id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
CVE-2025-4182
PCMan FTP Server BELL Command buffer overflow
A vulnerability was found in PCMan FTP Server 2.0.7. It has been rated as critical. Affected by this issue is some unknown functionality of the component BELL Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2015-0702
Unrestricted file upload vulnerability in the Custom Prompts upload implementation in Cisco Unified MeetingPlace 8.6(1.9) allows remote authenticated users to execute arbitrary code by using the languageShortName parameter to upload a file that provides shell access, aka Bug ID CSCus95712.
[ "cpe:2.3:a:cisco:unified_meetingplace:8.6\\(1.9\\):*:*:*:*:*:*:*" ]
CVE-2018-11328
An issue was discovered in Joomla! Core before 3.8.8. Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in an XSS vulnerability.
[ "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
CVE-2023-52292
IBM Sterling File Gateway cross-site scripting
IBM Sterling File Gateway 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.3 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[ "cpe:2.3:a:ibm:sterling_file_gateway:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sterling_file_gateway:6.1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sterling_file_gateway:6.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sterling_file_gateway:6.2.0.3:*:*:*:*:*:*:*" ]
GHSA-qjqq-q9g6-p92r
A vulnerability was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formDMZ of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-j78q-39hg-fjq9
SQL injection vulnerability in Interspire ArticleLive NX 0.3 allows remote attackers to execute arbitrary SQL commands via the Query parameter.
[]
CVE-2021-41347
Windows AppX Deployment Service Elevation of Privilege Vulnerability
Windows AppX Deployment Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1854:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19041.1288:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19041.1288:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19041.1288:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19041.1288:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19041.1288:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19041.1288:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4704:*:*:*:*:*:*:*" ]
GHSA-j39j-cvpv-82wg
Western Digital EdgeRover before 0.25 has an escalation of privileges vulnerability where a low privileged user could load malicious content into directories with higher privileges, because of how Node.js is used. An attacker can gain admin privileges and carry out malicious activities such as creating a fake library and stealing user credentials.
[]
CVE-2019-14709
A cleartext password storage issue was discovered on MicroDigital N-series cameras with firmware through 6400.0.8.5. The file in question is /usr/local/ipsca/mipsca.db. If a camera is compromised, the attacker can gain access to passwords and abuse them to compromise further systems.
[ "cpe:2.3:o:microdigital:mdc-n4090_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:microdigital:mdc-n4090:-:*:*:*:*:*:*:*", "cpe:2.3:o:microdigital:mdc-n4090w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:microdigital:mdc-n4090w:-:*:*:*:*:*:*:*", "cpe:2.3:o:microdigital:mdc-n2190v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:microdigital:mdc-n2190v:-:*:*:*:*:*:*:*" ]
GHSA-6w4q-23cf-j9jp
parse-server's session object properties can be updated by foreign user if object ID is known
ImpactA foreign user can write to the session object of another user if the session object ID is known. For example, a foreign user can assign the session object to their own user by writing to the `user` field and then read any custom fields of that session object.Note that assigning a session to a foreign user does not usually change the privileges of neither of the two users, according to how Parse Server uses session objects internally. However, if custom logic is used to relate specific session objects to privileges this vulnerability may have a higher level of severity.The vulnerability does not allow a foreign user to assign a session object to themselves, read the session token, and then reassign the session object to the original user to then authenticate as that user with the known session token. The vulnerability only exists for foreign session objects, a user cannot assign their own session to another user.While it is unlikely that the session object ID of another user is known, it is possible to brute-force guess an object ID, even though the attacker would not know to which user a successfully guessed session object ID belongs.PatchesThe fix prevents writing to foreign session objects, even if the session object ID is known.WorkaroundsAdd a `beforeSave` trigger to the `_Session` class and prevent writing if the requesting user is different from the user in the session object.ReferencesGitHub advisory [GHSA-6w4q-23cf-j9jp](https://github.com/parse-community/parse-server/security/advisories/GHSA-6w4q-23cf-j9jp)
[]
GHSA-9994-rx95-frv3
In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel
[]
GHSA-pcc9-vv6w-47hr
Unspecified vulnerability in the Avaya VoIP Handset allows remote attackers to cause a denial of service (reboot) via crafted packets. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.
[]
CVE-2023-39316
Multiple integer overflow vulnerabilities exist in the LXT2 num_dict_entries functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `string_pointers` array.
[ "cpe:2.3:a:tonybybell:gtkwave:3.3.115:*:*:*:*:*:*:*" ]
GHSA-j86v-2j25-g3c3
Cscms Music Portal System v4.2 was discovered to contain a redirection vulnerability via the backurl parameter.
[]
CVE-2003-1057
Unknown vulnerability in CDE Print Viewer (dtprintinfo) for Sun Solaris 2.6 through 9 may allow local users to execute arbitrary code.
[ "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*" ]
CVE-2023-24804
ownCloud Android app vulnerable to Path Traversal
The ownCloud Android app allows ownCloud users to access, share, and edit files and folders. Prior to version 3.0, the app has an incomplete fix for a path traversal issue and is vulnerable to two bypass methods. The bypasses may lead to information disclosure when uploading the app’s internal files, and to arbitrary file write when uploading plain text files (although limited by the .txt extension). Version 3.0 fixes the reported bypasses.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:android:*:*" ]
GHSA-5vv3-jf75-3fr5
Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream.
[]
CVE-2021-20046
A Stack-based buffer overflow in the SonicOS HTTP Content-Length response header allows a remote authenticated attacker to cause Denial of Service (DoS) and potentially results in code execution in the firewall. This vulnerability affected SonicOS Gen 5, Gen 6 and Gen 7 firmware versions.
[ "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_3650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_4650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_5650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_6650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_9250:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_9450:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsa_9650:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz300:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz300p:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz300w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz350:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz350w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz400:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz400w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz500:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz500w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz600:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz600p:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_10:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_100:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_1600:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_200:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_25:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_300:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_400:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_50:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_800:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nssp_12400:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nssp_12800:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:soho_250w:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_9200:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_9400:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_9600:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_9800:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_e10200:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_e10400:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:supermassive_e10800:-:*:*:*:*:*:*:*", "cpe:2.3:h:sonicwall:soho_250:-:*:*:*:*:*:*:*" ]
CVE-2014-2647
Cross-site scripting (XSS) vulnerability in HP Operations Agent in HP Operations Manager (formerly OpenView Communications Broker) before 11.14 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:hp:operations_agent:*:*:*:*:*:*:*:*" ]
GHSA-7fjp-rww7-m5g2
A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.
[]
CVE-2011-4856
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 sends incorrect Content-Type headers for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving admin/health/parameters and certain other files. NOTE: it is possible that only clients, not the Plesk product, could be affected by this issue.
[ "cpe:2.3:a:parallels:parallels_plesk_panel:10.4.4_build20111103.18:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*" ]
CVE-2024-40513
An issue in themesebrand Chatvia v.5.3.2 allows a remote attacker to execute arbitrary code via the User profile Upload image function.
[]
CVE-2021-39360
In GNOME libzapojit through 0.0.3, zpj-skydrive.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.
[ "cpe:2.3:a:gnome:libzapojit:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
GHSA-3gcm-72hc-3mgw
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_php_pecl.php. When parsing the cha parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9718.
[]
CVE-2005-3531
fusermount in FUSE before 2.4.1, if installed setuid root, allows local users to corrupt /etc/mtab and possibly modify mount options by performing a mount over a directory whose name contains certain special characters.
[ "cpe:2.3:a:miklos_szeredi:fuse:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:miklos_szeredi:fuse:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:miklos_szeredi:fuse:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:miklos_szeredi:fuse:2.3_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:miklos_szeredi:fuse:2.4.0:*:*:*:*:*:*:*" ]
GHSA-wgj9-cwmq-97x8
ieGeek IG20 hipcam RealServer V1.0 is vulnerable to Incorrect Access Control. The algorithm used to generate device IDs (UIDs) for devices that utilize Shenzhen Yunni Technology iLnkP2P suffers from a predictability flaw that allows remote attackers to establish direct connections to arbitrary devices.
[]
CVE-2021-21277
Angular Expressions - Remote Code Execution
angular-expressions is "angular's nicest part extracted as a standalone module for the browser and node". In angular-expressions before version 1.1.2 there is a vulnerability which allows Remote Code Execution if you call "expressions.compile(userControlledInput)" where "userControlledInput" is text that comes from user input. The security of the package could be bypassed by using a more complex payload, using a ".constructor.constructor" technique. In terms of impact: If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution. This is fixed in version 1.1.2 of angular-expressions A temporary workaround might be either to disable user-controlled input that will be fed into angular-expressions in your application or allow only following characters in the userControlledInput.
[ "cpe:2.3:a:peerigon:angular-expressions:*:*:*:*:*:node.js:*:*" ]
GHSA-8295-hcjh-5w9p
In the Linux kernel, the following vulnerability has been resolved:drm/i915: Fix potential bit_17 double-freeA userspace with multiple threads racing I915_GEM_SET_TILING to set the tiling to I915_TILING_NONE could trigger a double free of the bit_17 bitmask. (Or conversely leak memory on the transition to tiled.) Move allocation/free'ing of the bitmask within the section protected by the obj lock.[tursulin: Correct fixes tag and added cc stable.] (cherry picked from commit 10e0cbaaf1104f449d695c80bcacf930dcd3c42e)
[]
GHSA-fj54-rv3f-xxrq
A stored cross-site scripting (XSS) vulnerability in /client.php of Garage Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter.
[]
GHSA-gvcf-h5v7-8hxx
Multiple cross-site request forgery (CSRF) vulnerabilities in the gSlideShow plugin 0.1 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) rss, (2) display_time or (3) transistion_time parameter in the gslideshow.php page to wp-admin/options-general.php.
[]
CVE-2013-1777
The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.
[ "cpe:2.3:a:apache:geronimo:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:geronimo:3.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:apache:geronimo:3.0:m1:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:3.0.0.3:-:community:*:*:*:*:*" ]
CVE-2019-20525
Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp driver parameter.
[ "cpe:2.3:a:igniterealtime:openfire:4.4.1:*:*:*:*:*:*:*" ]
CVE-2020-5559
Cross-site scripting vulnerability in WL-Enq 1.11 and 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:wl-enq_project:wl-enq:1.11:*:*:*:*:*:*:*", "cpe:2.3:a:wl-enq_project:wl-enq:1.12:*:*:*:*:*:*:*" ]
CVE-2023-36473
CSP nonce reuse vulnerability in Discourse
Discourse is an open source discussion platform. A CSP (Content Security Policy) nonce reuse vulnerability could allow XSS attacks to bypass CSP protection. There are no known XSS vectors at the moment, but should one be discovered, this vulnerability would allow the XSS attack to completely bypass CSP. The vulnerability is patched in the latest tests-passed, beta and stable branches.
[ "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta6b:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.1.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.2.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.3.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.4.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta13b:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.5.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.6.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.7.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.8.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta15:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta16:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta17:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:1.9.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.0.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.1.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.2.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.3.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.4.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.5.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.6.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.7.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta9:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.0.0:beta16:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.1.0:beta1:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.1.0:beta2:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.1.0:beta5:*:*:beta:*:*:*" ]
CVE-2023-5762
Filr – Secure document library < 1.2.3.6 - Author+ RCE via file upload with phar ext
The Filr WordPress plugin before 1.2.3.6 is vulnerable from an RCE (Remote Code Execution) vulnerability, which allows the operating system to execute commands and fully compromise the server on behalf of a user with Author-level privileges.
[ "cpe:2.3:a:filr_project:filr:*:*:*:*:*:wordpress:*:*" ]
CVE-2008-6178
Unrestricted file upload vulnerability in editor/filemanager/browser/default/connectors/php/connector.php in FCKeditor 2.2, as used in Falt4 CMS, Nuke ET, and other products, allows remote attackers to execute arbitrary code by creating a file with PHP sequences preceded by a ZIP header, uploading this file via a FileUpload action with the application/zip content type, and then accessing this file via a direct request to the file in UserFiles/File/, probably a related issue to CVE-2005-4094. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:fckeditor:fckeditor:2.0rc2:*:*:*:*:*:*:*", "cpe:2.3:a:fckeditor:fckeditor:2.0rc3:*:*:*:*:*:*:*", "cpe:2.3:a:fckeditor:fckeditor:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fckeditor:fckeditor:2.3beta:*:*:*:*:*:*:*", "cpe:2.3:a:fckeditor:fckeditor:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:phplist:phplist:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:phplist:phplist:2.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:phplist:phplist:2.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:phplist:phplist:2.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:phplist:phplist:2.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:phplist:phplist:2.10.6:*:*:*:*:*:*:*" ]
GHSA-w7c2-4qqr-9227
An issue was discovered in Joomla! through 3.9.19. Internal read-only fields in the User table class could be modified by users.
[]
CVE-2023-5204
The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid parameter in versions up to, and including, 4.8.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[ "cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*" ]
CVE-2014-2321
web_shell_cmd.gch on ZTE F460 and F660 cable modems allows remote attackers to obtain administrative access via sendcmd requests, as demonstrated by using "set TelnetCfg" commands to enable a TELNET service with specified credentials.
[ "cpe:2.3:h:zte:f460:-:*:*:*:*:*:*:*", "cpe:2.3:h:zte:f660:-:*:*:*:*:*:*:*" ]
CVE-2006-1585
Multiple SQL injection vulnerabilities in MonAlbum 0.8.7 allow remote attackers to execute arbitrary SQL commands via (1) the pc parameter in (a) index.php and (2) pnom, (3) pcourriel, and (4) pcommentaire parameters in (b) image_agrandir.php.
[ "cpe:2.3:a:3dsrc:monalbum:0.8.7:*:*:*:*:*:*:*" ]
CVE-2007-0181
PHP remote file inclusion vulnerability in include/common_function.php in magic photo storage website allows remote attackers to execute arbitrary PHP code via a URL in the _config[site_path] parameter.
[ "cpe:2.3:a:scriptaty:magic_photo_storage_website:*:*:*:*:*:*:*:*" ]
GHSA-mw7g-gxjp-7rwj
The password reset feature in the Spam Quarantine HTTP interface for MailMarshal SMTP 6.2.0.x before 6.2.1 allows remote attackers to modify arbitrary account information via a UserId variable with a large amount of trailing whitespace followed by a malicious value, which triggers SQL buffer truncation due to length inconsistencies between variables.
[]
CVE-2012-4056
SQL injection vulnerability in index2.php in Uiga Personal Portal allows remote attackers to execute arbitrary SQL commands via the p parameter.
[ "cpe:2.3:a:uiga:personal_portal:*:*:*:*:*:*:*:*" ]
GHSA-wmhc-qw7c-4774
An observable response discrepancy in the Gallagher Command Centre RESTAPI allows an insufficiently-privileged user to infer the presence of items that would not otherwise be viewable.This issue affects: Gallagher Command Centre 8.70 prior to vEL8.70.1787 (MR2), 8.60 prior to vEL8.60.2039 (MR4), all version of 8.50 and prior.
[]
GHSA-q35w-7696-fc7r
A malformed packet containing an invalid destination address, causes a stack overflow in the Ember ZNet stack. This causes an assert which leads to a reset, immediately clearing the error.
[]
GHSA-8ffc-33px-g32x
An issue was discovered in Open-Xchange OX App Suite before 7.8.1-rev8. References to external Open XML document type definitions (.dtd resources) can be placed within .docx and .xslx files. Those resources were requested when parsing certain parts of the generated document. As a result an attacker can track access to a manipulated document. Usage of a document may get tracked and information about internal infrastructure may get exposed.
[]
CVE-2020-14881
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.16. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*" ]
CVE-2023-23995
WordPress TinyMCE Custom Styles Plugin <= 1.1.2 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tim Reeves & David Stöckl TinyMCE Custom Styles plugin <= 1.1.2 versions.
[ "cpe:2.3:a:tinymce_custom_styles_project:tinymce_custom_styles:*:*:*:*:*:wordpress:*:*" ]
CVE-2025-4076
LB-LINK BL-AC3600 Password lighttpd.cgi easy_uci_set_option_string_0 command injection
A vulnerability classified as critical has been found in LB-LINK BL-AC3600 up to 1.0.22. This affects the function easy_uci_set_option_string_0 of the file /cgi-bin/lighttpd.cgi of the component Password Handler. The manipulation of the argument routepwd leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2024-1111
SourceCodester QR Code Login System add-user.php cross site scripting
A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Login System 1.0. Affected by this issue is some unknown functionality of the file add-user.php. The manipulation of the argument qr-code leads to cross site scripting. The attack may be launched remotely. VDB-252470 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:rems:qr_code_login_system:1.0:*:*:*:*:*:*:*" ]
CVE-2007-2570
PHP remote file inclusion vulnerability in handlers/page/show.php in Wikivi5 allows remote attackers to execute arbitrary PHP code via a URL in the sous_rep parameter.
[ "cpe:2.3:a:guilain_omont:wikivi5:*:*:*:*:*:*:*:*" ]
CVE-2019-15588
There is an OS Command Injection in Nexus Repository Manager <= 2.14.14 (bypass CVE-2019-5475) that could allow an attacker a Remote Code Execution (RCE). All instances using CommandLineExecutor.java with user-supplied data is vulnerable, such as the Yum Configuration Capability.
[ "cpe:2.3:a:sonatype:nexus_repository_manager:*:*:*:*:*:*:*:*" ]
CVE-2012-3807
Samsung Kies before 2.5.0.12094_27_11 has arbitrary file execution.
[ "cpe:2.3:a:samsung:kies:*:*:*:*:*:*:*:*" ]
GHSA-frf2-9wh6-r8xw
Foxit PDF Reader AcroForm Doc Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23932.
[]
CVE-2024-39771
QBiC CLOUD CC-2L v1.1.30 and earlier and Safie One v1.8.2 and earlier do not properly validate certificates, which may allow a network-adjacent unauthenticated attacker to obtain and/or alter communications of the affected product via a man-in-the-middle attack.
[ "cpe:2.3:o:safie:qbic_cloud_cc-2\\/2l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:safie:qbic_cloud_cc-2\\/2l:-:*:*:*:*:*:*:*", "cpe:2.3:o:safie:safie_one_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:safie:safie_one:-:*:*:*:*:*:*:*" ]
GHSA-74cp-wc3j-rw2r
Cross-site scripting (XSS) vulnerability in Hitachi IT Operations Director 02-50-01 through 02-50-07, 03-00 before 03-00-08 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
GHSA-379r-vg26-3rr8
A vulnerability in the Palo Alto Networks PAN-OS® software enables unlicensed administrators to view clear-text data captured using the packet capture feature https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/take-packet-captures/take-a-custom-packet-capture in decrypted HTTP/2 data streams traversing network interfaces on the firewall. HTTP/1.1 data streams are not impacted.In normal conditions, decrypted packet captures are available to firewall administrators after they obtain and install a free Decryption Port Mirror license. The license requirement ensures that this feature can only be used after approved personnel purposefully activate the license. For more information, review how to configure decryption port mirroring https://docs.paloaltonetworks.com/network-security/decryption/administration/monitoring-decryption/configure-decryption-port-mirroring .The administrator must obtain network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. Risk of this issue can be greatly reduced by restricting access to the management interface to only trusted administrators and from only internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .Customer firewall administrators do not have access to the packet capture feature in Cloud NGFW. This feature is available only to authorized Palo Alto Networks personnel permitted to perform troubleshooting.Prisma® Access is not impacted by this vulnerability.
[]
CVE-2023-21138
In onNullBinding of CallRedirectionProcessor.java, there is a possible long lived connection due to improper input validation. This could lead to local escalation of privilege and background activity launches with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-273260090
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
CVE-2023-40486
Maxon Cinema 4D SKP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
Maxon Cinema 4D SKP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Maxon Cinema 4D. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21434.
[ "cpe:2.3:a:maxon:cinema_4d:*:*:*:*:*:*:*:*" ]
CVE-2014-5212
Cross-site scripting (XSS) vulnerability in nds/search/data in iMonitor in Novell eDirectory before 8.8 SP8 Patch 4 allows remote attackers to inject arbitrary web script or HTML via the rdn parameter.
[ "cpe:2.3:a:novell:edirectory:*:sp8:*:*:*:*:*:*" ]
CVE-2006-6962
PHP remote file inclusion vulnerability in rsgallery2.html.php in the RS Gallery2 component (com_rsgallery2) 1.11.2 for Joomla! allows attackers to execute arbitrary PHP code via the mosConfig_absolute_path parameter. NOTE: this issue may overlap CVE-2006-5047.
[ "cpe:2.3:a:joomla:rs_gallery2:1.11.2:*:*:*:*:*:*:*" ]
GHSA-qvjg-w42p-q7c5
An issue in InfoDom Performa 365 v4.0.1 allows authenticated attackers to elevate their privileges to Administrator via a crafted payload sent to /api/users.
[]
GHSA-hv56-x76m-qpj5
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /view/teacher_salary_history1.php. The manipulation of the argument index leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265985 was assigned to this vulnerability.
[]
GHSA-hx9x-77vg-hm99
Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) a Files or Directories Accessible to External Parties vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Filesystem access for attacker.
[]
CVE-2025-20308
Cisco Spaces Connector Privilege Escalation Vulnerability
A vulnerability in Cisco Spaces Connector could allow an authenticated, local attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. This vulnerability is due to insufficient restrictions during the execution of specific CLI commands. An attacker could exploit this vulnerability by logging in to the Cisco Spaces Connector CLI as the spacesadmin user and executing a specific command with crafted parameters. A successful exploit could allow the attacker to elevate privileges from the spacesadmin user and execute arbitrary commands on the underlying operating system as root.
[]
CVE-2013-0671
Directory traversal vulnerability in Siemens WinCC (TIA Portal) 11 allows remote authenticated users to read HMI web-application source code and user-defined scripts via a crafted URL.
[ "cpe:2.3:a:siemens:wincc_tia_portal:11.0:*:*:*:*:*:*:*" ]
CVE-2018-7668
TestLink through 1.9.16 allows remote attackers to read arbitrary attachments via a modified ID field to /lib/attachments/attachmentdownload.php.
[ "cpe:2.3:a:testlink:testlink:*:*:*:*:*:*:*:*" ]
CVE-2024-33033
Use After Free in ComputerVision
Memory corruption while processing IOCTL calls to unmap the buffers.
[ "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sg8275_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7525_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7525:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sg8275:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*" ]
GHSA-95hq-vp4x-2j4g
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AdWorkMedia.com AdWork Media EZ Content Locker allows Reflected XSS.This issue affects AdWork Media EZ Content Locker: from n/a through 3.0.
[]
GHSA-j47c-4x7g-qx84
Vulnerability in the Oracle Advanced Outbound Telephony component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[]
CVE-2014-5916
The Minha Oi (aka br.com.mobicare.minhaoi) application 1.15.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:oi:minha_oi:1.15.0:*:*:*:*:android:*:*" ]
CVE-2007-2716
Multiple cross-site scripting (XSS) vulnerabilities in EQdkp 1.3.2c and earlier allow remote attackers to inject arbitrary web script or HTML via the show parameter to (1) listmembers.php and (2) stats.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:eqdkp:eqdkp:*:*:*:*:*:*:*:*", "cpe:2.3:a:eqdkp:eqdkp:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:eqdkp:eqdkp:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:eqdkp:eqdkp:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:eqdkp:eqdkp:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:eqdkp:eqdkp:1.3.1_p1:*:*:*:*:*:*:*", "cpe:2.3:a:eqdkp:eqdkp:1.3_p4:*:*:*:*:*:*:*" ]
GHSA-wf5m-8j7q-vq2f
Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, a different vulnerability than CVE-2012-1998.
[]
GHSA-m495-8v55-x7fp
GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.
[]
GHSA-vvq2-8cm3-x98w
Cross-site scripting (XSS) vulnerability in the web-based management interface on Cisco Small Business 220 devices with firmware before 1.0.1.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuz76232.
[]
GHSA-9xvp-2782-54g5
Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability in the diagnostic tools page. This vulnerability is exploited via a crafted HTTP request.
[]
CVE-2021-26072
The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.
[ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ]
CVE-2014-4209
Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality and integrity via vectors related to JMX.
[ "cpe:2.3:a:oracle:jdk:1.5.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update75:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update65:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update75:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update5:*:*:*:*:*:*" ]
CVE-2024-26492
An issue in Online Diagnostic Lab Management System 1.0 allows a remote attacker to gain control of a 'Staff' user account via a crafted POST request using the id, email, password, and cpass parameters.
[]
CVE-2006-1868
Buffer overflow in the Advanced Replication component in Oracle Database Server 10.1.0.4 allows database users to execute arbitrary code via the VERIFY_LOG procedure of the DBMS_SNAPSHOT_UTL package, aka Vuln# DB03.
[ "cpe:2.3:a:oracle:database_server:10.1.0.4:*:*:*:*:*:*:*" ]
CVE-2025-20286
ISE on AWS Static Credential
A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. This vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. Note: If the Primary Administration node is deployed in the cloud, then Cisco ISE is affected by this vulnerability. If the Primary Administration node is on-premises, then it is not affected.
[]
GHSA-qv7p-rw6j-rmc4
OpenBase 10.0.5 and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in arguments to the (1) AsciiBackup, (2) OEMLicenseInstall, and possibly other stored procedures.
[]
CVE-2022-21844
HEVC Video Extensions Remote Code Execution Vulnerability
HEVC Video Extensions Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:hevc_video_extensions:*:*:*:*:*:*:*:*" ]
GHSA-pxmx-mc6g-fj35
IBM OpenPages GRC Platform 7.1, 7.2, and 7.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 122200.
[]
GHSA-4jq7-gcx7-hm85
The Fill PDF module 7.x-1.x before 7.x-1.2 for Drupal allows remote attackers to write to arbitrary PDF files via unspecified vectors related to the fillpdf_merge_pdf function and incorrect arguments, a different vulnerability than CVE-2012-1625. NOTE: some of these details are obtained from third party information.
[]
CVE-2019-18235
Advantech Spectre RT ERT351 Versions 5.1.3 and prior has insufficient login authentication parameters required for the web application may allow an attacker to gain full access using a brute-force password attack.
[ "cpe:2.3:o:advantech:spectre_rt_ert351_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:advantech:spectre_rt_ert351:-:*:*:*:*:*:*:*" ]
CVE-2020-29312
An issue found in Zend Framework v.3.1.3 and before allow a remote attacker to execute arbitrary code via the unserialize function. Note: This has been disputed by third parties as incomplete and incorrect. The framework does not have a version that surpasses 2.x.x and was deprecated in early 2020.
[ "cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*" ]
CVE-2025-5525
Jrohy trojan linux.go LogChan os command injection
A vulnerability was found in Jrohy trojan up to 2.15.3. It has been declared as critical. This vulnerability affects the function LogChan of the file trojan/util/linux.go. The manipulation of the argument c leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
[]
GHSA-q65w-mqfv-hggw
There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass.
[]
CVE-2019-7131
Adobe Acrobat and Reader versions 2019.010.20064 and earlier, 2019.010.20064 and earlier, 2017.011.30110 and earlier version, and 2015.006.30461 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2023-26539
WordPress Advanced Text Widget Plugin <= 2.1.2 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Max Chirkov Advanced Text Widget plugin <= 2.1.2 versions.
[ "cpe:2.3:a:advanced_text_widget_project:advanced_text_widget:*:*:*:*:*:wordpress:*:*" ]
GHSA-vw9r-9m5q-6jf5
The Application Framework (AppKit) for Apple Mac OS X 10.2.8 and 10.3.6 does not properly restrict access to a secure text input field, which allows local users to read keyboard input from other applications within the same window session.
[]
CVE-2025-1506
Wp Social Login and Register Social Counter <= 3.1.0 - Cross-Site Request Forgery to Settings Update
The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.0. This is due to missing or incorrect nonce validation on the counter_access_key_setup() function. This makes it possible for unauthenticated attackers to update social login provider settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
GHSA-cm9j-xv24-c3gf
A Stack-based Buffer Overflow issue was discovered in GE CIMPLICITY Versions 9.0 and prior. A function reads a packet to indicate the next packet length. The next packet length is not verified, allowing a buffer overwrite that could lead to an arbitrary remote code execution.
[]
CVE-2023-42729
In ril service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
GHSA-cfmj-7rv7-v356
An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed a bypass of Private Mode by using a specially crafted API request. To exploit this vulnerability, an attacker would need network access to the Enterprise Server appliance configured in Private Mode. This vulnerability affected all versions of GitHub Enterprise Server since 3.9 and was fixed in version 3.9.7, 3.10.4, and 3.11.1. This vulnerability was reported via the GitHub Bug Bounty program.
[]
GHSA-mhrx-3jhc-rg45
Buffer overflow in termsh on SCO OpenServer 5.0.7 allows remote attackers to execute arbitrary code via a long -o command line argument. NOTE: this is probably a different vulnerability than CVE-2005-0351 since it involves a distinct attack vector.
[]
CVE-2020-12866
A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, GHSL-2020-079.
[ "cpe:2.3:o:sane-project:sane_backends:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*" ]
CVE-2008-5121
dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\.\DNE device interface.
[ "cpe:2.3:a:citrix:deterministic_network_enhancer:2.21.7.223:*:*:*:*:*:*:*", "cpe:2.3:a:citrix:deterministic_network_enhancer:3.21.7.17464:*:*:*:*:*:*:*", "cpe:2.3:a:bluecoat:winproxy:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:vpn_client:*:*:*:*:*:*:*:*", "cpe:2.3:a:safenet:highassurance_remote:*:*:*:*:*:*:*:*", "cpe:2.3:a:safenet:softremote_vpn_client:*:*:*:*:*:*:*:*" ]
GHSA-qm6q-v857-2vvv
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MDM9640, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, and SDX20, privilege escalation may occur due to inherently insecure treatment of local files.
[]