Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2018-8502
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in Protected View, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Excel.
[ "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*" ]
GHSA-ffcj-m49c-v7qj
The PoDoFo::PdfPainter::ExpandTabs function in PdfPainter.cpp in PoDoFo 0.9.5 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PDF document.
[]
GHSA-fvh4-6f4w-9j9g
Improper validation vulnerability in RemoteViews prior to SMR Jun-2022 Release 1 allows attackers to launch certain activities.
[]
GHSA-v777-6v7p-3jjm
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in weDevs WP ERP plugin <= 1.12.3 versions.
[]
CVE-2024-44577
RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain a command injection vulnerability via the time_date function.
[ "cpe:2.3:o:relyum:rely-pcie_firmware:*:*:*:*:*:*:*:*" ]
GHSA-r3w7-v7qj-3223
Cross-site scripting vulnerability in Zenphoto versions prior to 1.5.7 allows remote attackers to inject an arbitrary JavaScript via unspecified vectors.
[]
CVE-2013-1108
Cisco WebEx Training Center allows remote authenticated users to remove hands-on lab-session reservations via a crafted URL, aka Bug ID CSCzu81064.
[ "cpe:2.3:a:cisco:webex_training_center:-:*:*:*:*:*:*:*" ]
GHSA-pchm-v2q2-6vm7
The web application of some Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was vulnerable to path traversal, allowing an unauthenticated user to retrieve arbitrary files, or check if files or folders existed within the file system.
[]
GHSA-ch7j-r6cg-rfjc
Cross-site request forgery vulnerability exists in Wi-Fi AP UNIT 'AC-WPS-11ac series'. If a user views a malicious page while logged in, unintended operations may be performed.
[]
CVE-2022-3917
Improper access control of bootloader function was discovered in Motorola Mobility Motorola e20 prior to version RONS31.267-38-8 allows attacker with local access to read partition or RAM data.
[ "cpe:2.3:o:motorola:moto_e20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:motorola:moto_e20:-:*:*:*:*:*:*:*" ]
CVE-2010-4983
SQL injection vulnerability in profile.php in iScripts CyberMatch 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:iscripts:cybermatch:1.0:*:*:*:*:*:*:*" ]
CVE-2025-39424
WordPress Simple Maps plugin <= 0.98 - CSRF to XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in simplemaps Simple Maps allows Stored XSS. This issue affects Simple Maps: from n/a through 0.98.
[]
GHSA-fvmq-5x7q-w2cc
SourceCodester Best Employee Management System V1.0 is vulnerable to Cross Site Scripting (XSS) in /admin/profile.php via the website_image, fname, lname, contact, username, and address parameters.
[]
CVE-2020-15699
An issue was discovered in Joomla! through 3.9.19. Missing validation checks on the usergroups table object can result in a broken site configuration.
[ "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
CVE-2024-22774
An issue in Panoramic Corporation Digital Imaging Software v.9.1.2.7600 allows a local attacker to escalate privileges via the ccsservice.exe component.
[ "cpe:2.3:a:panoramic_corporation:dental_imaging_software:9.1.2.7600:*:*:*:*:*:*:*" ]
CVE-2025-23179
Ribbon Communications - CWE-798: Use of Hard-coded Credentials
CWE-798: Use of Hard-coded Credentials
[]
GHSA-xxw8-ppw6-gv4w
The debug interface of Goldshell ASIC Miners v2.2.1 and below was discovered to be exposed publicly on the web interface, allowing attackers to access passwords and other sensitive information in plaintext.
[]
GHSA-x8cw-f5xw-fwh2
In JetBrains Toolbox App before 2.6 unencrypted credential transmission during SSH authentication was possible
[]
CVE-2016-3766
MPEG4Extractor.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not check whether memory allocation succeeds, which allows remote attackers to cause a denial of service (device hang or reboot) via a crafted file, aka internal bug 28471206.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ]
CVE-2023-29322
Adobe Experience Manager | Cross-site Scripting (Reflected XSS) (CWE-79)
Adobe Experience Manager versions 6.5.16.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
GHSA-cjjr-c6mv-9759
The computer telephony integration (CTI) server component in Cisco Unified Contact Center Express (UCCX) 7.0 before 7.0(1)SR4 and 7.0(2), 6.0 before 6.0(1)SR1, and 5.0 before 5.0(2)SR3 allows remote attackers to cause a denial of service (CTI server and Node Manager failure) via a malformed CTI message.
[]
CVE-2015-6991
FontParser in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file, a different vulnerability than CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6993, CVE-2015-7008, CVE-2015-7009, CVE-2015-7010, and CVE-2015-7018.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
GHSA-pj73-39g5-xmf7
In the Linux kernel, the following vulnerability has been resolved:net: vlan: don't propagate flags on openWith the device instance lock, there is now a possibility of a deadlock:[ 1.211455] ============================================ [ 1.211571] WARNING: possible recursive locking detected [ 1.211687] 6.14.0-rc5-01215-g032756b4ca7a-dirty #5 Not tainted [ 1.211823] -------------------------------------------- [ 1.211936] ip/184 is trying to acquire lock: [ 1.212032] ffff8881024a4c30 (&dev->lock){+.+.}-{4:4}, at: dev_set_allmulti+0x4e/0xb0 [ 1.212207] [ 1.212207] but task is already holding lock: [ 1.212332] ffff8881024a4c30 (&dev->lock){+.+.}-{4:4}, at: dev_open+0x50/0xb0 [ 1.212487] [ 1.212487] other info that might help us debug this: [ 1.212626] Possible unsafe locking scenario: [ 1.212626] [ 1.212751] CPU0 [ 1.212815] ---- [ 1.212871] lock(&dev->lock); [ 1.212944] lock(&dev->lock); [ 1.213016] [ 1.213016] *** DEADLOCK *** [ 1.213016] [ 1.213143] May be due to missing lock nesting notation [ 1.213143] [ 1.213294] 3 locks held by ip/184: [ 1.213371] #0: ffffffff838b53e0 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock+0x1b/0xa0 [ 1.213543] #1: ffffffff84e5fc70 (&net->rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock+0x37/0xa0 [ 1.213727] #2: ffff8881024a4c30 (&dev->lock){+.+.}-{4:4}, at: dev_open+0x50/0xb0 [ 1.213895] [ 1.213895] stack backtrace: [ 1.213991] CPU: 0 UID: 0 PID: 184 Comm: ip Not tainted 6.14.0-rc5-01215-g032756b4ca7a-dirty #5 [ 1.213993] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014 [ 1.213994] Call Trace: [ 1.213995] <TASK> [ 1.213996] dump_stack_lvl+0x8e/0xd0 [ 1.214000] print_deadlock_bug+0x28b/0x2a0 [ 1.214020] lock_acquire+0xea/0x2a0 [ 1.214027] __mutex_lock+0xbf/0xd40 [ 1.214038] dev_set_allmulti+0x4e/0xb0 # real_dev->flags & IFF_ALLMULTI [ 1.214040] vlan_dev_open+0xa5/0x170 # ndo_open on vlandev [ 1.214042] __dev_open+0x145/0x270 [ 1.214046] __dev_change_flags+0xb0/0x1e0 [ 1.214051] netif_change_flags+0x22/0x60 # IFF_UP vlandev [ 1.214053] dev_change_flags+0x61/0xb0 # for each device in group from dev->vlan_info [ 1.214055] vlan_device_event+0x766/0x7c0 # on netdevsim0 [ 1.214058] notifier_call_chain+0x78/0x120 [ 1.214062] netif_open+0x6d/0x90 [ 1.214064] dev_open+0x5b/0xb0 # locks netdevsim0 [ 1.214066] bond_enslave+0x64c/0x1230 [ 1.214075] do_set_master+0x175/0x1e0 # on netdevsim0 [ 1.214077] do_setlink+0x516/0x13b0 [ 1.214094] rtnl_newlink+0xaba/0xb80 [ 1.214132] rtnetlink_rcv_msg+0x440/0x490 [ 1.214144] netlink_rcv_skb+0xeb/0x120 [ 1.214150] netlink_unicast+0x1f9/0x320 [ 1.214153] netlink_sendmsg+0x346/0x3f0 [ 1.214157] __sock_sendmsg+0x86/0xb0 [ 1.214160] ____sys_sendmsg+0x1c8/0x220 [ 1.214164] ___sys_sendmsg+0x28f/0x2d0 [ 1.214179] __x64_sys_sendmsg+0xef/0x140 [ 1.214184] do_syscall_64+0xec/0x1d0 [ 1.214190] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1.214191] RIP: 0033:0x7f2d1b4a7e56Device setup:bond netdevsim1.100@netdevsim1 allmulticast=on (down)When we enslave the lower device (netdevsim0) which has a vlan, we propagate vlan's allmuti/promisc flags during ndo_open. This causes (re)locking on of the real_dev.Propagate allmulti/promisc on flags change, not on the open. There is a slight semantics change that vlans that are down now propagate the flags, but this seems unlikely to result in the real issues.Reproducer:echo 0 1 > /sys/bus/netdevsim/new_devicedev_path=$(ls -d /sys/bus/netdevsim/devices/netdevsim0/net/*) dev=$(echo $dev_path | rev | cut -d/ -f1 | rev)ip link set dev $dev name netdevsim0 ip link set dev netdevsim0 upip link add link netdevsim0 name netdevsim0.100 type vlan id 100 ip link set dev netdevsim0.100 allm ---truncated---
[]
CVE-2007-3207
Buffer overflow in the NFS mount daemon (XNFS.NLM) in Novell NetWare 6.5 SP6, and probably earlier, allows remote attackers to cause a denial of service (abend) via a long path in a mount request.
[ "cpe:2.3:a:novell:client:6.5_sp6:*:*:*:*:*:*:*" ]
CVE-2018-7565
CSRF exists on Polycom QDX 6000 devices.
[ "cpe:2.3:o:polycom:qdx_6000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:polycom:qdx_6000:-:*:*:*:*:*:*:*" ]
GHSA-h69x-h4x5-8pp4
Integer overflow in CoreGraphics in Apple iOS before 8 and Apple TV before 7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
[]
CVE-2018-19774
Cross Site Scripting exists in InfoVista VistaPortal SE Version 5.1 (build 51029). The page "PresentSpace.jsp" has reflected XSS via the GroupId and ConnPoolName parameters.
[ "cpe:2.3:a:infovista:vistaportal:5.1:*:*:*:standard:*:*:*" ]
GHSA-43rc-pcmf-f3g4
An issue was discovered in Simple Machines Forum (SMF) before release 2.0.17. There is SSRF related to Subs-Package.php and Subs.php because user-supplied data is used directly in curl calls.
[]
GHSA-3m73-m9xc-48pv
In the Linux kernel, the following vulnerability has been resolved:dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshapeFor raid456, if reshape is still in progress, then IO across reshape position will wait for reshape to make progress. However, for dm-raid, in following cases reshape will never make progress hence IO will hang:the array is read-only;MD_RECOVERY_WAIT is set;MD_RECOVERY_FROZEN is set;After commit c467e97f079f ("md/raid6: use valid sector values to determine if an I/O should wait on the reshape") fix the problem that IO across reshape position doesn't wait for reshape, the dm-raid test shell/lvconvert-raid-reshape.sh start to hang:[root@fedora ~]# cat /proc/979/stack [<0>] wait_woken+0x7d/0x90 [<0>] raid5_make_request+0x929/0x1d70 [raid456] [<0>] md_handle_request+0xc2/0x3b0 [md_mod] [<0>] raid_map+0x2c/0x50 [dm_raid] [<0>] __map_bio+0x251/0x380 [dm_mod] [<0>] dm_submit_bio+0x1f0/0x760 [dm_mod] [<0>] __submit_bio+0xc2/0x1c0 [<0>] submit_bio_noacct_nocheck+0x17f/0x450 [<0>] submit_bio_noacct+0x2bc/0x780 [<0>] submit_bio+0x70/0xc0 [<0>] mpage_readahead+0x169/0x1f0 [<0>] blkdev_readahead+0x18/0x30 [<0>] read_pages+0x7c/0x3b0 [<0>] page_cache_ra_unbounded+0x1ab/0x280 [<0>] force_page_cache_ra+0x9e/0x130 [<0>] page_cache_sync_ra+0x3b/0x110 [<0>] filemap_get_pages+0x143/0xa30 [<0>] filemap_read+0xdc/0x4b0 [<0>] blkdev_read_iter+0x75/0x200 [<0>] vfs_read+0x272/0x460 [<0>] ksys_read+0x7a/0x170 [<0>] __x64_sys_read+0x1c/0x30 [<0>] do_syscall_64+0xc6/0x230 [<0>] entry_SYSCALL_64_after_hwframe+0x6c/0x74This is because reshape can't make progress.For md/raid, the problem doesn't exist because register new sync_thread doesn't rely on the IO to be done any more:If array is read-only, it can switch to read-write by ioctl/sysfs;md/raid never set MD_RECOVERY_WAIT;If MD_RECOVERY_FROZEN is set, mddev_suspend() doesn't hold 'reconfig_mutex', hence it can be cleared and reshape can continue by sysfs api 'sync_action'.However, I'm not sure yet how to avoid the problem in dm-raid yet. This patch on the one hand make sure raid_message() can't change sync_thread() through raid_message() after presuspend(), on the other hand detect the above 3 cases before wait for IO do be done in dm_suspend(), and let dm-raid requeue those IO.
[]
GHSA-frvj-25f8-q983
A malicious or compromised UApp or ABL may be used by an attacker to issue a malformed system call which results in mapping sensitive System Management Network (SMN) registers leading to a loss of integrity and availability.
[]
CVE-2024-21734
URL Redirection vulnerability in SAP Marketing (Contacts App)
SAP Marketing (Contacts App) - version 160, allows an attacker with low privileges to trick a user to open malicious page which could lead to a very convincing phishing attack with low impact on confidentiality and integrity of the application.
[ "cpe:2.3:a:sap:marketing:160:*:*:*:*:*:*:*" ]
GHSA-2vfx-8pj2-gpp8
Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-19477.
[]
CVE-2021-3184
MISP 2.4.136 has XSS via a crafted URL to the app/View/Elements/global_menu.ctp user homepage favourite button.
[ "cpe:2.3:a:misp:misp:2.4.136:*:*:*:*:*:*:*" ]
GHSA-fw79-253r-px8x
Insertion of Sensitive Information into Log File vulnerability in Octolize USPS Shipping for WooCommerce – Live Rates.This issue affects USPS Shipping for WooCommerce – Live Rates: from n/a through 1.9.4.
[]
CVE-2017-6754
A vulnerability in the web-based management interface of the Cisco Smart Net Total Care (SNTC) Software Collector Appliance 3.11 could allow an authenticated, remote attacker to perform a read-only, blind SQL injection attack, which could allow the attacker to compromise the confidentiality of the system through SQL timing attacks. The vulnerability is due to insufficient input validation of certain user-supplied fields that are subsequently used by the affected software to build SQL queries. An attacker could exploit this vulnerability by submitting crafted URLs, which are designed to exploit the vulnerability, to the affected software. To execute an attack successfully, the attacker would need to submit a number of requests to the affected software. A successful exploit could allow the attacker to determine the presence of values in the SQL database of the affected software. Cisco Bug IDs: CSCvf07617.
[ "cpe:2.3:a:cisco:smart_net_total_care_collector_appliance:3.11:*:*:*:*:*:*:*" ]
CVE-2024-20514
Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, low-privileged, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into a specific page of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.
[]
GHSA-gwv2-757x-v2gx
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PromoSimple Giveaways and Contests by PromoSimple allows Stored XSS.This issue affects Giveaways and Contests by PromoSimple: from n/a through 1.24.
[]
CVE-2019-19227
In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2019-15823
The wps-hide-login plugin before 1.5.3 for WordPress has an action=confirmaction protection bypass.
[ "cpe:2.3:a:wpserveur:wps_hide_login:*:*:*:*:*:wordpress:*:*" ]
CVE-2007-5507
The GIOP service in TNS Listener in the Oracle Net Services component in Oracle Database 9.0.1.5+, 9.2.0.8, 9.2.0.8DV, 10.1.0.5, and 10.2.0.3 allows remote attackers to cause a denial of service (crash) or read potentially sensitive memory via a connect GIOP packet with an invalid data size, which triggers a buffer over-read, aka DB22.
[ "cpe:2.3:a:oracle:database_server:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:9.2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:9.2.0.8dv:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*" ]
GHSA-vxg9-7hhf-p3mh
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.1), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.1), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.1), SCALANCE M812-1 ADSL-Router family (All versions < V8.1), SCALANCE M816-1 ADSL-Router family (All versions < V8.1), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.1), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.1), SCALANCE M874-3 3G-Router (CN) (6GK5874-3AA00-2FA2) (All versions < V8.1), SCALANCE M876-3 (6GK5876-3AA02-2BA2) (All versions < V8.1), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.1), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.1), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.1), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.1), SCALANCE MUM853-1 (A1) (6GK5853-2EA10-2AA1) (All versions < V8.1), SCALANCE MUM853-1 (B1) (6GK5853-2EA10-2BA1) (All versions < V8.1), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.1), SCALANCE MUM856-1 (A1) (6GK5856-2EA10-3AA1) (All versions < V8.1), SCALANCE MUM856-1 (B1) (6GK5856-2EA10-3BA1) (All versions < V8.1), SCALANCE MUM856-1 (CN) (6GK5856-2EA00-3FA1) (All versions < V8.1), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.1), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.1), SCALANCE S615 EEC LAN-Router (6GK5615-0AA01-2AA2) (All versions < V8.1), SCALANCE S615 LAN-Router (6GK5615-0AA00-2AA2) (All versions < V8.1). Affected devices do not properly enforce isolation between user sessions in their web server component. This could allow an authenticated remote attacker to escalate their privileges on the devices.
[]
GHSA-6vrx-qr7p-jxwv
core/getLog.php on the Siemens Enterprise OpenScape Branch appliance and OpenScape Session Border Controller (SBC) before 2 R0.32.0, and 7 before 7 R1.7.0, allows remote attackers to read arbitrary files via unspecified vectors.
[]
CVE-2024-49588
Multiple authenticated SQL injections in oracle-sidecar
Multiple endpoints in `oracle-sidecar` in versions 0.347.0 to 0.543.0 were found to be vulnerable to SQL injections.
[ "cpe:2.3:a:oracle:oracle-sidecar:*:*:*:*:*:*:*:*" ]
GHSA-6c65-5mx7-2v9x
A cross-site scripting (XSS) vulnerability in the publish article function of emlog pro v2.1.14 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the title field.
[]
GHSA-jqf2-mw72-75x9
An issue was discovered in Foxit PhantomPDF before 8.3.11. It has a buffer overflow because a looping correction does not occur after JavaScript updates Field APs.
[]
GHSA-2jcp-ppp2-c9rv
A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system.
[]
CVE-2008-6608
Multiple SQL injection vulnerabilities in DevelopItEasy Events Calendar 1.2 allow remote attackers to execute arbitrary SQL commands via (1) the user_name parameter (aka user field) to admin/index.php, (2) the user_pass parameter (aka pass field) to admin/index.php, or (3) the id parameter to calendar_details.php. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:developiteasy:events_calendar:1.2:*:*:*:*:*:*:*" ]
GHSA-94m4-pqm7-568j
The SupportCandy – Helpdesk & Customer Support Ticket System plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.3.0 via file upload due to missing validation on a user controlled key. This makes it possible for authenticated attackers to download attachments for support tickets that don't belong to them. If an admin enables tickets for guests, this can be exploited by unauthenticated attackers.
[]
GHSA-pcmp-jhfr-g2wr
In main of main.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150225255
[]
CVE-2011-4129
(1) services/twitter/twitter-contact-view.c and (2) services/twitter/twitter-item-view.c in libsocialweb before 0.25.20 automatically connect to Twitter when no Twitter account is set, which might allow remote attackers to obtain sensitive information via a man-in-the-middle (MITM) attack.
[ "cpe:2.3:a:gnome:libsocialweb:*:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.8:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.9:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.10:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.11:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.12:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.13:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.14:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.15:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.16:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.17:*:*:*:*:*:*:*", "cpe:2.3:a:gnome:libsocialweb:0.25.18:*:*:*:*:*:*:*" ]
GHSA-cx4p-cv2h-hf45
In the Linux kernel, the following vulnerability has been resolved:fbdev: smscufx: fix error handling code in ufx_usb_probeThe current error handling code in ufx_usb_probe have many unmatching issues, e.g., missing ufx_free_usb_list, destroy_modedb label should only include framebuffer_release, fb_dealloc_cmap only matches fb_alloc_cmap.My local syzkaller reports a memory leak bug:memory leak in ufx_usb_probeBUG: memory leak unreferenced object 0xffff88802f879580 (size 128): comm "kworker/0:7", pid 17416, jiffies 4295067474 (age 46.710s) hex dump (first 32 bytes): 80 21 7c 2e 80 88 ff ff 18 d0 d0 0c 80 88 ff ff .!|............. 00 d0 d0 0c 80 88 ff ff e0 ff ff ff 0f 00 00 00 ................ backtrace: [<ffffffff814c99a0>] kmalloc_trace+0x20/0x90 mm/slab_common.c:1045 [<ffffffff824d219c>] kmalloc include/linux/slab.h:553 [inline] [<ffffffff824d219c>] kzalloc include/linux/slab.h:689 [inline] [<ffffffff824d219c>] ufx_alloc_urb_list drivers/video/fbdev/smscufx.c:1873 [inline] [<ffffffff824d219c>] ufx_usb_probe+0x11c/0x15a0 drivers/video/fbdev/smscufx.c:1655 [<ffffffff82d17927>] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396 [<ffffffff82712f0d>] call_driver_probe drivers/base/dd.c:560 [inline] [<ffffffff82712f0d>] really_probe+0x12d/0x390 drivers/base/dd.c:639 [<ffffffff8271322f>] __driver_probe_device+0xbf/0x140 drivers/base/dd.c:778 [<ffffffff827132da>] driver_probe_device+0x2a/0x120 drivers/base/dd.c:808 [<ffffffff82713c27>] __device_attach_driver+0xf7/0x150 drivers/base/dd.c:936 [<ffffffff82710137>] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:427 [<ffffffff827136b5>] __device_attach+0x105/0x2d0 drivers/base/dd.c:1008 [<ffffffff82711d36>] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:487 [<ffffffff8270e242>] device_add+0x642/0xdc0 drivers/base/core.c:3517 [<ffffffff82d14d5f>] usb_set_configuration+0x8ef/0xb80 drivers/usb/core/message.c:2170 [<ffffffff82d2576c>] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238 [<ffffffff82d16ffc>] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293 [<ffffffff82712f0d>] call_driver_probe drivers/base/dd.c:560 [inline] [<ffffffff82712f0d>] really_probe+0x12d/0x390 drivers/base/dd.c:639 [<ffffffff8271322f>] __driver_probe_device+0xbf/0x140 drivers/base/dd.c:778Fix this bug by rewriting the error handling code in ufx_usb_probe.
[]
CVE-2014-7371
The Magic Balloonman Marty Boone (aka com.app_martyboone.layout) application 1.400 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:appearingbusiness:magic_balloonman_marty_boone:1.4:*:*:*:*:android:*:*" ]
CVE-2014-5815
The Solitaire Arena (aka com.mavenhut.solitaire) application 1.0.15 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:mavenhut:solitaire_arena:1.0.15:*:*:*:*:android:*:*" ]
GHSA-p952-pxm2-8h77
CWE-287: Improper Authentication may allow Authentication Bypass
[]
CVE-2021-34758
Cisco TelePresence Collaboration Endpoint and RoomOS Software Denial of Service Vulnerability
A vulnerability in the memory management of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an authenticated, local attacker to corrupt a shared memory segment, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient access controls to a shared memory resource. An attacker could exploit this vulnerability by corrupting a shared memory segment on an affected device. A successful exploit could allow the attacker to cause the device to reload. The device will recover from the corruption upon reboot.
[ "cpe:2.3:a:cisco:telepresence_collaboration_endpoint:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:roomos:*:*:*:*:*:*:*:*" ]
GHSA-7mwh-q3xm-qh6p
Vitess allows HTML injection in /debug/querylogz & /debug/env
SummaryThe `/debug/querylogz` and `/debug/env` pages for `vtgate` and `vttablet` do not properly escape user input. The result is that queries executed by Vitess can write HTML into the monitoring page at will.DetailsThese pages are rendered using `text/template` instead of rendering with a proper HTML templating engine.PoCExecute any query where part of it is HTML markup, for example as part of a string. To make it easier to observe you might want to make sure the query takes a few seconds to complete, giving you time to refresh the status page.Example query that can trigger the issue:Result:![image](https://github.com/user-attachments/assets/c583816b-157c-474e-bbed-152b3dc0372f)ImpactAnyone looking at the Vitess status page is affected. This would normally be owners / administrators of the Vitess cluster.Anyone that can influence what text show up in queries can trigger it. This would normally be pretty much everybody interacting with a system that uses Vitess as a backend.
[]
CVE-2004-1672
attachment.html in Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allows remote attackers to view other users' attachments by specifying the username and message ID in an HTTP request.
[ "cpe:2.3:a:icewarp:web_mail:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:5.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:icewarp:web_mail:5.2.8:*:*:*:*:*:*:*" ]
GHSA-fwjh-4hpr-6hgj
Object lifecycle issue in V8 in Google Chrome prior to 75.0.3770.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
GHSA-53jj-4vr2-hc67
An issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make an HTTP POST request with injected HTML data that is later leveraged to send emails from a customer trusted email address.
[]
CVE-2020-13938
Improper Handling of Insufficient Privileges
Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows
[ "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*", "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*" ]
GHSA-mh2v-8qg2-rvr3
WS_FTP 5.0.2 allows remote authenticated users to cause a denial of service (CPU consumption) via a CD command that contains an invalid path with a "../" sequence.
[]
CVE-2023-28370
Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.
[ "cpe:2.3:a:tornadoweb:tornado:*:*:*:*:*:*:*:*" ]
CVE-2023-23989
WordPress RegistrationMagic plugin <= 5.1.9.2 - Content Injection
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss RegistrationMagic.This issue affects RegistrationMagic: from n/a through 5.1.9.2.
[]
GHSA-cvm6-6p4g-49vw
Denial of Service attack in airMAX < 8.3.2 , airMAX < 6.0.7 and EdgeMAX < 1.9.7 allow attackers to use the Discovery Protocol in amplification attacks.
[]
CVE-2020-17073
Windows Update Orchestrator Service Elevation of Privilege Vulnerability
Windows Update Orchestrator Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*" ]
CVE-2006-2868
Multiple PHP remote file inclusion vulnerabilities in Claroline 1.7.6 allow remote attackers to execute arbitrary PHP code via a URL in the includePath cookie to (1) auth/extauth/drivers/mambo.inc.php or (2) auth/extauth/drivers/postnuke.inc.php.
[ "cpe:2.3:a:claroline:claroline:1.7.6:*:*:*:*:*:*:*" ]
GHSA-wm5j-449h-wq3g
Buffer overflow in Savant 3.0 web server allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long Host HTTP header.
[]
GHSA-cmqj-44h3-jvqr
In l2cu_send_peer_config_rej of l2c_utils.cc, there is a possible out-of-bound read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-119870451.
[]
CVE-2021-26954
An issue was discovered in the qwutils crate before 0.3.1 for Rust. When a Clone panic occurs, insert_slice_clone can perform a double drop.
[ "cpe:2.3:a:qwutils_project:qwutils:*:*:*:*:*:rust:*:*" ]
CVE-2020-26218
HTML Injection in touchbase.ai
touchbase.ai before version 2.0 is vulnerable to Cross-Site Scripting. The vulnerability allows an attacker to inject HTML payloads which could result in defacement, user redirection to a malicious webpage/website etc. The issue is patched in version 2.0.
[ "cpe:2.3:a:touchbase.ai_project:touchbase.ai:*:*:*:*:*:*:*:*" ]
CVE-2004-0548
Multiple stack-based buffer overflows in the word-list-compress functionality in compress.c for Aspell allow local users to execute arbitrary code via a long entry in the wordlist that is not properly handled when using the (1) "c" compress option or (2) "d" decompress option.
[ "cpe:2.3:a:gnu:aspell:0.50.5:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*" ]
CVE-2022-46700
A memory corruption issue was addressed with improved input validation. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
CVE-2016-1205
Cross-site scripting (XSS) vulnerability in the shiro8 (1) category_freearea_ addition_plugin plugin 1.0 and (2) itemdetail_freearea_ addition_plugin plugin 1.0 for EC-CUBE allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:shiro8:category_freearea_addition:1.0:*:*:*:*:ec-cube:*:*", "cpe:2.3:a:shiro8:itemdetail_freearea_addition:1.0:*:*:*:*:ec-cube:*:*" ]
GHSA-m7mw-25m2-h3x3
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) scheduler, in which the software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests, which may lead to denial of service.
[]
CVE-2022-32371
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_teacher.php?id=.
[ "cpe:2.3:a:advanced_school_management_system_project:advanced_school_management_system:1.0:*:*:*:*:*:*:*" ]
CVE-2021-32136
Heap buffer overflow in the print_udta function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
[ "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*" ]
GHSA-mxh6-2xpg-m77w
Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, traditional stacks holding both data and return addresses are accompanied by so called "shadow stacks", holding little more than return addresses. Shadow stacks aren't writable by normal instructions, and upon function returns their contents are used to check for possible manipulation of a return address coming from the traditional stack.In particular certain memory accesses need intercepting by Xen. In various cases the necessary emulation involves kind of replaying of the instruction. Such replaying typically involves filling and then invoking of a stub. Such a replayed instruction may raise an exceptions, which is expected and dealt with accordingly.Unfortunately the interaction of both of the above wasn't right: Recovery involves removal of a call frame from the (traditional) stack. The counterpart of this operation for the shadow stack was missing.
[]
GHSA-94w7-67qp-92gp
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of Login requests to the web management portal. When parsing the HNAP_AUTH header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16139.
[]
CVE-2017-11352
In ImageMagick before 7.0.5-10, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-9144.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
GHSA-6qpm-jgqq-hh7p
Cross-site scripting (XSS) vulnerability in admincp/apilog.php in vBulletin 4.2.2 and earlier, and 5.0.x through 5.0.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted XMLRPC API request, as demonstrated using the client name.
[]
GHSA-c2qr-w9p6-cxgr
In danny-avila/librechat version git 0c2a583, there is an improper input validation vulnerability. The application uses multer middleware for handling multipart file uploads. When using in-memory storage (the default setting for multer), there is no limit on the upload file size. This can lead to a server crash due to out-of-memory errors when handling large files. An attacker without any privileges can exploit this vulnerability to cause a complete denial of service. The issue is fixed in version 0.7.6.
[]
CVE-2024-53041
A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected applications contain a stack based overflow vulnerability while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25000)
[]
GHSA-cxjm-j999-j645
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the PVFS dissector could crash. This was addressed in epan/dissectors/packet-pvfs2.c by preventing a NULL pointer dereference.
[]
GHSA-9hqj-38j2-5jgm
Command Injection in ascii-art
Versions of `ascii-art` before 1.4.4 are vulnerable to command injection. This is exploitable when user input is passed into the argument of the `ascii-art preview` command.Example Proof of concept: `ascii-art preview 'doom"; touch /tmp/malicious; echo "'`Given that the input is passed on the command line and none of the api methods are vulnerable to this, the likely exploitation vector is when the ascii-art comment is being called programmatically using something like `execFile`.RecommendationUpdate to version 1.4.4 or later.
[]
CVE-2017-2897
An exploitable out-of-bounds write vulnerability exists in the read_MSAT function of libxls 1.4. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability.
[ "cpe:2.3:a:libxls_project:libxls:1.4.0:*:*:*:*:*:*:*" ]
CVE-2024-35910
tcp: properly terminate timers for kernel sockets
In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers for kernel sockets We had various syzbot reports about tcp timers firing after the corresponding netns has been dismantled. Fortunately Josef Bacik could trigger the issue more often, and could test a patch I wrote two years ago. When TCP sockets are closed, we call inet_csk_clear_xmit_timers() to 'stop' the timers. inet_csk_clear_xmit_timers() can be called from any context, including when socket lock is held. This is the reason it uses sk_stop_timer(), aka del_timer(). This means that ongoing timers might finish much later. For user sockets, this is fine because each running timer holds a reference on the socket, and the user socket holds a reference on the netns. For kernel sockets, we risk that the netns is freed before timer can complete, because kernel sockets do not hold reference on the netns. This patch adds inet_csk_clear_xmit_timers_sync() function that using sk_stop_timer_sync() to make sure all timers are terminated before the kernel socket is released. Modules using kernel sockets close them in their netns exit() handler. Also add sock_not_owned_by_me() helper to get LOCKDEP support : inet_csk_clear_xmit_timers_sync() must not be called while socket lock is held. It is very possible we can revert in the future commit 3a58f13a881e ("net: rds: acquire refcount on TCP sockets") which attempted to solve the issue in rds only. (net/smc/af_smc.c and net/mptcp/subflow.c have similar code) We probably can remove the check_net() tests from tcp_out_of_resources() and __tcp_close() in the future.
[]
GHSA-2fpm-m2hf-gpfc
Multiple PHP remote file inclusion vulnerabilities in Mail2Forum (module for phpBB) 1.2 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the m2f_root_path parameter to (1) m2f/m2f_phpbb204.php, (2) m2f/m2f_forum.php, (3) m2f/m2f_mailinglist.php or (4) m2f/m2f_cron.php.
[]
CVE-2015-0810
Mozilla Firefox before 37.0 on OS X does not ensure that the cursor is visible, which allows remote attackers to conduct clickjacking attacks via a Flash object in conjunction with DIV elements associated with layered presentation, and crafted JavaScript code that interacts with an IMG element.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
GHSA-3hw4-pvhh-9qcq
In the Linux kernel, the following vulnerability has been resolved:coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()commit 6f755e85c332 ("coresight: Add helper for inserting synchronization packets") removed trailing '\0' from barrier_pkt array and updated the call sites like etb_update_buffer() to have proper checks for barrier_pkt size before read but missed updating tmc_update_etf_buffer() which still reads barrier_pkt past the array size resulting in KASAN out-of-bounds bug. Fix this by adding a check for barrier_pkt size before accessing like it is done in etb_update_buffer().BUG: KASAN: global-out-of-bounds in tmc_update_etf_buffer+0x4b8/0x698 Read of size 4 at addr ffffffd05b7d1030 by task perf/2629Call trace: dump_backtrace+0x0/0x27c show_stack+0x20/0x2c dump_stack+0x11c/0x188 print_address_description+0x3c/0x4a4 __kasan_report+0x140/0x164 kasan_report+0x10/0x18 __asan_report_load4_noabort+0x1c/0x24 tmc_update_etf_buffer+0x4b8/0x698 etm_event_stop+0x248/0x2d8 etm_event_del+0x20/0x2c event_sched_out+0x214/0x6f0 group_sched_out+0xd0/0x270 ctx_sched_out+0x2ec/0x518 __perf_event_task_sched_out+0x4fc/0xe6c __schedule+0x1094/0x16a0 preempt_schedule_irq+0x88/0x170 arm64_preempt_schedule_irq+0xf0/0x18c el1_irq+0xe8/0x180 perf_event_exec+0x4d8/0x56c setup_new_exec+0x204/0x400 load_elf_binary+0x72c/0x18c0 search_binary_handler+0x13c/0x420 load_script+0x500/0x6c4 search_binary_handler+0x13c/0x420 exec_binprm+0x118/0x654 __do_execve_file+0x77c/0xba4 __arm64_compat_sys_execve+0x98/0xac el0_svc_common+0x1f8/0x5e0 el0_svc_compat_handler+0x84/0xb0 el0_svc_compat+0x10/0x50The buggy address belongs to the variable: barrier_pkt+0x10/0x40Memory state around the buggy address: ffffffd05b7d0f00: fa fa fa fa 04 fa fa fa fa fa fa fa 00 00 00 00 ffffffd05b7d0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00ffffffd05b7d1000: 00 00 00 00 00 00 fa fa fa fa fa fa 00 00 00 03 ^ ffffffd05b7d1080: fa fa fa fa 00 02 fa fa fa fa fa fa 03 fa fa fa ffffffd05b7d1100: fa fa fa fa 00 00 00 00 05 fa fa fa fa fa fa fa ==================================================================
[]
CVE-2021-24836
Temporary Login Without Password < 1.7.1 - Subscriber+ Plugin's Settings Update
The Temporary Login Without Password WordPress plugin before 1.7.1 does not have authorisation and CSRF checks when updating its settings, which could allows any logged-in users, such as subscribers to update them
[ "cpe:2.3:a:storeapps:temporary_login_without_password:*:*:*:*:*:wordpress:*:*" ]
CVE-2020-29444
Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters.
[ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ]
GHSA-mhww-7h5r-9h8q
The Hide Dashboard Notifications plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'warning_notices_settings' function in all versions up to, and including, 1.3. This makes it possible for authenticated attackers, with contributor access and above, to modify the plugin's settings.
[]
GHSA-mwxf-r2gx-rf4m
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Andreas Heigl authLdap plugin <= 2.5.9 versions.
[]
GHSA-3xp5-mpvc-wqpw
The vmnc decoder in the gstreamer does not initialize the render canvas, which allows remote attackers to obtain sensitive information as demonstrated by thumbnailing a simple 1 frame vmnc movie that does not draw to the allocated render canvas.
[]
CVE-2011-4896
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.
[ "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*" ]
GHSA-8887-2wp4-729w
PHP remote file inclusion vulnerability in includes/functions.inc.php in phpVoter 0.6 allows remote attackers to execute arbitrary PHP code via a URL in the sitepath parameter.
[]
CVE-2005-2987
SQL injection vulnerability in login.php in Digital Scribe 1.4 allows remote attackers to execute arbitrary SQL commands via the username parameter.
[ "cpe:2.3:a:digital_scribe:digital_scribe:1.4:*:*:*:*:*:*:*" ]
CVE-2018-4974
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2024-39704
Soft Circle French-Bread Melty Blood: Actress Again: Current Code through 1.07 Rev. 1.4.0 allows a remote attacker to execute arbitrary code on a client's machine via a crafted packet on TCP port 46318.
[ "cpe:2.3:a:unknown-corp:melty_blood_actress_again_current_code:*:*:*:*:*:*:*:*" ]
CVE-2019-19876
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An EnMon PHP script was vulnerable to SQL injection, a different vulnerability than CVE-2019-10006.
[ "cpe:2.3:a:br-automation:industrial_automation_aprol:*:*:*:*:*:*:*:*" ]