 mm/slab.c:3809
ops_free_list.part.0+0x119/0x370 net/core/net_namespace.c:176
ops_free_list net/core/net_namespace.c:174 [inline]
cleanup_net+0x591/0xb00 net/core/net_namespace.c:598
process_one_work+0x996/0x1610 kernel/workqueue.c:2289
worker_thread+0x665/0x1080 kernel/workqueue.c:2436
kthread+0x2e9/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
</TASK>
|
[] |
|
GHSA-7w2h-cxpv-f987
|
The DNP3 service in the Outstation component on Elecsys Director Gateway devices with kernel 2.6.32.11ael1 and earlier allows remote attackers to cause a denial of service (CPU consumption and communication outage) via crafted input.
|
[] |
|
CVE-2017-14225
|
The av_color_primaries_name function in libavutil/pixdesc.c in FFmpeg 3.3.3 may return a NULL pointer depending on a value contained in a file, but callers do not anticipate this, as demonstrated by the avcodec_string function in libavcodec/utils.c, leading to a NULL pointer dereference. (It is also conceivable that there is security relevance for a NULL pointer dereference in av_color_primaries_name calls within the ffprobe command-line program.)
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:3.3.3:*:*:*:*:*:*:*"
] |
|
CVE-2008-1259
|
The Zyxel P-2602HW-D1A router with 3.40(AJZ.1) firmware maintains authentication state by IP address, which allows remote attackers to bypass authentication by establishing a session from a source IP address of a user who previously authenticated within the previous 5 minutes.
|
[
"cpe:2.3:h:zyxel:p-2602hw-d1a:*:*:3.40\\(ajz.1\\):*:*:*:*:*"
] |
|
CVE-2022-3354
|
Open5GS UDP Packet ogs-tlv-msg.c denial of service
|
A vulnerability has been found in Open5GS up to 2.4.10 and classified as problematic. This vulnerability affects unknown code in the library lib/core/ogs-tlv-msg.c of the component UDP Packet Handler. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-209686 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*"
] |
CVE-2020-8569
|
Kubernetes CSI snapshot-controller DoS
|
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, is automatically restarted by Kubernetes, and processes the same VolumeSnapshot custom resource after the restart, entering an endless crashloop. Only the volume snapshot feature is affected by this vulnerability. When exploited, users can’t take snapshots of their volumes or delete the snapshots. All other Kubernetes functionality is not affected.
|
[
"cpe:2.3:a:kubernetes:container_storage_interface_snapshotter:*:*:*:*:*:*:*:*"
] |
GHSA-84gc-mwwx-2x6j
|
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via a crafted WillSave document action, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6690, CVE-2015-6691, CVE-2015-7615, CVE-2015-7617, and CVE-2015-7621.
|
[] |
|
CVE-2009-3562
|
Cross-site scripting (XSS) vulnerability in Xerver HTTP Server 4.32 allows remote attackers to inject arbitrary web script or HTML via the currentPath parameter in a chooseDirectory action.
|
[
"cpe:2.3:a:xerver:xerver:4.32:*:*:*:*:*:*:*"
] |
|
CVE-2003-0725
|
Buffer overflow in the RTSP protocol parser for the View Source plug-in (vsrcplin.so or vsrcplin3260.dll) for RealNetworks Helix Universal Server 9 and RealSystem Server 8, 7 and RealServer G2 allows remote attackers to execute arbitrary code.
|
[
"cpe:2.3:a:realnetworks:helix_universal_server:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_universal_server:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_universal_server:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:helix_universal_server:9.0.2.794:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realserver:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realserver:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realserver:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realserver:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realserver:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realserver:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realserver:8.0_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realserver:g2_1.0:*:*:*:*:*:*:*"
] |
|
GHSA-hw48-8j58-8vvg
|
A file upload vulnerability exists in ukcms v1.1.7 and earlier. The vulnerability is due to the system not strictly filtering the file upload type. An attacker can exploit the vulnerability to upload a script Trojan to admin.php/admin/configset/index/group/upload.html to gain server control by composing a request for a .txt upload and then changing it to a .php upload. The attacker must have admin access to change the upload_file_ext (aka "Allow upload file suffix") setting, and must use "php,php" in this setting to bypass the "php" restriction.
|
[] |
|
CVE-2025-23218
|
WeGIA has a SQL Injection endpoint 'adicionar_especie.php' parameter 'especie'
|
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A SQL Injection vulnerability was identified in the WeGIA application, specifically in the adicionar_especie.php endpoint. This vulnerability allows attackers to execute arbitrary SQL commands in the database, allowing unauthorized access to sensitive information. During the exploit, it was possible to perform a complete dump of the application's database, highlighting the severity of the flaw. This vulnerability is fixed in 3.2.10.
|
[] |
CVE-2025-21738
|
ata: libata-sff: Ensure that we cannot write outside the allocated buffer
|
In the Linux kernel, the following vulnerability has been resolved:
ata: libata-sff: Ensure that we cannot write outside the allocated buffer
reveliofuzzing reported that a SCSI_IOCTL_SEND_COMMAND ioctl with out_len
set to 0xd42, SCSI command set to ATA_16 PASS-THROUGH, ATA command set to
ATA_NOP, and protocol set to ATA_PROT_PIO, can cause ata_pio_sector() to
write outside the allocated buffer, overwriting random memory.
While a ATA device is supposed to abort a ATA_NOP command, there does seem
to be a bug either in libata-sff or QEMU, where either this status is not
set, or the status is cleared before read by ata_sff_hsm_move().
Anyway, that is most likely a separate bug.
Looking at __atapi_pio_bytes(), it already has a safety check to ensure
that __atapi_pio_bytes() cannot write outside the allocated buffer.
Add a similar check to ata_pio_sector(), such that also ata_pio_sector()
cannot write outside the allocated buffer.
|
[] |
GHSA-689w-wq5r-v53p
|
The ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.
|
[] |
|
GHSA-xpp4-g7jq-f7cv
|
SQL injection vulnerability in the CleanDB - DBAL (tmsw_cleandb) extension 2.1.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] |
|
GHSA-whpf-9xxw-6hjh
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15539.
|
[] |
|
CVE-1999-0203
|
In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program.
|
[
"cpe:2.3:a:eric_allman:sendmail:8.6.10:*:*:*:*:*:*:*"
] |
|
CVE-2021-33816
|
The website builder module in Dolibarr 13.0.2 allows remote PHP code execution because of an incomplete protection mechanism in which system, exec, and shell_exec are blocked but backticks are not blocked.
|
[
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:13.0.2:*:*:*:*:*:*:*"
] |
|
CVE-2024-0192
|
RRJ Nueva Ecija Engineer Online Portal Add Downloadable downloadable.php unrestricted upload
|
A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file downloadable.php of the component Add Downloadable. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249505 was assigned to this vulnerability.
|
[
"cpe:2.3:a:nia:rrj_nueva_ecija_engineer_online_portal:1.0:*:*:*:*:*:*:*"
] |
GHSA-9mmw-3fmh-96g3
|
Malicious Package in calk
|
All versions of `calk` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.RecommendationRemove the package from your dependencies and always ensure package names are typed correctly upon installation.
|
[] |
CVE-2025-2805
|
ORDER POST <= 2.0.2 - Unauthenticated Arbitrary Shortcode Execution
|
The ORDER POST plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
|
[] |
CVE-2025-2065
|
projectworlds Life Insurance Management System editAgent.php sql injection
|
A vulnerability, which was classified as critical, was found in projectworlds Life Insurance Management System 1.0. This affects an unknown part of the file /editAgent.php. The manipulation of the argument agent_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] |
CVE-2016-8589
|
log_query_dae.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
|
[
"cpe:2.3:a:trendmicro:threat_discovery_appliance:*:r1:*:*:*:*:*:*"
] |
|
CVE-2024-33470
|
An issue in the SMTP Email Settings of AVTECH Room Alert 4E v4.4.0 allows attackers to gain access to credentials in plaintext via a passback attack. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
[] |
|
GHSA-fg2h-gf84-hw5h
|
Microsoft Exchange Server 2016 CU5 and Microsoft Exchange Server 2016 CU5 allow a spoofing vulnerability due to the way Outlook Web Access (OWA) validates web requests, aka "Microsoft Exchange Spoofing Vulnerability".
|
[] |
|
GHSA-9gc7-f279-pcx9
|
ATutor 1.4.1 through 1.5.1-pl1 allows remote attackers to execute arbitrary PHP functions via a direct request to forum.inc.php with a modified addslashes parameter with either the (1) asc or (2) desc parameters set, possibly due to an eval injection vulnerability.
|
[] |
|
GHSA-4xj3-65qx-27hc
|
AppCMS 2.0.101 in /admin/info.php has an arbitrary file deletion vulnerability which allows attackers to delete arbitrary files on the site.
|
[] |
|
GHSA-mfp6-gh9x-4495
|
Unspecified vulnerability in the Oracle Applications Technology Stack component in Oracle E-Business Suite 12.0.6 and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Help.
|
[] |
|
CVE-1999-0805
|
Novell NetWare Transaction Tracking System (TTS) in Novell 4.11 and earlier allows remote attackers to cause a denial of service via a large number of requests.
|
[
"cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-4079
|
Off-by-one error in the UTF8StringNormalize function in OpenLDAP 2.4.26 and earlier allows remote attackers to cause a denial of service (slapd crash) via a zero-length string that triggers a heap-based buffer overflow, as demonstrated using an empty postalAddressAttribute value in an LDIF entry.
|
[
"cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11_9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11_11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.11_11s:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.1_.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.26:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.28:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.29:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.30:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.31:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.32:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.33:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.34:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.35:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.36:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.37:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.38:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.39:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.40:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.41:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.42:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.3.43:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:openldap:openldap:2.4.25:*:*:*:*:*:*:*"
] |
|
CVE-2022-3013
|
SourceCodester Simple Task Managing System loginVaLidation.php sql injection
|
A vulnerability classified as critical has been found in SourceCodester Simple Task Managing System. This affects an unknown part of the file /loginVaLidation.php. The manipulation of the argument login leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-207423.
|
[
"cpe:2.3:a:simple_task_managing_system_project:simple_task_managing_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-87hf-h223-vj3h
|
The Hotel Room (aka com.wHotelRoom) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] |
|
CVE-2012-0034
|
The NonManagedConnectionFactory in JBoss Enterprise Application Platform (EAP) 5.1.2 and 5.2.0, Web Platform (EWP) 5.1.2 and 5.2.0, and BRMS Platform before 5.3.1 logs the username and password in cleartext when an exception is thrown, which allows local users to obtain sensitive information by reading the log file.
|
[
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_brms_platform:*:*:*:*:*:*:*:*"
] |
|
GHSA-vcmj-h4g7-8fpr
|
The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
[] |
|
GHSA-322v-gpc6-pf9f
|
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis True Image (Windows) before build 41736.
|
[] |
|
GHSA-w27x-wj47-p6m7
|
In MISP before 2.4.148, app/Lib/Export/OpendataExport.php mishandles parameter data that is used in a shell_exec call.
|
[] |
|
GHSA-jjpc-pf2f-wwgg
|
The Portable phpMyAdmin plugin before 1.3.1 for WordPress allows remote attackers to bypass authentication and obtain phpMyAdmin console access via a direct request to wp-content/plugins/portable-phpmyadmin/wp-pma-mod.
|
[] |
|
CVE-2023-24605
|
OX App Suite before backend 7.10.6-rev37 does not enforce 2FA for all endpoints, e.g., reading from a drive, reading contact data, and renaming tokens.
|
[
"cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev30:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev31:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev32:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev33:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev34:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev35:*:*:*:*:*:*",
"cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev36:*:*:*:*:*:*"
] |
|
GHSA-q727-9934-rxj9
|
WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
|
[] |
|
CVE-2024-6591
|
Ultimate WordPress Auction Plugin <= 4.2.6 - Missing Authorization to Unauthenticated Email Creation
|
The Ultimate WordPress Auction Plugin plugin for WordPress is vulnerable to unauthorized email creation and sending due to a missing capability check on the 'send_auction_email_callback' and 'resend_auction_email_callback' functions in all versions up to, and including, 4.2.6. This makes it possible for unauthenticated attackers to craft emails that include links and send to any email address.
|
[
"cpe:2.3:a:nitesh_singh:ultimate_wordpress_auction_plugin:*:*:*:*:*:*:*:*"
] |
GHSA-29mq-6jwf-w4hx
|
Heap-based buffer overflow in SW3eng.exe in the eID Engine service in CA (formerly Computer Associates) eTrust Intrusion Detection 3.0.5.57 and earlier allows remote attackers to cause a denial of service (application crash) via a long key length value to the remote administration port (9191/tcp).
|
[] |
|
CVE-2022-44354
|
SolarView Compact 4.0 and 5.0 is vulnerable to Unrestricted File Upload via a crafted php file.
|
[
"cpe:2.3:o:contec:solarview_compact_firmware:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:contec:solarview_compact_firmware:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:contec:solarview_compact:-:*:*:*:*:*:*:*"
] |
|
GHSA-9c5m-2869-83j9
|
Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
|
[] |
|
GHSA-qpgr-mwqh-wgjf
|
The Quiz Maker WordPress plugin before 6.4.2.7 does not escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
[] |
|
CVE-2022-25187
|
Jenkins Support Core Plugin 2.79 and earlier does not redact some sensitive information in the support bundle.
|
[
"cpe:2.3:a:jenkins:support_core:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-4xm7-5q79-3fch
|
XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in DeleteApplication page
|
ImpactUsers are able to forge an URL with a payload allowing to inject Javascript in the page (XSS).
It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as:xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain)This vulnerability exists since XWiki 6.2-milestone-1.PatchesThe vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.WorkaroundsIt's possible to workaround the vulnerability by editing the page AppWithinMinutes.DeleteApplication to perform checks on it, but note that the appropriate fix involves new APIs that have been recently introduced in XWiki. See the referenced jira tickets.ReferencesJira ticket about the vulnerability: https://jira.xwiki.org/browse/XWIKI-20614Introduction of the macro used for fixing all those vulnerabilities: https://jira.xwiki.org/browse/XWIKI-20583Commit containing the actual fix in the page: https://github.com/xwiki/xwiki-platform/commit/8f5a889b7cd140770e54f5b4195d88058790e305For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:security@xwiki.org)
|
[] |
GHSA-7m6v-q233-q9j9
|
Minio Operator uses Kubernetes apiserver audience for AssumeRoleWithWebIdentity STS
|
Prevent token leakage / privilege escalationMinIO Operator STS: A Quick OverviewMinIO Operator STS is a native IAM Authentication for Kubernetes. MinIO Operator offers support for [Secure Tokens](https://min.io/docs/minio/linux/developers/security-token-service.html?ref=op-gh) (a.k.a. STS) which are a form of temporary access credentials for your MinIO Tenant. In essence, this allows you to control access to your MinIO tenant from your applications without having to explicitly create credentials for each application.For an application to gain access into a MinIO Tenant, a `PolicyBinding` resource is required, granting explicit access to the applications by validating the kubernetes [Service Account](https://kubernetes.io/docs/concepts/security/service-accounts/) authorization token.The service account token is validated as follows:The application calls `AssumeRoleWithWebIdentity` API MinIO Operator provides.MinIO Operator verifies the Service Account token agains the kubernetes API using the [TokenReview API](https://kubernetes.io/docs/reference/kubernetes-api/authentication-resources/token-review-v1/)MinIO Operator reviews the TokenReviewResult confirms if the token is a valid token and the user is authenticated.MinIO Operator validates the service account has `PolicyBinding` in the Tenant namespace.MinIO Operator gets the PolicyBindingMinIO Operator calls the AssumeRole API in the MinIO TenantMinIO Operator obtains temporary credentials (STS).MinIO Operator return temporary Credentials to the requester application.The applicaiton consumes Object Storage using the temporary credentials.Understanding Audiences in Kubernetes TokenReviewIn step 2 the `TokenReview` API call attempts to authenticate a token to a known user, TokenReviewStatus is the result of the `TokenReview` request.Audiences are audience identifiers chosen by the authenticator that are compatible with both the TokenReview and token.An identifier is any identifier in the intersection of the TokenReviewSpec audiences and the token's audiences.A client of the TokenReview API that sets the `spec.audiences` field should validate that a compatible audience identifier is returned in the status.audiences field to ensure that the TokenReview server is audience aware.
**If no audiences are provided, the audience will default to the audience of the Kubernetes apiserver.**Solution: Properly Issuing and Using Audience-Specific ServiceAccount TokensThis PR ensures the Operator STS service request the Service Account JWT to belong to the audience`sts.min.io` in the TokenReviewRequest.This PR ensures the examples and documentation provided guides in how to create Service accounts with "disabled auto mount services tokens", by doing this the pods where the service account is used no longer mounts the service account automatically in the path `/var/run/secrets/kubernetes.io/serviceaccount`.For illustrative purposes, here is how you disable auto mount of service account tokens at the service account level.Additionally documentation and examples show how to request an audience-specific token with audience `sts.min.io`, by asking for an ServiceAccount Token to be audience specific.For illustrative purposes, here is how you request an audience specific service account token in a pod:How this prevent a token leakage or possible privilege escalation?.This setup prevents privilege escalation and token leakage by combining multiple defense-in-depth mechanisms that ensure service account tokens are only usable by their intended audience, short-lived, and not exposed unnecessarily.Audience restriction (aud: sts.min.io)**Problem**: A ServiceAccount token is often valid for multiple audiences (e.g., the default Kubernetes API server). Without scoping, it can be replayed to other internal systems, which may unintentionally trust it.**Mitigation**: Now we enforce that tokens are explicitly created for the sts.min.io audience using the Kubernetes TokenRequest API, and the MinIO Operator:Sends audiences: ["sts.min.io"] in the TokenReview.Verifies that the token was issued with this audience via status.audiences.**Effect**: Even if a token is stolen or misused, it will fail validation if used outside the sts.min.io STS endpoint (e.g., reused at the API server or another service).Token Leakage MitigationDisabling auto-mounted service account tokens**Problem**: By default, Kubernetes mounts long-lived service account tokens into all pods at `/var/run/secrets/kubernetes.io/serviceaccount`, making them vulnerable to theft if the container is compromised.**Mitigation**: No we guide users to set `automountServiceAccountToken: false` in their ServiceAccount definitions.**Effect**: Prevents automatic token injection into all pods, reducing the attack surface.Requesting short-lived, audience-specific tokens via serviceAccountToken projection**Problem**: Long-lived tokens can be reused indefinitely if leaked.
**Mitigation**: You use projected service account tokens with:audience: "sts.min.io"A short expirationSeconds (e.g., 86400 = 24 hours, or even shorter)**Effect**: Even if the token is leaked, it is:Only usable for sts.min.ioShort-lived and expires soonRevocable by disabling the SA or STS accessAffected Versions and Risk AssessmentThe issue affects MinIO Operator versions v5.0.x and above, when the STS feature was first introduced.In v5.0.x, STS was introduced as v1alpha1 and disabled by default. It required explicit API calls to be used.In v6.0.x, STS graduated to v1beta1 and was enabled by default, but still requires explicit calls to the STS API for token usage.The risk is minimal, as:The Operator does not persist the token (neither in memory nor on disk).The Operator only uses the token for a single validation and does not reuse it for any other purpose.ReleaseFix released in [v7.1.0](https://github.com/minio/operator/releases/tag/v7.1.0)
|
[] |
CVE-2022-35251
|
A cross-site scripting vulnerability exists in Rocket.chat <v5 due to style injection in the complete chat window, an adversary is able to manipulate not only the style of it, but will also be able to block functionality as well as hijacking the content of targeted users. Hence the payloads are stored in messages, it is a persistent attack vector, which will trigger as soon as the message gets viewed.
|
[
"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-6590
|
Multiple directory traversal vulnerabilities in LightNEasy "no database" (aka flat) version 1.2.2, and possibly SQLite version 1.2.2, allow remote attackers to read arbitrary files via a .. (dot dot) in the page parameter to (1) index.php and (2) LightNEasy.php.
|
[
"cpe:2.3:a:lightneasy:lightneasy:1.2.2:*:no_database:*:*:*:*:*",
"cpe:2.3:a:sqlite:sqlite:1.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2018-1740
|
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148419.
|
[
"cpe:2.3:a:ibm:security_access_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-29873
|
A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device.
|
[
"cpe:2.3:o:siemens:7kg8500-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8500-0aa00-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8500-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8500-0aa00-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8500-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8500-0aa10-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8500-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8500-0aa10-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8500-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8500-0aa30-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8500-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8500-0aa30-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa01-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa01-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa02-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa02-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa11-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa11-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa12-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa12-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa31-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa31-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa32-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8501-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8501-0aa32-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8550-0aa00-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8550-0aa00-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8550-0aa00-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8550-0aa00-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8550-0aa10-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8550-0aa10-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8550-0aa10-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8550-0aa10-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8550-0aa30-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8550-0aa30-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8550-0aa30-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8550-0aa30-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa01-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa01-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa01-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa01-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa02-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa02-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa02-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa02-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa11-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa11-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa11-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa11-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa12-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa12-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa12-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa12-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa31-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa31-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa31-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa31-2aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa32-0aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa32-0aa0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:7kg8551-0aa32-2aa0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7kg8551-0aa32-2aa0:-:*:*:*:*:*:*:*"
] |
|
GHSA-xqpr-44jx-hc2m
|
Symantec Messaging Gateway (SMG) before 10.0 allows remote attackers to obtain potentially sensitive information about component versions via unspecified vectors.
|
[] |
|
GHSA-455p-p2rc-9mrr
|
iF.SVNAdmin through 1.6.2 allows svnadmin/usercreate.php CSRF to create a user.
|
[] |
|
GHSA-rqhq-hhm8-99xj
|
Unspecified vulnerability in portmapper (aka portmap) in IBM AIX 5.3 allows attackers to cause a denial of service (daemon hang) via unknown vectors, related to libtli.
|
[] |
|
GHSA-hrvq-rhp3-7xpc
|
Heap-based buffer overflow in Netscape and Mozilla allows remote attackers to execute arbitrary code via a jar: URL that references a malformed .jar file, which overflows a buffer during decompression.
|
[] |
|
GHSA-6634-h7jm-9fm9
|
SQL injection vulnerability in the Mannschaftsliste (kiddog_playerlist) 1.0.3 and earlier extension for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] |
|
GHSA-428v-vcmp-3q56
|
Stored cross-site scripting vulnerability in PukiWiki versions 1.3.1 to 1.5.3 allows a remote attacker to inject an arbitrary script via unspecified vectors.
|
[] |
|
GHSA-5q24-x96v-89c5
|
SQL injection vulnerability in includes/rating.php in 2z Project 0.9.5 allows remote attackers to execute arbitrary SQL commands via the post_id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] |
|
CVE-2010-4856
|
SQL injection vulnerability in arsiv.asp in xWeblog 2.2 allows remote attackers to execute arbitrary SQL commands via the tarih parameter.
|
[
"cpe:2.3:a:aspindir:xweblog:2.2:*:*:*:*:*:*:*"
] |
|
GHSA-93v5-72qm-h77q
|
The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().
|
[] |
|
CVE-2015-5607
|
Cross-site request forgery in the REST API in IPython 2 and 3.
|
[
"cpe:2.3:a:ipython:ipython:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ipython:ipython:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
] |
|
GHSA-q9c8-qxp9-6jcr
|
Unspecified vulnerability in the WebLogic Server component in BEA Product Suite 9.1, when configuring multiple authorizers, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
|
[] |
|
CVE-2008-1041
|
Cross-site scripting (XSS) vulnerability in mwhois.php in Matt Wilson Matt's Whois (MWhois) allows remote attackers to inject arbitrary web script or HTML via the domain parameter.
|
[
"cpe:2.3:a:matts_whois:matts_whois:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-24392
|
WordPress Membership SwiftCloud.io <= 1.0 - Authenticated SQL Injection
|
An id GET parameter of the WordPress Membership SwiftCloud.io WordPress plugin through 1.0 is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
|
[
"cpe:2.3:a:swiftcrm:club-management-software:*:*:*:*:*:wordpress:*:*"
] |
GHSA-p552-938q-8c73
|
BuddyBoss Platform through 1.8.0 allows remote attackers to obtain the email address of each user. When creating a new user, it generates a Unique ID for their profile. This UID is their private email address with symbols removed and periods replaced with hyphens. For example. JohnDoe@example.com would become /members/johndoeexample-com and Jo.test@example.com would become /members/jo-testexample-com. The members list is available to everyone and (in a default configuration) often without authentication. It is therefore trivial to collect a list of email addresses.
|
[] |
|
CVE-2024-29413
|
Cross Site Scripting vulnerability in Webasyst v.2.9.9 allows a remote attacker to run arbitrary code via the Instant messenger field in the Contact info function.
|
[
"cpe:2.3:a:webasyst:webasyst-framework:*:*:*:*:*:*:*:*"
] |
|
GHSA-794q-c4v9-v45f
|
An issue was discovered on Wavlink WL-WN530HG4 M30HG4.V5030.191116 devices. Multiple shell metacharacter injection vulnerabilities exist in CGI scripts, leading to remote code execution with root privileges.
|
[] |
|
CVE-2006-2859
|
PHP remote file inclusion vulnerability in MyBloggie 2.1.1 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the mybloggie_root_path parameter to (1) admin.php or (2) scode.php. NOTE: this issue has been disputed in multiple third party followups, which say that the MyBloggie source code does not demonstrate the issue, so it might be the result of another module. CVE analysis as of 20060605 agrees with the dispute. In addition, scode.php is not part of the MyBloggie distribution
|
[
"cpe:2.3:a:mywebland:mybloggie:2.1.1:*:*:*:*:*:*:*"
] |
|
CVE-2020-16116
|
In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.
|
[
"cpe:2.3:a:kde:ark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] |
|
CVE-2023-47764
|
WordPress Ditty plugin <= 3.1.24 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Metaphor Creations Ditty allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Ditty: from n/a through 3.1.24.
|
[
"cpe:2.3:a:metaphorcreations:ditty:*:*:*:*:*:*:*:*"
] |
GHSA-c994-hpx9-c8x4
|
Cross-Site Request Forgery (CSRF) vulnerability in Photo Gallery Team Photo Gallery by Ays – Responsive Image Gallery plugin <= 5.2.6 versions.
|
[] |
|
GHSA-jc7m-f67w-8xjj
|
The mp4ff_read_mdhd function in common/mp4ff/mp4atom.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.7 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted mp4 file.
|
[] |
|
GHSA-pmrg-cp69-mxq2
|
KarjaSoft Sami FTP Server 2.0.x allows remote attackers to cause a denial of service (daemon crash or hang) via certain (1) APPE, (2) CWD, (3) DELE, (4) MKD, (5) RMD, (6) RETR, (7) RNFR, (8) RNTO, (9) SIZE, and (10) STOR commands.
|
[] |
|
CVE-2024-22208
|
phpMyFAQ sharing FAQ functionality can easily be abused for phishing purposes
|
phpMyFAQ is an Open Source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and other databases. The 'sharing FAQ' functionality allows any unauthenticated actor to misuse the phpMyFAQ application to send arbitrary emails to a large range of targets. The phpMyFAQ application has a functionality where anyone can share a FAQ item to others. The front-end of this functionality allows any phpMyFAQ articles to be shared with 5 email addresses. Any unauthenticated actor can perform this action. There is a CAPTCHA in place, however the amount of people you email with a single request is not limited to 5 by the backend. An attacker can thus solve a single CAPTCHA and send thousands of emails at once. An attacker can utilize the target application's email server to send phishing messages. This can get the server on a blacklist, causing all emails to end up in spam. It can also lead to reputation damages. This issue has been patched in version 3.2.5.
|
[
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] |
CVE-2023-49272
|
Hotel Management v1.0 - Multiple Reflected Cross-Site Scripting (XSS)
|
Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'children' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
|
[
"cpe:2.3:a:kashipara:hotel_management:1.0:*:*:*:*:*:*:*"
] |
CVE-2022-4229
|
SourceCodester Book Store Management System index.php access control
|
A vulnerability classified as critical was found in SourceCodester Book Store Management System 1.0. This vulnerability affects unknown code of the file /bsms_ci/index.php. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214588.
|
[
"cpe:2.3:a:book_store_management_system_project:book_store_management_system:1.0:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.