id stringlengths 13 19 | title stringlengths 0 256 | description stringlengths 3 13.3k | cpes listlengths 0 5.42k |
|---|---|---|---|
CVE-2022-28382 | An issue was discovered in certain Verbatim drives through 2022-03-31. Due to the use of an insecure encryption AES mode (Electronic Codebook, aka ECB), an attacker may be able to extract information even from encrypted data, for example by observing repeating byte patterns. The firmware of the USB-to-SATA bridge contr... | [
"cpe:2.3:o:verbatim:keypad_secure_usb_3.2_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:verbatim:keypad_secure_usb_3.2_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:verbatim:store_\\'n\\'_go_secure_portable_hdd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:verbatim:store_\\'n\\'_go_secure_portable_hdd:-:*:*:*:*:*:*:*",
"cpe:2.3... | |
GHSA-h8f8-w54h-wrj4 | Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file. | [] | |
GHSA-xg4g-j93q-xpmh | Sensitive information leak through log files. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 35433. | [] | |
CVE-2019-7736 | D-Link DIR-600M C1 3.04 devices allow authentication bypass via a direct request to the wan.htm page. NOTE: this may overlap CVE-2019-13101. | [
"cpe:2.3:o:dlink:dir-600m_firmware:3.04:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-600m:-:*:*:*:*:*:*:*"
] | |
CVE-2024-36216 | Adobe Experience Manager | Cross-site Scripting (Reflected XSS) (CWE-79) | Adobe Experience Manager versions 6.5.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
GHSA-869h-qhfx-w939 | Liferay Portal has an XXE vulnerability in Java2WsddTask._format | XXE vulnerability in Liferay Portal 7.2.0 through 7.4.3.7, and older unsupported versions, and Liferay DXP 7.4 before update 4, 7.3 before update 12, 7.2 before fix pack 20, and older unsupported versions allows attackers with permission to deploy widgets/portlets/extensions to obtain sensitive information or consume s... | [] |
GHSA-rvcr-r783-5v89 | Directory traversal vulnerability in main/main.php in QuestCMS allows remote attackers to read arbitrary local files via a .. (dot dot) in the theme parameter. | [] | |
GHSA-2v6c-8783-rmxx | Format string vulnerability in the SMBDirList function in dirlist.c in SmbFTPD 0.96 allows remote attackers to execute arbitrary code via format string specifiers in a directory name. | [] | |
GHSA-86p8-6x5r-8qmg | The photo-decoder implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly initialize memory for rendering of JXR images, which allows remote attackers to obtain sensitive info... | [] | |
CVE-2022-22080 | Improper validation of backend id in PCM routing process can lead to memory corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music | [
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",... | |
CVE-2020-13349 | An issue has been discovered in GitLab EE affecting all versions starting from 8.12. A regular expression related to a file path resulted in the Advanced Search feature susceptible to catastrophic backtracking. Affected versions are >=8.12, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | |
GHSA-pxhv-jv3r-8j7f | ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows remote attackers to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. This vulnerability exists because of an incorrect fix (with a wrong SHA-384 calculation) for CVE-2013-0169. | [] | |
GHSA-2g85-9pvq-qr67 | IPVanish 3.0.11 for macOS suffers from a root privilege escalation vulnerability. The `com.ipvanish.osx.vpnhelper` LaunchDaemon implements an insecure XPC service that could allow an attacker to execute arbitrary code as the root user. IPVanish uses a third-party library for converting `xpc_object_t` types in to `NSObj... | [] | |
CVE-2020-0248 | In postInstantAppNotif of InstantAppNotifier.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-154627439 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | |
CVE-2008-3656 | Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption... | [
"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lan... | |
CVE-2022-42277 | NVIDIA DGX Station contains a vulnerability in SBIOS in the SmiFlash, where a local user with elevated privileges can read, write and erase flash, which may lead to code execution, escalation of privileges, denial of service, and information disclosure. The scope of impact can extend to other components. | [
"cpe:2.3:o:nvidia:dgx_station_a100_firmware:*:*:*:*:sbios:*:*:*",
"cpe:2.3:h:nvidia:dgx_station_a100:-:*:*:*:*:*:*:*"
] | |
CVE-2024-27171 | Insecure permissions | A remote attacker using the insecure upload functionality will be able to overwrite any Python file and get Remote Code Execution. As for the affected products/models/versions, see the reference URL. | [
"cpe:2.3:h:toshibatec:e-studio-2521_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2020_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2520_nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2021_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec... |
GHSA-235j-2p37-2vfq | An information vulnerability exists when Windows Modules Installer Service improperly discloses file information, aka 'Windows Modules Installer Service Information Disclosure Vulnerability'. | [] | |
CVE-2024-34133 | Adobe Illustrator CC 2023 v27.9 Vulnerability I | Illustrator versions 28.5, 27.9.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2015-3749 | WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-... | [
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
] | |
GHSA-73gg-qjfg-4g7x | Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | |
GHSA-q64p-wfcw-h6w9 | SQL injection vulnerability in PHPFox before 3.6.0 (build4) allows remote attackers to execute arbitrary SQL commands via the search[gender] parameter to user/browse/view_/. | [] | |
CVE-2012-0434 | The server in Crowbar, as used in SUSE Cloud 1.0, uses weak permissions for the production.log file, which has unspecified impact and attack vectors. | [
"cpe:2.3:a:novell:suse_cloud:1.0:*:*:*:*:*:*:*"
] | |
CVE-2024-3017 | Denial of service in multi-protocol gateway - Zigbee + Thread | In a
Silicon Labs multi-protocol gateway, a corrupt pointer to buffered data on a multi-protocol radio co-processor (RCP) causes the OpenThread Border Router(OTBR) application task running on the host platform to crash, allowing an attacker to cause a temporary denial-of-service. | [
"cpe:2.3:a:silabs:sisdk:*:*:*:*:*:*:*:*"
] |
GHSA-x9q9-chg8-wmrp | XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!RtlpCreateSplitBlock+0x000000000000053a." | [] | |
CVE-2025-32458 | ON Semiconductor Quantenna router_command.sh (in the get_syslog_from_qtn argument) Argument Injection | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/A... | [] |
GHSA-6gjj-93cg-cj2v | Multiple unspecified vulnerabilities in the Microsoft Internet Explorer 8 Developer Tools ActiveX control in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow remote attackers to execute... | [] | |
CVE-2016-1313 | Cisco UCS Invicta C3124SA Appliance 4.3.1 through 5.0.1, UCS Invicta Scaling System and Appliance, and Whiptail Racerunner improperly store a default SSH private key, which allows remote attackers to obtain root access via unspecified vectors, aka Bug ID CSCun71294. | [
"cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:ucs_invicta_c3124sa_appliance:5.0.1:*:*:*:*:*:*:*"
] | |
CVE-2009-3158 | admin/files.php in simplePHPWeb 0.2 does not require authentication, which allows remote attackers to perform unspecified administrative actions via unknown vectors. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:carsten_wulff:simplephpweb:0.2:*:*:*:*:*:*:*"
] | |
GHSA-8rhf-p639-7xvf | Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51 and 8.52 allows remote authenticated users to affect availability via unknown vectors related to Query. | [] | |
GHSA-f3cx-fffm-8842 | An issue was discovered in Mutare Voice (EVM) 3.x before 3.3.8. On the admin portal of the web application, there is a functionality at diagzip.asp that allows anyone to export tables of a database. | [] | |
GHSA-p8v7-4ppq-3h6m | eLineStudio Site Composer (ESC) 2.6 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) trigger.asp or (2) common2.asp in cms/include/, which reveals the database path. | [] | |
CVE-2008-0731 | The Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:open_suse:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:apparmor:*:*:*:*:*:*:*:*"
] | |
GHSA-fp8g-5vph-mrcj | A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.5.x: 6.5.4.17 and below; Aruba Instant 8.3.x: 8.3.0.13 and below; Aruba Instant 8.5.x: 8.5.0.10 and below; Aruba Instant 8.6.x: 8.6.0.4 and below. Aruba has released patches... | [] | |
GHSA-g3qw-23v8-2hpp | Adobe Prelude version 22.1.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | [] | |
GHSA-5c44-2p98-m32j | TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the CloudSrvUserdataVersionCheck function via the svn parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. | [] | |
GHSA-cp86-86qv-hq88 | TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows do not control privileges for usage of the Web API, allowing a low-privilege user to make any request as an Administrator. This is fixed in version 2.6.1_Windows. | [] | |
CVE-2024-31892 | IBM Storage Scale SQL injection | IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 could allow a user to perform unauthorized actions after intercepting and modifying a csv file due to improper neutralization of formula elements. | [
"cpe:2.3:a:ibm:spectrum_scale_container_native_storage_access:5.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_scale_container_native_storage_access:5.1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_scale_container_native_storage_access:5.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:spectrum_scale_container_native_stora... |
CVE-2019-1824 | Cisco Prime Infrastructure and Evolved Programmable Network Manager SQL Injection Vulnerabilities | A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute arbitrary SQL queries. This vulnerability exist because the software improperly validates user-supplied input in SQL quer... | [
"cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*"
] |
CVE-2024-35979 | raid1: fix use-after-free for original bio in raid1_write_request() | In the Linux kernel, the following vulnerability has been resolved:
raid1: fix use-after-free for original bio in raid1_write_request()
r1_bio->bios[] is used to record new bios that will be issued to
underlying disks, however, in raid1_write_request(), r1_bio->bios[]
will set to the original bio temporarily. Meanwhi... | [] |
GHSA-jmqq-vjpq-9xcm | IBM Security Verify Bridge contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 196618. | [] | |
CVE-2018-14735 | An Information Exposure issue was discovered in Hitachi Command Suite 8.5.3. A remote attacker may be able to exploit a flaw in the permission of messaging that may allow for information exposure via a crafted message. | [
"cpe:2.3:a:hitachi:compute_systems_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:device_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:replication_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:tiered_storage_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:tuning_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_k... | |
CVE-2006-5356 | Unspecified vulnerability in Oracle Containers for J2EE component in Oracle Application Server 9.0.4.3, 10.1.2.0.2, and 10.1.2.1.0, and Collaboration Suite 9.0.4.2 and 10.1.2, has unknown impact and remote attack vectors, aka Vuln# OC4J02. | [
"cpe:2.3:a:oracle:application_server:9.0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:collaboration_suite:9.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:collaboration_suite:10.1.2.0:*:*:*:*:*:... | |
CVE-2020-1690 | An improper authorization flaw was discovered in openstack-selinux's applied policy where it does not prevent a non-root user in a container from privilege escalation. A non-root attacker in one or more Red Hat OpenStack (RHOSP) containers could send messages to the dbus. With access to the dbus, the attacker could sta... | [
"cpe:2.3:a:redhat:openstack-selinux:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack_platform:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*"
] | |
CVE-2019-13605 | In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.838 to 0.9.8.846, remote attackers can bypass authentication in the login process by leveraging the knowledge of a valid username. The attacker must defeat an encoding that is not equivalent to base64, and thus this is different from CVE-2019-13360. | [
"cpe:2.3:a:control-webpanel:webpanel:0.9.8.836:*:*:*:*:*:*:*"
] | |
CVE-2022-49284 | coresight: syscfg: Fix memleak on registration failure in cscfg_create_device | In the Linux kernel, the following vulnerability has been resolved:
coresight: syscfg: Fix memleak on registration failure in cscfg_create_device
device_register() calls device_initialize(),
according to doc of device_initialize:
Use put_device() to give up your reference instead of freeing
* @dev directly o... | [] |
GHSA-77rw-7fvw-mgvf | Yazd Discussion Forum before 3.0 beta does not properly manage forum permissions, which allows remote authenticated users to (1) reply to a message in an arbitrary forum, if authorized to create a message in any forum; and (2) perform certain unauthorized forum actions, related to an "error in how the permissions were ... | [] | |
CVE-2020-28871 | Remote code execution in Monitorr v1.7.6m in upload.php allows an unauthorized person to execute arbitrary code on the server-side via an insecure file upload. | [
"cpe:2.3:a:monitorr:monitorr:1.7.6m:*:*:*:*:*:*:*"
] | |
GHSA-r295-r6mq-x42c | An issue found in DUALSPACE Lock Master v.2.2.4 allows a local attacker to cause a denial of service or gain sensitive information via the com.ludashi.superlock.util.pref.SharedPrefProviderEntryMethod: insert of the android.net.Uri.insert method. | [] | |
GHSA-j9v5-2xhg-r8xv | ** DISPUTED ** PHP remote file inclusion vulnerability in jambook.php in the Jambook (com_Jambook) 1.0 beta7 module for Mambo and Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: this issue has been disputed by a reliable third party because the j... | [] | |
GHSA-xprm-wp2v-g9g4 | Brynamics "Online Trade - Online trading and cryptocurrency investment system" allows remote attackers to obtain sensitive information via a direct request for the /dashboard/deposit URI, as demonstrated by discovering database credentials. | [] | |
GHSA-cpmc-6m46-x7gx | Multiple unspecified vulnerabilities in Oracle Database 9.0.1.5, 9.2.0.7, and 10.1.0.5 have unknown impact and attack vectors related to (1) the Advanced Queuing component and sys.dbms_aqsys.dbms_aq privileges (DB01), (2) Advanced Replication and sys.dbms_repcat_untrusted (DB07), and (3) Oracle Text and ctxload (DB15).... | [] | |
CVE-2006-2427 | freshclam in (1) Clam Antivirus (ClamAV) 0.88 and (2) ClamXav 1.0.3h and earlier does not drop privileges before processing the config-file command line option, which allows local users to read portions of arbitrary files when an error message displays the first line of the target file. | [
"cpe:2.3:a:clam_anti-virus:clamav:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:clam_anti-virus:clamxav:1.0.3h:*:*:*:*:*:*:*"
] | |
CVE-2023-35881 | WordPress WooCommerce One Page Checkout plugin <= 2.3.0 - Local File Inclusion vulnerability | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WooCommerce WooCommerce One Page Checkout allows PHP Local File Inclusion.This issue affects WooCommerce One Page Checkout: from n/a through 2.3.0. | [] |
CVE-2020-28247 | The lettre library through 0.10.0-alpha for Rust allows arbitrary sendmail option injection via transport/sendmail/mod.rs. | [
"cpe:2.3:a:lettre:lettre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lettre:lettre:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lettre:lettre:0.10.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:lettre:lettre:0.10.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:lettre:lettre:0.10.0:alpha3:*:*:*:*:*:*"
] | |
GHSA-38hf-c37x-32hv | LIEF vulnerable to denial of service through segmentation fault | A vulnerability in the LIEF::MachO::BinaryParser::init_and_parse function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file. A [patch](https://github.com/lief-project/LIEF/commit/fde2c48986739fabd2cf9b40b9af149a89c57850) for this issue is available... | [] |
GHSA-7vr7-cghh-ch63 | XWiki Platform may retrieve email addresses of all users | ImpactThe mail obfuscation configuration was not fully taken into account and while the mail displayed to the end user was obfuscated:the rest response was also containing the mail unobfuscateduser were able to filter and sort on the unobfuscated (allowing to infer the mail content)The consequence was the possibility t... | [] |
CVE-2013-1470 | Cross-site scripting (XSS) vulnerability in calendar/index.php in the Calendar plugin in Geeklog before 1.8.2sr1 and 2.0.0 before 2.0.0rc2 allows remote attackers to inject arbitrary web script or HTML via the calendar_type parameter to submit.php. | [
"cpe:2.3:a:geeklog:geeklog:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:geeklog:geeklog:2.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:geeklog:geeklog:2.0.0:rc2:*:*:*:*:*:*"
] | |
GHSA-fp5q-rc42-r24w | Cross-Site Request Forgery (CSRF) vulnerability in Dominic Fallows DF Draggable allows Stored XSS.This issue affects DF Draggable: from n/a through 1.13.2. | [] | |
GHSA-898q-7f72-8x63 | MetInfo 6.x through 6.1.3 has XSS via the /admin/login/login_check.php url_array[] parameter. | [] | |
GHSA-vpq6-j9hp-2h3w | An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, 2400. A Double Free in the mobile processor leads to privilege escalation. | [] | |
CVE-2007-0773 | The Linux kernel before 2.6.9-42.0.8 in Red Hat 4.4 allows local users to cause a denial of service (kernel OOPS from null dereference) via fput in a 32-bit ioctl on 64-bit x86 systems, an incomplete fix of CVE-2005-3044.1. | [
"cpe:2.3:o:redhat:enterprise_linux:4.4:*:as:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.4:*:es:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.4:*:ws:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:4.4:*:*:*:*:*:*:*"
] | |
CVE-2006-4984 | Multiple PHP remote file inclusion vulnerabilities in Grayscale BandSite CMS allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[root_path] parameter in (1) adminpanel/includes/mailinglist/mlist_xls.php and (2) adminpanel/includes/add_forms/addmp3.php. NOTE: the other vectors from the origina... | [
"cpe:2.3:a:grayscale:bandsite_cms:1.1:*:*:*:*:*:*:*"
] | |
CVE-2024-9002 | CWE-269: Improper Privilege Management vulnerability exists that could cause unauthorized
access, loss of confidentiality, integrity, and availability of the workstation when non-admin
authenticated user tries to perform privilege escalation by tampering with the binaries | [
"cpe:2.3:a:schneider-electric:easergy_studio:*:*:*:*:*:*:*:*"
] | |
CVE-2024-29816 | WordPress Woo Viet plugin <= 1.5.2 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in htdat Woo Viet allows Stored XSS.This issue affects Woo Viet: from n/a through 1.5.2.
| [] |
CVE-2025-49657 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. | [] |
CVE-2024-12552 | Wacom Center WTabletServicePro Link Following Local Privilege Escalation Vulnerability | Wacom Center WTabletServicePro Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Center. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulne... | [] |
GHSA-8c96-xx6x-rr2w | The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack. | [] | |
GHSA-cr76-625x-q34w | An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS Evolved on ACX7000 Series allows an unauthenticated, adjacent attacker to cause aDenial-of-Service (DoS).On all ACX 7000 Series platforms runningJunos OS Evolved, and configured with ... | [] | |
GHSA-qrhm-66h9-79gh | Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 69 and Firefox E... | [] | |
CVE-2024-6128 | spa-cartcms Checkout Page checkout behavioral workflow | A vulnerability, which was classified as problematic, has been found in spa-cartcms 1.9.0.6. This issue affects some unknown processing of the file /checkout of the component Checkout Page. The manipulation of the argument quantity with the input -10 leads to enforcement of behavioral workflow. The attack may be initia... | [
"cpe:2.3:a:spa-cart:spa-cart:1.9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:spa-cart:spa-cartcms:1.9.0.6:*:*:*:*:*:*:*"
] |
GHSA-6978-8w7h-mg7h | IBM App Connect V11.0.0.0 through V11.0.0.1, IBM Integration Bus V10.0.0.0 through V10.0.0.13, IBM Integration Bus V9.0.0.0 through V9.0.0.10, and WebSphere Message Broker V8.0.0.0 through V8.0.0.9 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit th... | [] | |
GHSA-w65v-7g95-gw83 | Interspire Email Marketer through 6.1.6 allows arbitrary file upload via a surveys_submit.php "create survey and submit survey" operation, which can cause a .php file to be accessible under a admin/temp/surveys/ URI. | [] | |
GHSA-3rxf-wh5p-mpfx | Cross-Site Request Forgery (CSRF) vulnerability in realmag777 FOX – Currency Switcher Professional for WooCommerce.This issue affects FOX – Currency Switcher Professional for WooCommerce: from n/a through 1.4.1.4. | [] | |
CVE-2017-16133 | goserv is an http server. goserv is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. | [
"cpe:2.3:a:goserv_project:goserv:1.0.0:*:*:*:*:node.js:*:*"
] | |
CVE-2023-32706 | Denial Of Service due to Untrusted XML Tag in XML Parser within SAML Authentication | On Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, an unauthenticated attacker can send specially-crafted messages to the XML parser within SAML authentication to cause a denial of service in the Splunk daemon. | [
"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:splunk:splunk_cloud_platform:*:*:*:*:*:*:*:*"
] |
CVE-2022-28452 | Red Planet Laundry Management System 1.0 is vulnerable to SQL Injection. | [
"cpe:2.3:a:redplanetcomputers:laundry_management_system:1.0:*:*:*:*:*:*:*"
] | |
GHSA-gx7p-898j-8j8w | An issue was discovered in JetBrains TeamCity 2018.2.4. A TeamCity Project administrator could get access to potentially confidential server-level data. The issue was fixed in TeamCity 2018.2.5 and 2019.1. | [] | |
GHSA-2fvc-q825-c4gm | A vulnerability was found in IObit iTop Data Recovery Pro 4.4.0.687. It has been declared as critical. Affected by this vulnerability is an unknown functionality in the library madbasic_.bpl of the component BPL Handler. The manipulation leads to uncontrolled search path. Local access is required to approach this attac... | [] | |
CVE-2004-0313 | Buffer overflow in PSOProxy 0.91 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long HTTP request, as demonstrated using a long (1) GET argument or (2) method name. | [
"cpe:2.3:a:psoproxy:psoproxy_server:0.91:*:*:*:*:*:*:*"
] | |
CVE-2020-17026 | Windows Remote Access Elevation of Privilege Vulnerability | Windows Remote Access Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:micros... |
CVE-2006-2552 | Jemscripts DownloadControl 1.0 allows remote attackers to obtain sensitive information via an invalid dcid parameter to dc.php, which leaks the pathname in an error message. NOTE: this was originally claimed to be SQL injection, but it is probably resultant from another issue in functions.php. | [
"cpe:2.3:a:jemscripts:downloadcontrol:1.0:*:*:*:*:*:*:*"
] | |
CVE-2017-0881 | An error in the implementation of an autosubscribe feature in the check_stream_exists route of the Zulip group chat application server before 1.4.3 allowed an authenticated user to subscribe to a private stream that should have required an invitation from an existing member to join. The issue affects all previously rel... | [
"cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*"
] | |
GHSA-rmwx-6rf2-mvwm | In Crea8social 2018.2, there is Stored Cross-Site Scripting via a post comment. | [] | |
GHSA-r3rr-5c2j-vf99 | A heap-based buffer overflow in ReadGifImageDesc() in gifread.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service via a crafted HDF5 file. This issue was triggered while converting a GIF file to an HDF file. | [] | |
CVE-2009-2034 | SQL injection vulnerability in writemessage.php in Yogurt 0.3, when register_globals is enabled, allows remote authenticated users to execute arbitrary SQL commands via the original parameter. | [
"cpe:2.3:a:ricardo_alexandre_de_oliveira_staudt:yogurt:0.3:*:*:*:*:*:*:*"
] | |
CVE-2021-20828 | Cross-site scripting vulnerability in Order Status Batch Change Plug-in (for EC-CUBE 3.0 series) all versions allows a remote attacker to inject an arbitrary script via unspecified vectors. | [
"cpe:2.3:a:activefusions:order_status_batch_change:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ec-cube:ec-cube:3.0.0:-:*:*:*:*:*:*"
] | |
GHSA-rp94-5jm7-95fv | The Contact Form builder with drag & drop for WordPress – Kali Forms plugin for WordPress is vulnerable to unauthorized plugin deactivation due to a missing capability check on the await_plugin_deactivation function in all versions up to, and including, 2.3.41. This makes it possible for authenticated attackers, with s... | [] | |
GHSA-35v8-x66v-gw3q | The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cause a denial of service (plugin crash) or corrupt the internal sta... | [] | |
CVE-2022-20646 | Cisco Security Manager Cross-Site Scripting Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management in... | [
"cpe:2.3:a:cisco:security_manager:*:*:*:*:*:*:*:*"
] |
GHSA-2hw3-28v7-q78p | Cross-site scripting (XSS) vulnerability in Microsoft Windows SharePoint Services 3.0 SP2, and SharePoint Foundation 2010 Gold and SP1, allows remote attackers to inject arbitrary web script or HTML via unspecified parameters in a request to a script, aka "Contact Details Reflected XSS Vulnerability." | [] | |
GHSA-p8f5-w48m-rr6p | Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value. | [] | |
GHSA-7m3x-hxr6-pxj5 | Multiple PHP remote file inclusion vulnerabilities in myPHPCalendar 10.1 allow remote attackers to execute arbitrary PHP code via a URL in the cal_dir parameter to (1) admin.php, (2) contacts.php, or (3) convert-date.php. | [] | |
CVE-2018-1000076 | RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Verification of Cryptographic Signature vulnerability in package.rb that can result in a mis-signed gem could... | [
"cpe:2.3:a:rubygems:rubygems:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | |
GHSA-g4f8-39q6-3p39 | PHP remote file include vulnerability in (1) content.php and (2) index.php for Vortex Portal allows remote attackers to execute arbitrary PHP code via a URL in the act parameter. | [] | |
GHSA-jgwm-wr7r-95q6 | Vulnerability in Cisco IOS 11.1CC and 11.1CT with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled interface to an interface that does not have DFS enabled, as described by Cisco bug CSCdk35564. | [] | |
CVE-2025-3468 | NEX-Forms – Ultimate Form Builder – Contact forms and much more <= 8.9.1 - Authenticated (Custom) Stored Cross-Site Scripting | The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the clean_html and form_fields parameters in all versions up to, and including, 8.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authentic... | [] |
GHSA-fxj2-g5q3-j2f6 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] | |
GHSA-f2hp-wgc9-mcvf | Missing Authorization vulnerability in ThemeIsle Otter - Gutenberg Block allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Otter - Gutenberg Block: from n/a through 3.0.3. | [] | |
GHSA-q8rg-vqgg-9pmq | TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.