id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
|---|---|---|---|
GHSA-3j4x-9q9q-3277
|
Cross-site Scripting in JFinal
|
A stored XSS vulnerability exists in JFinalcms 5.0.0 via the /gusetbook/save content parameter, which allows remote attackers to inject arbitrary web script or HTML.
|
[] |
CVE-2024-13378
|
GravityForms 2.9.0.1 - 2.9.1.3 - Unauthenticated Stored Cross-Site Scripting via 'style_settings' parameter
|
The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘style_settings’ parameter in versions 2.9.0.1 up to, and including, 2.9.1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The attack is only successful in the Chrome web browser, and requires directly browsing the media file via the attachment post.
|
[] |
GHSA-p34c-hp83-p85p
|
A Cross-site Scripting (XSS) vulnerability exists when Azure DevOps Server and Team Foundation Server do not properly sanitize user provided input, aka 'Azure DevOps Server and Team Foundation Server Cross-site Scripting Vulnerability'. This CVE ID is unique from CVE-2019-0866, CVE-2019-0867, CVE-2019-0868, CVE-2019-0871.
|
[] |
|
GHSA-4456-w38r-m53x
|
Besu VM vulnerable to gas allocation error in CALL operations
|
ImpactAn error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incorrect gas being passed into called contracts and incorrect gas being returned after call execution. Where the amount of gas makes a difference in the success or failure, or if the gas is a negative 64 bit value, the execution will result in a different state root than expected, resulting in a consensus failure in networks with multiple EVM implementations.In networks with a single EVM implementation this can be used to execute with significantly more gas than then transaction requested, possibly exceeding gas limitations.PatchesVersion 22.7.1 contains a fix, ensuring that excess gas will not be allocated to inner transaction calls and correcting the excess gas errors.WorkaroundsReverting to version 22.1.3 or earlier will prevent incorrect execution. However many ethereum mainnet networks require changes in more recent versions of Besu and should not use older versions of besu and should instead use the patched version.Ethereum Classic and other networks not depending on a Proof of Stake transition should function fine with version 22.1.3 or earlier.For more informationIssue was found by [Martin Holst Swende](https://github.com/holiman) using [goevmlab](https://github.com/holiman/goevmlab), it is believed that no production networks have transactions that would trigger this failure.
|
[] |
CVE-2006-4332
|
Unspecified vulnerability in the DHCP dissector in Wireshark (formerly Ethereal) 0.10.13 through 0.99.2, when run on Windows, allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a bug in Glib.
|
[
"cpe:2.3:a:wireshark:wireshark:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*"
] |
|
GHSA-c9g4-vpc7-w9mh
|
Absolute path traversal vulnerability in the image-download process in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to overwrite or delete arbitrary files via a full pathname in an image header, aka Bug ID CSCtq02706.
|
[] |
|
CVE-2014-8351
|
SQL injection vulnerability in info.php in French National Commission on Informatics and Liberty (aka CNIL) CookieViz before 1.0.1 allows remote web servers to execute arbitrary SQL commands via the domain parameter.
|
[
"cpe:2.3:a:french_national_commission_on_informatics_and_liberty:cookieviz:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-18292
|
Secure app running in non secure space can restart TZ by calling Widevine app API repeatedly in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear in versions MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 810, SD 820, SD 820A.
|
[
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*"
] |
|
GHSA-3vfp-fjr2-hwh6
|
Cross-site scripting (XSS) vulnerability in the Import Legacy Media plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php.
|
[] |
|
CVE-2023-4462
|
Poly VVX 601 Web Configuration Application random values
|
A vulnerability classified as problematic has been found in Poly Trio 8300, Trio 8500, Trio 8800, Trio C60, CCX 350, CCX 400, CCX 500, CCX 505, CCX 600, CCX 700, EDGE E100, EDGE E220, EDGE E300, EDGE E320, EDGE E350, EDGE E400, EDGE E450, EDGE E500, EDGE E550, VVX 101, VVX 150, VVX 201, VVX 250, VVX 300, VVX 301, VVX 310, VVX 311, VVX 350, VVX 400, VVX 401, VVX 410, VVX 411, VVX 450, VVX 500, VVX 501, VVX 600 and VVX 601. This affects an unknown part of the component Web Configuration Application. The manipulation leads to insufficiently random values. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249255.
|
[
"cpe:2.3:o:poly:ccx_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:poly:ccx_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:poly:ccx_600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:poly:ccx_600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:poly:trio_8800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:poly:trio_8800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:poly:trio_c60_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:poly:trio_c60:-:*:*:*:*:*:*:*"
] |
CVE-2011-1241
|
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] |
|
GHSA-8fhf-75fw-x2xx
|
Cross-site scripting (XSS) vulnerability in Microsoft Edge allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Edge Information Disclosure Vulnerability," a different vulnerability than CVE-2016-7280.
|
[] |
|
CVE-2021-33547
|
UDP Technology/Geutebrück camera devices: Buffer overflow in profile parameter leading to RCE
|
Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the profile parameter which may allow an attacker to remotely execute arbitrary code.
|
[
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2110_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2110:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2111_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2111:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2241_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2241:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2250_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2250:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2230_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2230:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2239_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2239:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2240_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2240:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ethc-2249_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ethc-2249:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2270_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2270:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_eec-2400_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_eec-2400:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2010_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_een-2010:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-code_een-2040_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-code_een-2040:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ebc-2112_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ebc-2112:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_efd-2251_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_efd-2251:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2275_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2275:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:geutebrueck:g-cam_ewpc-2271_firmware:1.12.14.5:*:*:*:*:*:*:*",
"cpe:2.3:h:geutebrueck:g-cam_ewpc-2271:*:*:*:*:*:*:*:*"
] |
GHSA-xjgr-47gv-2g9p
|
The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid parameter in versions up to, and including, 4.8.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] |
|
GHSA-66g8-r87v-92fx
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kyle Phillips Nested Pages allows Stored XSS. This issue affects Nested Pages: from n/a through 3.2.9.
|
[] |
|
CVE-2011-3965
|
Google Chrome before 17.0.963.46 does not properly check signatures, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-3056
|
Download Manager <= 3.3.12 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
|
The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.3.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
|
[] |
GHSA-vmg9-6x6w-8qmj
|
IBM Quality Manager (RQM) 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 120666.
|
[] |
|
GHSA-r62g-pxcp-5wp5
|
Dell EMC XtremIO XMS versions prior to 6.3.0 contain a stored cross-site scripting vulnerability. A low-privileged malicious remote user of XtremIO may exploit this vulnerability to store malicious HTML or JavaScript code in application fields. When victim users access the injected page through their browsers, the malicious code may be executed by the web browser in the context of the vulnerable web application.
|
[] |
|
GHSA-rmq7-hqhv-m337
|
An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is Arbitrary File Upload. The BaseController class, that each of the service controllers derives from, allows for the upload of arbitrary files. If the HTTP request is a multipart/form-data POST request, any parameters with a filename entry will have their content written to a file in the Vocera upload-staging directory with the specified filename in the parameter.
|
[] |
|
GHSA-h8vc-v44p-5r2q
|
Moodle provides calendar-event data without considering whether an activity is hidden
|
calendar/externallib.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 provides calendar-event data without considering whether an activity is hidden, which allows remote authenticated users to obtain sensitive information via a web-service request.
|
[] |
GHSA-cp7p-c3xv-f5g5
|
GNU LibreDWG 0.9.3.2564 has an attempted excessive memory allocation in read_sections_map in decode_r2007.c.
|
[] |
|
CVE-2018-14657
|
A flaw was found in Keycloak 4.2.1.Final, 4.3.0.Final. When TOPT enabled, an improper implementation of the Brute Force detection algorithm will not enforce its protection measures.
|
[
"cpe:2.3:a:redhat:keycloak:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:keycloak:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*"
] |
|
CVE-2023-4749
|
SourceCodester Inventory Management System index.php file inclusion
|
A vulnerability, which was classified as critical, was found in SourceCodester Inventory Management System 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page leads to file inclusion. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-238638 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:mayurik:inventory_management_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2022-44213
|
ZKTeco Xiamen Information Technology ZKBio ECO ADMS <=3.1-164 is vulnerable to Cross Site Scripting (XSS).
|
[
"cpe:2.3:a:zkteco:automatic_data_master_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-j69x-v3vw-7m6g
|
Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.1) uses default (1) usernames and (2) passwords for (a) the administrator and (b) web management, which makes it easier for remote attackers to perform configuration changes or obtain operating-system access.
|
[] |
|
CVE-2014-6967
|
The Albion College (aka com.vivomobile.albioncollege) application 2.1.16 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:vivonet:albion_college:2.1.16:*:*:*:*:android:*:*"
] |
|
GHSA-mp9h-8rrx-27f5
|
Novell eDirectory 8.6.2 and 8.7 use case insensitive passwords, which makes it easier for remote attackers to conduct brute force password guessing.
|
[] |
|
CVE-2005-3770
|
Multiple cross-site scripting (XSS) vulnerabilities in PHP-Post (PHPp) 1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the subject in a post, or the user parameter to (2) profile.php and (3) mail.php.
|
[
"cpe:2.3:a:phppost:phppost:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-r476-rhjx-f9gg
|
An integer overflow vulnerability due to improper input validation when reading TDMS files in LabVIEW may result in an infinite loop. Successful exploitation requires an attacker to provide a user with a specially crafted TDMS file. This vulnerability affects LabVIEW 2024 Q1 and prior versions.
|
[] |
|
GHSA-r4x3-pjwq-wcwm
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Luca Paggetti 3D Presentation allows Stored XSS.This issue affects 3D Presentation: from n/a through 1.0.
|
[] |
|
GHSA-v4r8-qwq6-39xh
|
everybuddy 0.4.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file created by a system call to wget.
|
[] |
|
CVE-2019-9933
|
Various Lexmark products have a Buffer Overflow (issue 3 of 3).
|
[
"cpe:2.3:o:lexmark:cs31x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs31x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs41x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs41x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms312_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms312:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms317_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms317:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m1140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms315_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms415_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms417_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms417:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms51x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms51x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms610dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms610dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms617_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m1145_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1145:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m3150dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m3150dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms71x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms71x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5163dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5163dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms810_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms811_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms812_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms812:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms817_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms817:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms818_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms818:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms810de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms810de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5155_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5163_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5163:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms812de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms812de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5170_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5170:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms91x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms91x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx31x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx31x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm1135_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1135:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx511_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx511:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx610_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx611_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx611:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm3150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm3150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx71x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx71x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx81x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx81x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm51xx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm51xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm71xx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm71xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx91x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx91x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm91x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm91x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx6500e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx6500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c746_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c746:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c748_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c748:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs748_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs748:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c792_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c792:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs796_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs796:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c925_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c925:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c950_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x548_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x548:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xs548_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs548:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x74x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x74x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xs748_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs748:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x792_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x792:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xs79x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs79x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x925_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x925:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xs925_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs925:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x95x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x95x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xs95x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs95x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:6500e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c734_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c734:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c736_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c736:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e46x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e46x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t65x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t65x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x46x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x46x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x65x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x65x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x73x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x73x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:w850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:w850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x86x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x86x:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-3312
|
Directory traversal vulnerability in lemon_includes/FCKeditor/editor/filemanager/browser/browser.php in Lemon CMS 1.10 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the dir parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: this might be an issue in FCKeditor.
|
[
"cpe:2.3:a:lemoncms:lemon_cms:1.10:*:*:*:*:*:*:*"
] |
|
GHSA-77v8-h5vq-j24g
|
Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Galaxy Weblinks Gallery with thumbnail slider plugin <= 6.0 versions.
|
[] |
|
GHSA-fxr6-32v4-q59c
|
A remote code execution vulnerability exists in the way that the ActiveX Data objects (ADO) handles objects in memory, aka 'Windows ActiveX Remote Code Execution Vulnerability'.
|
[] |
|
GHSA-c2c3-654f-6p4q
|
Hospital management system version 378c157 allows to bypass authentication.This is possible because the application is vulnerable to SQLI.
|
[] |
|
GHSA-cw7v-rc9m-6mcv
|
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows authenticated attackers to obtain sensitive information via a specially crafted document, aka "Windows Kernel Information Disclosure Vulnerability," a different vulnerability than CVE-2017-0175, CVE-2017-0220, and CVE-2017-0259.
|
[] |
|
GHSA-j27g-r58q-624w
|
Craft CMS subject to URL forgery
|
Craft CMS before 2.6.2976 does not prevent modification of the URL in a forgot-password email message.
|
[] |
CVE-2020-9648
|
Adobe Experience Manager versions 6.5 and earlier have a cross-site scripting vulnerability. Successful exploitation could lead to arbitrary javascript execution in the browser.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-31047
|
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to bypass validation when using one form field to upload multiple files. This multiple upload has never been supported by forms.FileField or forms.ImageField (only the last uploaded file was validated). However, Django's "Uploading multiple files" documentation suggested otherwise.
|
[
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:4.2:b1:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] |
|
GHSA-cjgv-rrp4-6mg5
|
Cobian Backup 11 client allows man-in-the-middle attackers to add and execute new backup tasks when the master server is spoofed. In addition, the attacker can execute system commands remotely by abusing pre-backup events.
|
[] |
|
CVE-2024-6932
|
ClassCMS cross site scripting
|
A vulnerability was found in ClassCMS 4.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/?action=home&do=shop:index&keyword=&kind=all. The manipulation of the argument order leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-271987.
|
[
"cpe:2.3:a:classcms:classcms:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:classcms_project:classcms:4.5:*:*:*:*:*:*:*"
] |
GHSA-wjg2-hjqv-2pvp
|
The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the link_target parameter in all versions up to, and including, 2.8.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
GHSA-fq4g-p58q-8f6g
|
Eval injection vulnerability in sessions.inc in PHP Base Library (PHPLib) before 7.4a, when index.php3 from the PHPLib distribution is available on the server, allows remote attackers to execute arbitrary PHP code by including a base64-encoded representation of the code in a cookie. NOTE: this description was significantly updated on 20060605 to reflect new details after an initial vague advisory.
|
[] |
|
CVE-2012-3869
|
Cross-site scripting (XSS) vulnerability in include/classes/class.rex_list.inc.php in REDAXO 4.3.x and 4.4 allows remote attackers to inject arbitrary web script or HTML via the subpage parameter to index.php.
|
[
"cpe:2.3:a:redaxo:redaxo:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redaxo:redaxo:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redaxo:redaxo:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redaxo:redaxo:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redaxo:redaxo:4.4:*:*:*:*:*:*:*"
] |
|
CVE-2007-1580
|
FTPDMIN 0.96 allows remote attackers to cause a denial of service (daemon crash) via a LIST command for a Windows drive letter, as demonstrated using "//A:". NOTE: this has been reported as a buffer overflow by some sources, but there is not a long argument.
|
[
"cpe:2.3:a:ftpdmin:ftpdmin:0.96:*:*:*:*:*:*:*"
] |
|
CVE-2024-22276
|
VMware Cloud Director Object Storage Extension contains an Insertion of Sensitive Information vulnerability.
A malicious actor with adjacent access to
web/proxy server logging may be able to obtain sensitive information
from URLs that are logged.
|
[] |
|
GHSA-r96m-mpm2-p9xp
|
Dell PowerStore versions 2.1.0.x contain an Authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability under specific configuration. An attacker would gain unauthorized access upon successful exploit.
|
[] |
|
GHSA-r5p5-4qgc-2xcp
|
In the Linux kernel, the following vulnerability has been resolved:fs/ntfs3: Add rough attr alloc_size check
|
[] |
|
CVE-2010-4889
|
Unspecified vulnerability in the Tiny Market (hm_tinymarket) extension 0.5.4 and earlier for TYPO3 allows attackers to execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:a:marco_hezel:hm_tinymarket:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-3144
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Audit). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] |
|
GHSA-w6fq-mgc2-38mc
|
Buffer overflow in the XnsSdkDeviceIpInstaller.ocx ActiveX control in Samsung iPOLiS Device Manager 1.12.2 allows remote attackers to execute arbitrary code via a long string in the first argument to the (1) ReadConfigValue or (2) WriteConfigValue function.
|
[] |
|
CVE-1999-1278
|
nlog CGI scripts do not properly filter shell metacharacters from the IP address argument, which could allow remote attackers to execute certain commands via (1) nlog-smb.pl or (2) rpc-nlog.pl.
|
[
"cpe:2.3:a:nlog:nlog:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-1672
|
SQL injection vulnerability in getcity.php in Hotel Booking Portal 0.1 allows remote attackers to execute arbitrary SQL commands via the country parameter.
|
[
"cpe:2.3:a:useasdf_4444:hotel_booking_portal:0.1:*:*:*:*:*:*:*"
] |
|
GHSA-xf6v-fjfq-2h6c
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.3.2.25013. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the addField method. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5312.
|
[] |
|
GHSA-rhc6-qxqq-hhh6
|
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] |
|
GHSA-qc8j-8wv9-xcfg
|
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged user can cause a null-pointer dereference, which may lead to denial of service.
|
[] |
|
GHSA-4vf7-8qf6-f3f9
|
A vulnerability classified as problematic was found in ciubotaru share-on-diaspora 0.7.9. This vulnerability affects unknown code of the file new_window.php. The manipulation of the argument title/url leads to cross site scripting. The attack can be initiated remotely. The name of the patch is fb6fae2f8a9b146471450b5b0281046a17d1ac8d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-220204.
|
[] |
|
GHSA-6jwm-f45w-3fjj
|
Directory traversal vulnerability in boilerplate.asp for Citrix NFuse 1.5 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the NFuse_Template parameter.
|
[] |
|
CVE-2017-9212
|
The Bluetooth stack on the BMW 330i 2011 allows a remote crash of the CD/Multimedia software via %x or %c format string specifiers in a device name.
|
[
"cpe:2.3:a:bavarian_motor_works:bluetooth_stack:-:*:*:*:*:*:2011_bmw_330i:*"
] |
|
CVE-2008-0517
|
SQL injection vulnerability in index.php in the Darko Selesi EstateAgent (com_estateagent) 0.1 component for Mambo 4.5.x and Joomla! allows remote attackers to execute arbitrary SQL commands via the objid parameter in a contact showObject action.
|
[
"cpe:2.3:a:darko_selesi:estateagent:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.1_1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.1_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.1_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.3h:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5_1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5_1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5_1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5_1.0.3_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5_1.0.9:*:*:*:*:*:*:*"
] |
|
CVE-2024-54454
|
An issue was discovered in Kurmi Provisioning Suite before 7.9.0.35, 7.10.x through 7.10.0.18, and 7.11.x through 7.11.0.15. An Observable Response Discrepancy vulnerability in the sendPasswordReinitLink action of the unlogged.do page allows remote attackers to test whether a username is valid or not. This allows confirmation of valid usernames.
|
[] |
|
CVE-2017-8176
|
Huawei IPTV STB with earlier than IPTV STB V100R003C01LMYTa6SPC001 versions has an authentication bypass vulnerability. An attacker could exploit this vulnerability to access the serial interface and modify the configuration. Successful exploit could lead to the authentication bypass and view channels by free.
|
[
"cpe:2.3:o:huawei:iptv_stb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:iptv_stb:-:*:*:*:*:*:*:*"
] |
|
CVE-2001-0927
|
Format string vulnerability in the permitted function of GNOME libgtop_daemon in libgtop 1.0.12 and earlier allows remote attackers to execute arbitrary code via an argument that contains format specifiers that are passed into the (1) syslog_message and (2) syslog_io_message functions.
|
[
"cpe:2.3:a:gnome:libgtop_daemon:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libgtop_daemon:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libgtop_daemon:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:libgtop_daemon:1.0.12:*:*:*:*:*:*:*"
] |
|
GHSA-6mmx-fhq4-jh82
|
CRLF injection vulnerability in the included media script in Konversation allows user-assisted remote attackers to execute arbitrary IRC commands via CRLF sequences in the name of the song in a .mp3 file.
|
[] |
|
CVE-2019-3934
|
Crestron AM-100 with firmware 1.6.0.2 and AM-101 with firmware 2.7.0.2 allows anyone to bypass the presentation code sending a crafted HTTP POST request to login.cgi. A remote, unauthenticated attacker can use this vulnerability to download the current slide image without knowing the access code.
|
[
"cpe:2.3:o:crestron:am-100_firmware:1.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:am-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:crestron:am-101_firmware:2.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:am-101:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-30849
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-qjmr-8cf3-fcr8
|
A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), Desigo PXM30.E (All versions < V02.20.126.11-41), Desigo PXM40-1 (All versions < V02.20.126.11-41), Desigo PXM40.E (All versions < V02.20.126.11-41), Desigo PXM50-1 (All versions < V02.20.126.11-41), Desigo PXM50.E (All versions < V02.20.126.11-41), PXG3.W100-1 (All versions < V02.20.126.11-37), PXG3.W100-2 (All versions < V02.20.126.11-41), PXG3.W200-1 (All versions < V02.20.126.11-37), PXG3.W200-2 (All versions < V02.20.126.11-41). Endpoints of the “Operation” web application that interpret and execute Axon language queries allow file read access to the device file system with root privileges. By supplying specific I/O related Axon queries, a remote low-privileged attacker can read sensitive files on the device.
|
[] |
|
CVE-2025-53672
|
Jenkins Kryptowire Plugin 0.2 and earlier stores the Kryptowire API key unencrypted in its global configuration file on the Jenkins controller, where it can be viewed by users with access to the Jenkins controller file system.
|
[] |
|
CVE-2018-12042
|
Roxy Fileman through v1.4.5 has Directory traversal via the php/download.php f parameter.
|
[
"cpe:2.3:a:roxyfileman:roxy_fileman:*:*:*:*:*:*:*:*"
] |
|
GHSA-cg7q-w674-m33v
|
The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects.
|
[] |
|
GHSA-8v7j-64xg-g396
|
/dev/ipfilter on SGI IRIX 6.5 is installed by /dev/MAKEDEV with insecure default permissions (644), which could allow a local user to cause a denial of service (traffic disruption).
|
[] |
|
CVE-2017-7543
|
A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.
|
[
"cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*"
] |
|
CVE-2021-28842
|
Null Pointer Deference vulnerability exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial os service by sending the POST request to apply_cgi via action do_graph_auth without login_name key.
|
[
"cpe:2.3:o:trendnet:tew-755ap_firmware:1.11b03:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-755ap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-755ap2kac_firmware:1.11b03:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-755ap2kac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-821dap2kac_firmware:1.11b03:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-821dap2kac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:trendnet:tew-825dap_firmware:1.11b03:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-825dap:-:*:*:*:*:*:*:*"
] |
|
GHSA-87jq-rxj7-28vf
|
In the Linux kernel, the following vulnerability has been resolved:RDMA/hfi1: Fix use-after-free bug for mm structUnder certain conditions, such as MPI_Abort, the hfi1 cleanup code may
represent the last reference held on the task mm.
hfi1_mmu_rb_unregister() then drops the last reference and the mm is freed
before the final use in hfi1_release_user_pages(). A new task may
allocate the mm structure while it is still being used, resulting in
problems. One manifestation is corruption of the mmap_sem counter leading
to a hang in down_write(). Another is corruption of an mm struct that is
in use by another task.
|
[] |
|
GHSA-qhfv-hfvw-jqhq
|
vg_lookup in daemons/lvmetad/lvmetad-core.c in LVM2 2.02 mismanages memory, leading to an lvmetad memory leak, as demonstrated by running pvs.
|
[] |
|
CVE-2010-2875
|
Integer signedness error in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a length value associated with the tSAC chunk in a Director movie.
|
[
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*"
] |
|
GHSA-r56h-6jmm-p8c7
|
The SV3C HD Camera (L-SERIES V2.3.4.2103-S50-NTD-B20170508B) does not perform proper validation on user-supplied input and is vulnerable to cross-site scripting attacks. If proper authorization was implemented, this vulnerability could be leveraged to perform actions on behalf of another user or the administrator.
|
[] |
|
CVE-2025-27276
|
WordPress Photo Gallery ( Responsive ) plugin <= 4.0 - CSRF to Privilege Escalation vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in lizeipe Photo Gallery ( Responsive ) allows Privilege Escalation. This issue affects Photo Gallery ( Responsive ): from n/a through 4.0.
|
[] |
CVE-2022-34483
|
An attacker who could have convinced a user to drag and drop an image to a filesystem could have manipulated the resulting filename to contain an executable extension, and by extension potentially tricked the user into executing malicious code. While very similar, this is a separate issue from CVE-2022-34482. This vulnerability affects Firefox < 102.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-32561
|
OctoPrint before 1.6.0 allows XSS because API error messages include the values of input parameters.
|
[
"cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-23553
|
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007d33.
|
[
"cpe:2.3:a:irfanview:irfanview:4.54:*:*:*:*:*:x86:*"
] |
|
GHSA-9wfx-9r7g-42wv
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[] |
|
CVE-2012-5583
|
phpCAS before 1.3.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
[
"cpe:2.3:a:apereo:phpcas:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apereo:phpcas:1.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:apereo:phpcas:1.3.0:rc1:*:*:*:*:*:*"
] |
|
CVE-2013-6198
|
Cross-site scripting (XSS) vulnerability in HP Service Manager WebTier and Windows Client 9.20 and 9.21 before 9.21.661 p8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:hp:service_manager:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_client:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_client:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_tier:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:service_manager_web_tier:9.21:*:*:*:*:*:*:*"
] |
|
CVE-2019-20474
|
An issue was discovered in Zoho ManageEngine Remote Access Plus 10.0.447. The service to test the mail-server configuration suffers from an authorization issue allowing a user with the Guest role (read-only access) to use and abuse it. One of the abuses allows performing network and port scan operations of the localhost or the hosts on the same network segment, aka SSRF.
|
[
"cpe:2.3:a:zohocorp:manageengine_remote_access_plus:10.0.447:*:*:*:*:*:*:*"
] |
|
CVE-2023-43815
|
Delta Electronics Delta Industrial Automation DOPSoft DPS File wScreenDESCTextLen Buffer Overflow Remote Code Execution
|
A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when parsing the wScreenDESCTextLen field of a DPS file. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve code execution.
|
[
"cpe:2.3:a:deltaww:dopsoft:*:*:*:*:*:*:*:*"
] |
GHSA-pqhc-wq43-44m5
|
Cross-site scripting (XSS) vulnerability in the administrative interface in the Campaign Monitor module before 6.x-2.5 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this refers to an issue in an independently developed Drupal module, and NOT an issue in the Campaign Monitor software itself (described on the campaignmonitor.com web site).
|
[] |
|
GHSA-cmhq-fhf8-289m
|
Directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.
|
[] |
|
GHSA-gj49-7ff4-x6q2
|
Out-of-Bounds write due to incorrect array index check in PMIC in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9150, MDM9206, MDM9607, MDM9650, MDM9655, QCS405, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX24, Snapdragon_High_Med_2016, SXR1130
|
[] |
|
GHSA-vxgh-92j5-jvhx
|
Improper URL validation vulnerability in Samsung Members prior to version 14.0.07.1 allows attackers to access sensitive information.
|
[] |
|
CVE-2021-27095
|
Windows Media Video Decoder Remote Code Execution Vulnerability
|
Windows Media Video Decoder Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] |
GHSA-8376-779w-5hcf
|
In the Linux kernel, the following vulnerability has been resolved:netfilter: nf_tables: reject mismatching sum of field_len with set key lengthThe field length description provides the length of each separated key
field in the concatenation, each field gets rounded up to 32-bits to
calculate the pipapo rule width from pipapo_init(). The set key length
provides the total size of the key aligned to 32-bits.Register-based arithmetics still allows for combining mismatching set
key length and field length description, eg. set key length 10 and field
description [ 5, 4 ] leading to pipapo width of 12.
|
[] |
|
CVE-2019-1274
|
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka 'Windows Kernel Information Disclosure Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-4142
|
The Candlepin component of Red Hat Satellite was affected by an improper authentication flaw. Few factors could allow an attacker to use the SCA (simple content access) certificate for authentication with Candlepin.
|
[
"cpe:2.3:a:candlepinproject:candlepin:*:*:*:*:*:*:*:*"
] |
|
GHSA-qjpp-vw6x-4722
|
Koha before 24.11.02 allows admins to execute arbitrary commands via shell metacharacters in the tools/scheduler.pl report parameter.
|
[] |
|
GHSA-jjwv-8654-h4h3
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maksym Marko MX Time Zone Clocks allows Reflected XSS. This issue affects MX Time Zone Clocks: from n/a through 5.1.1.
|
[] |
|
CVE-2018-16034
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-32596
|
A use of one-way hash with a predictable salt vulnerability in the password storing mechanism of FortiPortal 6.0.0 through 6.04 may allow an attacker already in possession of the password store to decrypt the passwords by means of precomputed tables.
|
[
"cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.