id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
CVE-2022-34350
IBM API Connect security bypass
IBM API Connect 10.0.0.0 through 10.0.5.0, 10.0.1.0 through 10.0.1.7, and 2018.4.1.0 through 2018.4.1.20 is vulnerable to External Service Interaction attack, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to induce the application to perform server-side DNS lookups or HTTP requests to arbitrary domain names. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with. IBM X-Force ID: 230264.
[ "cpe:2.3:a:ibm:api_connect:*:*:*:*:*:*:*:*" ]
GHSA-pm8g-g665-8r7q
HCL XPages applications are susceptible to a Cross Site Request Forgery (CSRF) vulnerability. An unauthenticated attacker could exploit this vulnerability to perform actions in the application on behalf of the logged in user.
[]
GHSA-vwpr-mjg8-vhm9
Cross-site scripting (XSS) vulnerability in the MultiBlock module 6.x-1.x before 6.x-1.4 and 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the administer blocks permission to inject arbitrary web script or HTML via the block title.
[]
GHSA-p5xc-g9x9-74jh
In the Linux kernel, the following vulnerability has been resolved:md/raid1: Fix data corruption for degraded array with slow diskread_balance() will avoid reading from slow disks as much as possible, however, if valid data only lands in slow disks, and a new normal disk is still in recovery, unrecovered data can be read:raid1_read_request read_balance raid1_should_read_first -> return false choose_best_rdev -> normal disk is not recovered, return -1 choose_bb_rdev -> missing the checking of recovery, return the normal disk -> read unrecovered dataRoot cause is that the checking of recovery is missing in choose_bb_rdev(). Hence add such checking to fix the problem.Also fix similar problem in choose_slow_rdev().
[]
CVE-2014-2786
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2792 and CVE-2014-2813.
[ "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
CVE-2007-4593
Unspecified vulnerability in vstor2-ws60.sys in VMWare Workstation 6.0 allows local users to cause a denial of service (host operating system crash) via unspecified vectors, as demonstrated by the DC2 test suite, possibly a related issue to CVE-2007-4591. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*" ]
CVE-2017-8377
GeniXCMS 1.0.2 has SQL Injection in inc/lib/Control/Backend/menus.control.php via the menuid parameter.
[ "cpe:2.3:a:genixcms:genixcms:1.0.2:*:*:*:*:*:*:*" ]
GHSA-9c6m-8qcj-w423
Employee Performance Evaluation System v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server.
[]
CVE-2024-53138
net/mlx5e: kTLS, Fix incorrect page refcounting
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: kTLS, Fix incorrect page refcounting The kTLS tx handling code is using a mix of get_page() and page_ref_inc() APIs to increment the page reference. But on the release path (mlx5e_ktls_tx_handle_resync_dump_comp()), only put_page() is used. This is an issue when using pages from large folios: the get_page() references are stored on the folio page while the page_ref_inc() references are stored directly in the given page. On release the folio page will be dereferenced too many times. This was found while doing kTLS testing with sendfile() + ZC when the served file was read from NFS on a kernel with NFS large folios support (commit 49b29a573da8 ("nfs: add support for large folios")).
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*" ]
CVE-2020-29662
In Harbor 2.0 before 2.0.5 and 2.1.x before 2.1.2 the catalog’s registry API is exposed on an unauthenticated path.
[ "cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*" ]
CVE-2024-24267
gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function.
[ "cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*" ]
CVE-2020-35262
Cross Site Scripting (XSS) vulnerability in Digisol DG-HR3400 can be exploited via the NTP server name in Time and date module and "Keyword" in URL Filter.
[ "cpe:2.3:o:digisol:dg-hr3400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:digisol:dg-hr3400:-:*:*:*:*:*:*:*" ]
CVE-2018-7365
All versions up to ZXCLOUD iRAI V5.01.05 of the ZTE uSmartView product are impacted by untrusted search path vulnerability, which may allow an unauthorized user to perform unauthorized operations.
[ "cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*", "cpe:2.3:a:zte:usmartview:-:*:*:*:*:*:*:*" ]
GHSA-gh7c-cg3x-pmcr
pyftpdlib Use of Insufficiently Random Values of port selection on PASV command
pyftpdlib before 0.1.1 does not choose a random value for the port associated with the PASV command, which makes it easier for remote attackers to obtain potentially sensitive information about the number of in-progress data connections by reading the response to this command.
[]
CVE-2024-39496
btrfs: zoned: fix use-after-free due to race with dev replace
In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-free due to race with dev replace While loading a zone's info during creation of a block group, we can race with a device replace operation and then trigger a use-after-free on the device that was just replaced (source device of the replace operation). This happens because at btrfs_load_zone_info() we extract a device from the chunk map into a local variable and then use the device while not under the protection of the device replace rwsem. So if there's a device replace operation happening when we extract the device and that device is the source of the replace operation, we will trigger a use-after-free if before we finish using the device the replace operation finishes and frees the device. Fix this by enlarging the critical section under the protection of the device replace rwsem so that all uses of the device are done inside the critical section.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2017-16270
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_b, at 0x9d01679c, the value for the `s_sonos_cmd` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
[ "cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*", "cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*" ]
CVE-2020-26149
NATS nats.js before 2.0.0-209, nats.ws before 1.0.0-111, and nats.deno before 1.0.0-9 allow credential disclosure from a client to a server.
[ "cpe:2.3:a:linuxfoundation:nats.deno:*:*:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:nats.js:*:*:*:*:*:node.js:*:*", "cpe:2.3:a:linuxfoundation:nats.ws:*:*:*:*:*:*:*:*" ]
CVE-2025-3229
PHPGurukul Restaurant Table Booking System edit-subadmin.php sql injection
A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /edit-subadmin.php. The manipulation of the argument fullname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
GHSA-9723-j4pc-8jhh
Buffer overflow in 1st Up Mail Server 4.1 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long MAIL FROM command.
[]
GHSA-3w4p-5chr-2r8f
xterm through Patch #365 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
[]
GHSA-jwf7-c2x3-76h8
Apache CouchDB 0.8.0 through 0.10.1 allows remote attackers to obtain sensitive information by measuring the completion time of operations that verify (1) hashes or (2) passwords.
[]
CVE-2023-24511
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process.
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system.
[ "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*", "cpe:2.3:a:arista:ceos-lab:-:*:*:*:*:*:*:*", "cpe:2.3:a:arista:cloudeos:-:*:*:*:*:*:*:*", "cpe:2.3:a:arista:veos-lab:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7010t:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7010t-48:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7010tx-48:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7010tx-48-dc:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7020sr-24c2:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7020sr-32c2:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7020tr-48:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7020tra-48:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050cx3-32s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050cx3m-32s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050qx-32s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050qx2-32s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050sx-128:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050sx-64:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050sx-72q:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050sx2-128:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050sx2-72q:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050sx3-48c8:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050sx3-48yc:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050sx3-48yc12:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050sx3-48yc8:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050sx3-96yc8:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050tx-48:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050tx-64:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050tx-72q:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050tx2-128:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7050tx3-48c8:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7060cx-32s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7060cx2-32s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7060dx4-32:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7060px4-32:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7060sx2-48yc6:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7150s-24:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7150s-52:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7150s-64:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7150sc-24:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7150sc-64:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7160-32cq:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7160-48tc6:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7160-48yc6:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7170-32c:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7170-32cd:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7170-64c:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7170b-64c:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720df-48y:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720dp-24s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720dp-48s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720dt-24s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720dt-48s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720dt-48y:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720xp-24y6:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720xp-24zy4:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720xp-48y6:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720xp-48zc2:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:720xp-96zc2:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:722xpm-48y4:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:722xpm-48zy8:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7250qx-64:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7260cx:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7260cx3:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7260cx3-64:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7260qx:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7260qx-64:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr2ak-30:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr2k-60:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3-32d4:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3-32p4:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3-96:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3k-32d4:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3k-32p4:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280cr3k-96:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280dr3-24:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280dr3k-24:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280e:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280pr3-24:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280pr3k-24:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280r:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280r2:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280r3:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280sr3-48yc8:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7280sr3k-48yc8:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7300x-32q:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7300x-64s:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7300x-64t:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7300x3-32c:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7300x3-48yc4:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7304:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7308:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7316:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7320x-32c:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7368x4:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7388x5:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500e:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r2:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r3:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r3-24d:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r3-24p:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r3-36cq:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7500r3k-36cq:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3-36p:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3-48cq:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:7800r3k-48cq:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:ccs-750x-48thp:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:ccs-750x-48tp:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:ccs-750x-48zp:-:*:*:*:*:*:*:*", "cpe:2.3:h:arista:ccs-750x-48zxp:-:*:*:*:*:*:*:*" ]
GHSA-q7x4-5349-4gcf
In the Linux kernel, the following vulnerability has been resolved:ip: Fix a data-race around sysctl_ip_autobind_reuse.While reading sysctl_ip_autobind_reuse, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.
[]
CVE-2019-8600
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. A maliciously crafted SQL query may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
CVE-2006-3768
Integer underflow in filecpnt.exe in FileCOPA FTP Server 1.01 before 2006-07-21 allow remote authenticated users to execute arbitrary code via a long argument to the (1) CWD, (2) DELE, (3) MDTM, and (4) MKD commands, which triggers a stack-based buffer overflow.
[ "cpe:2.3:a:intervations:filecopa:1.01:*:*:*:*:*:*:*" ]
CVE-2020-10546
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
[ "cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*" ]
GHSA-grwq-5xxg-8mfg
A flaw was found in OpenShift. The existing Cross-Site Request Forgery (CSRF) protections in place do not properly protect GET requests, allowing for the creation of WebSockets via CSRF.
[]
GHSA-fxmg-2c5f-xhvq
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
GHSA-jqw4-2625-36jw
RE11S v1.11 was discovered to contain a command injection vulnerability via the command parameter at /goform/mp.
[]
CVE-2019-18641
Rock RMS before 1.8.6 mishandles vCard access control within the People/GetVCard/REST controller.
[ "cpe:2.3:a:sparkdevnetwork:rock_rms:*:*:*:*:*:*:*:*" ]
GHSA-mvhh-qc36-2778
Multiple buffer overflows in drivers/media/platform/msm/camera_v2/isp/msm_isp_util.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices allow attackers to gain privileges via a crafted application, aka Android internal bug 28749803 and Qualcomm internal bug CR514717.
[]
GHSA-mjmw-3m65-4c84
Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality.
[]
CVE-2024-40815
A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
[ "cpe:2.3:o:apple:watchos:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
GHSA-fqcv-rfp6-wv92
Microweber Cross-site Scripting vulnerability
Microweber 1.3.4 and prior is vulnerable to stored cross-site scripting via an alert on the `Editing` page. This issue is fixed in commit 42efa981a2239d042d910069952d6276497bdcf1.
[]
GHSA-7q8m-969g-prjp
forum.asp in bttlxeForum 2.0 allows remote attackers to obtain full path information via a certain hex-encoded argument to the page parameter, possibly due to a SQL injection vulnerability.
[]
GHSA-x8hw-99fp-gmh6
Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI) because TemplateClassResolver.SAFER_RESOLVER is not used in the FreeMarker configuration.
[]
GHSA-cpg3-5g4r-7vjm
MailEnable 1.5 015 through 1.5 018 allows remote attackers to cause a denial of service (crash) via a long USER string, possibly due to a buffer overflow.
[]
CVE-2022-32853
An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory.
[ "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*" ]
GHSA-56v2-82g7-86h7
Cross-site scripting (XSS) vulnerability in Cisco TelePresence Video Communication Server (VCS) X8.5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCut27635.
[]
GHSA-7xhf-frpm-r9fm
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
[]
GHSA-wqxf-447m-6f5f
Information exposure in MLflow
An issue in MLFlow versions 2.8.1 and before allows a remote attacker to obtain sensitive information via a crafted request to REST API.
[]
CVE-2018-14453
An issue was discovered in libgig 4.1.0. There is a heap-based buffer overflow in pData[1] access in the function store16 in helper.h.
[ "cpe:2.3:a:linuxsampler:libgig:4.1.0:*:*:*:*:*:*:*" ]
GHSA-rxpx-7fp6-7726
Multiple stack-based buffer overflows in urban before 1.5.3 allow local users to gain privileges via a long HOME environment variable to (1) config.cc, (2) game.cc, (3) highscor.cc, or (4) meny.cc.
[]
GHSA-hvj4-9777-32f9
HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21926, CVE-2022-21927.
[]
CVE-2014-9890
Off-by-one error in drivers/media/platform/msm/camera_v2/sensor/cci/msm_cci.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices allows attackers to gain privileges via a crafted application that sends an I2C command, aka Android internal bug 28770207 and Qualcomm internal bug CR529177.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
CVE-2008-5270
SQL injection vulnerability in view.topics.php in Yuhhu Superstar 2008 allows remote attackers to execute arbitrary SQL commands via the board parameter.
[ "cpe:2.3:a:wareziz:yuhhu_superstar_2008:_nil_:*:*:*:*:*:*:*" ]
GHSA-pv77-pr9x-9r7m
The AlT Monitoring plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to missing or incorrect nonce validation on the 'ALT_Monitoring_edit' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
CVE-2019-7935
A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to modify content page titles to inject malicious javascript.
[ "cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*", "cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*" ]
GHSA-w8ch-p5g4-xj7g
** DISPUTED ** WonderCMS 2.3.1 is vulnerable to an HTTP Host header injection attack. It uses user-entered values to redirect pages. NOTE: the vendor reports that exploitation is unlikely because the attack can only come from a local machine or from the administrator as a self attack.
[]
CVE-2023-41151
An uncaught exception issue discovered in Softing OPC UA C++ SDK before 6.30 for Windows operating system may cause the application to crash when the server wants to send an error packet, while socket is blocked on writing.
[ "cpe:2.3:a:softing:opc:*:*:*:*:*:*:*:*", "cpe:2.3:a:softing:opc_ua_c\\+\\+_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:a:softing:secure_integration_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2005-3022
Multiple SQL injection vulnerabilities in vBulletin 3.0.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) announcement parameter to announcement.php, (2) userid parameter to user.php, (3) calendar parameter to admincalendar.php, (4) cronid parameter to cronlog.php, (5) usergroupid parameter to email.php, (6) help parameter to help.php, (7) rvt parameter to language.php, (8) keep parameter to phrase.php, or (9) updateprofilepic parameter to usertools.php.
[ "cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*", "cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*" ]
CVE-2021-34790
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Application Level Gateway Bypass Vulnerabilities
Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming.
[ "cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5512-x_firmware:009.008:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5512-x_firmware:009.015:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5505_firmware:009.008:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5505_firmware:009.015:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5515-x_firmware:009.008:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5515-x_firmware:009.015:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5525-x_firmware:009.008:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5525-x_firmware:009.015:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5545-x_firmware:009.008:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5545-x_firmware:009.015:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5555-x_firmware:009.008:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5555-x_firmware:009.015:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5580_firmware:009.008:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5580_firmware:009.015:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5585-x_firmware:009.008:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asa_5585-x_firmware:009.015:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*" ]
CVE-2021-24744
WordPress Contact Forms by Cimatti < 1.4.12 - Admin+ Stored Cross-Site Scripting
The WordPress Contact Forms by Cimatti WordPress plugin before 1.4.12 does not sanitise and escape the Form Title before outputting it in some admin pages. which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.
[ "cpe:2.3:a:cimatti:contact_forms:*:*:*:*:*:wordpress:*:*" ]
CVE-2017-1000141
An issue was discovered in Mahara before 18.10.0. It mishandled user requests that could discontinue a user's ability to maintain their own account (changing username, changing primary email address, deleting account). The correct behavior was to either prompt them for their password and/or send a warning to their primary email address.
[ "cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*" ]
GHSA-7wjg-92rv-969v
A certain ActiveX control in the DivXBrowserPlugin (npdivx32.dll) in DivX Web Player, as distributed with DivX Player 1.3.0, allows remote attackers to cause a denial of service (Internet Explorer 7 crash) via large values to DivxWP.Resize, related to resizing images.
[]
GHSA-p7g9-f957-fr79
An issue was found in Genesys CIC Polycom phone provisioning TFTP Server all version allows a remote attacker to execute arbitrary code via the login crednetials to the TFTP server configuration page.
[]
CVE-2023-21085
In nci_snd_set_routing_cmd of nci_hmsgs.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-264879662
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
GHSA-34wv-v24v-vm88
An issue was discovered on Belkin Wemo Switch 28B WW_2.00.11057.PVT-OWRT-SNS devices. They allow remote attackers to cause a denial of service (persistent rules-processing outage) via a crafted ruleDbBody element in a StoreRules request to the upnp/control/rules1 URI, because database corruption occurs.
[]
GHSA-h5f7-qr3g-h455
Buffer overflow in the plugin in Apple QuickTime before 7.7.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted MIME type.
[]
GHSA-wrfg-qw24-93h8
When a BIG-IP PEM classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. This issue affects classification engines using signatures released between 09-08-2022 and 02-16-2023. See the table in the F5 Security Advisory for a complete list of affected classification signature files.  NOTE: Software versions which have reached End of Technical Support (EoTS) are not evaluated
[]
GHSA-4grv-37wf-jg36
Alpine Halo9 prh_l2_sar_data_ind Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.The specific flaw exists within the prh_l2_sar_data_ind function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root.Was ZDI-CAN-22945
[]
GHSA-7p49-jrwj-cxrj
Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
[]
CVE-2019-19456
A Reflected XSS was found in the server selection box inside the login page at: enginemanager/loginfailed.html in Wowza Streaming Engine <= 4.x.x. This issue was resolved in Wowza Streaming Engine 4.8.0.
[ "cpe:2.3:a:wowza:streaming_engine:*:*:*:*:*:*:*:*" ]
GHSA-52p9-v744-mwjj
Remote code execution in Kramdown
Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated.
[]
CVE-1999-1320
Vulnerability in Novell NetWare 3.x and earlier allows local users to gain privileges via packet spoofing.
[ "cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*" ]
GHSA-5qgc-vjvp-m7mj
H3C H3Cloud OS all versions allows SQL injection via the ear/grid_event sidx parameter.
[]
GHSA-6954-h5c8-m29f
Jenkins Lucene-Search Plugin vulnerable to reflected (XSS) cross-site scripting
Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not escape the search query parameter displayed on the search result page.This results in a reflected cross-site scripting (XSS) vulnerability.
[]
CVE-2007-6583
SQL injection vulnerability in admin/ops/findip/ajax/search.php in 1024 CMS 1.3.1 allows remote attackers to execute arbitrary SQL commands via the ip parameter.
[ "cpe:2.3:a:1024_cms:1024_cms:1.3.1:*:*:*:*:*:*:*" ]
GHSA-pgmp-52m7-9hfg
A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
[]
CVE-2023-1143
CVE-2023-1143
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
[ "cpe:2.3:a:deltaww:infrasuite_device_master:*:*:*:*:*:*:*:*" ]
GHSA-rjch-hj8f-vm5c
An issue was discovered in Zoho ManageEngine DataSecurity Plus before 5.0.1 5012. An exposed service allows a basic user ("Operator" access level) to access the configuration file of the mail server (except for the password).
[]
CVE-2006-4955
Directory traversal vulnerability in the downloadfile servlet in Neon WebMail for Java before 5.08 allows remote attackers to read arbitrary files via a .. (dot dot) sequence in the (1) savefolder and (2) savefilename parameters.
[ "cpe:2.3:a:neosys:neon_webmail:5.06:*:java:*:*:*:*:*", "cpe:2.3:a:neosys:neon_webmail:5.07:*:java:*:*:*:*:*" ]
CVE-2016-0254
IBM Cognos Business Intelligence 10.1 and 10.2 is vulnerable to a denial of service, caused by an XML External Entity Injection (XXE) error when processing XML data. A remote authenticated attacker could exploit this vulnerability to consume all available CPU resources and cause a denial of service. IBM X-Force ID: 110563.
[ "cpe:2.3:a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:*" ]
GHSA-6pmp-vh39-v2fh
A Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.6.0 and earlier allows attackers to Execute unauthorized code or commands via the action input during the activation of a FortiToken.
[]
GHSA-97wv-5vh3-mx28
Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28327, CVE-2021-28329, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434.
[]
GHSA-5mj6-4rmf-8cv8
SQL injection vulnerability found in PrestaSHp faqs v.3.1.6 allows a remote attacker to escalate privileges via the faqsBudgetModuleFrontController::displayAjaxGenerateBudget component.
[]
CVE-2020-1295
An elevation of privilege vulnerability exists in Microsoft SharePoint, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'.
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
CVE-2023-26855
The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
[ "cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*" ]
GHSA-g2mg-vmcx-3677
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setOpModeCfg. This vulnerability allows an attacker to execute arbitrary commands through the "hostName" parameter.
[]
GHSA-vfxh-2vqx-ggfv
A stored cross site scripting (XSS) vulnerability in the 'Add Page' feature of BlackCat CMS 1.3.6 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Title' parameter.
[]
CVE-2025-2248
WP-PManager <= 1.2 - Admin+ SQL Injection
The WP-PManager WordPress plugin through 1.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
[]
GHSA-9xm4-4cpx-rm88
A vulnerability in the Brocade Fabric OS before Brocade Fabric OS v9.0.1a, v8.2.3, v8.2.0_CBN4, and v7.4.2h could allow an authenticated CLI user to abuse the history command to write arbitrary content to files.
[]
CVE-2018-17988
LayerBB 1.1.1 and 1.1.3 has SQL Injection via the search.php search_query parameter.
[ "cpe:2.3:a:layerbb:layerbb:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:layerbb:layerbb:1.1.3:*:*:*:*:*:*:*" ]
CVE-2022-35674
Adobe FrameMaker SVG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
Adobe FrameMaker versions 2019 Update 8 (and earlier) and 2020 Update 4 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2020-24146
Directory traversal in the CM Download Manager (aka cm-download-manager) plugin 2.7.0 for WordPress allows authorized users to delete arbitrary files and possibly cause a denial of service via the fileName parameter in a deletescreenshot action.
[ "cpe:2.3:a:cminds:cm_download_manager:2.7.0:*:*:*:*:wordpress:*:*" ]
GHSA-8xhv-724q-h3f3
In notifyErrorForPendingRequests of QCamera3HWI.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-149995442
[]
CVE-2012-2936
Multiple cross-site scripting (XSS) vulnerabilities in Pligg CMS before 1.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) user or (2) page parameter to (a) admin/admin_comments.php or (b) admin/admin_links.php; or list parameter in a (3) move or (4) minimize action to (c) admin/admin_index.php.
[ "cpe:2.3:a:pligg:pligg_cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:9.9:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:9.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:9.9.0:beta:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:9.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:pligg:pligg_cms:9.9.5:beta:*:*:*:*:*:*" ]
CVE-2023-35907
IBM Aspera Faspex information disclosure
IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.
[ "cpe:2.3:a:ibm:aspera_faspex:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_faspex:5.0.10:*:*:*:*:*:*:*" ]
GHSA-42fm-7h9g-phq7
An unrestricted file upload vulnerability in upload.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data via the POST parameter filename. This can be used to place attacker controlled code on the file system that can then be executed. Further, the filename parameter is vulnerable to path traversal and allows the attacker to place the file anywhere on the system.
[]
GHSA-x9q5-6p8q-rxm7
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1675, CVE-2015-1695, CVE-2015-1696, CVE-2015-1697, and CVE-2015-1698.
[]
GHSA-7xvc-v44j-46fh
geokit-rails Command Injection vulnerability
Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value.**Note:**An attacker can use this vulnerability to execute commands on the host system.
[]
CVE-2024-12198
DWFX File Parsing Vulnerabilities in Autodesk Navisworks Desktop Software
A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
[]
GHSA-v47w-94g3-6958
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OSSL Module). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle HTTP Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle HTTP Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[]
GHSA-j224-87jg-chfr
Rejected reason: This is unused.
[]
GHSA-rv8c-xfq5-q5vr
Directory traversal vulnerability in the SQLJ.DB2_INSTALL_JAR stored procedure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to replace JAR files via unspecified vectors.
[]
GHSA-v684-4fqq-vwgc
Stack-based buffer overflow in Firebird before 2.0.4, and 2.1.x before 2.1.0 RC1, might allow remote attackers to execute arbitrary code via a long username.
[]
GHSA-8f34-8mjp-wwhv
In JetBrains YouTrack Mobile before 2021.2, access token protection on Android is incomplete.
[]
CVE-2011-3269
Lexmark X, W, T, E, C, 6500e, and 25xxN devices before 2011-11-15 allow attackers to obtain sensitive information via a hidden email address in a Scan To Email shortcut.
[ "cpe:2.3:o:lexmark:x950_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x950:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x952_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x952:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x954_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x954:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x940e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x940e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x945e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x945e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x925de_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x925de:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x860_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x860:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x862_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x862:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x864_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x864:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x850:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x852_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x852:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x854_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x854:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x792de_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x792de:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x782e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x782e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x772e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x772e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x734_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x734:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x736_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x736:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x738_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x738:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x650:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x644_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x644:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x646_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x646:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x642_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x642:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x548de_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x548de:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x546_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x546:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x543_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x543:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x544_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x544:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x46x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x46x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x422_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x422:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x36x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x36x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x34x_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x34x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:x264_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x264:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:w850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:w850:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:w840_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:w840:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:t656_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t656:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:t650_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t650:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:t652_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t652:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:t654_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t654:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:t640_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t640:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:t642_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t642:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:t644_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t644:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:t440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t440:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e462_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e462:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e460_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e460:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e450:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e350:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e340:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e342_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e342:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e330_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e332n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e332n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e234_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e234:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e234n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e234n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e360_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e360:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e260:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e250:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e240n_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e240n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e240_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e240:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e238_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e238:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e232_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e232:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e230_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e230:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:e120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e120:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c950_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c935dn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c935dn:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c925de_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c925de:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c920_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c920:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c792e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c792e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c789_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c789:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c782_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c782:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c770_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c770:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c772_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c772:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c760_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c760:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c762_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c762:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c734_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c734:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c736_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c736:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c546_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c546:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c540:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c530_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c532_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c532:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c534_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c534:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c520_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c522_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c522:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c524_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c524:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:c510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c510:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:6500e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:25xxn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:25xxn:-:*:*:*:*:*:*:*" ]
CVE-2019-0136
Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
[ "cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*" ]
GHSA-52jx-g6m5-h735
Fleet has SAML authentication vulnerability due to improper SAML response validation
ImpactIn vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to:Forge authentication assertions, potentially impersonating legitimate users.If Just-In-Time (JIT) provisioning is enabled, the attacker could provision a new administrative user account.If MDM enrollment is enabled, certain endpoints could be used to create new accounts tied to forged assertions.This could allow unauthorized access to Fleet, including administrative access, visibility into device data, and modification of configuration.PatchesThis issue is addressed in commit [fc96cc4](https://github.com/fleetdm/fleet/commit/fc96cc4e91047250afb12f65ad70e90b30a7fb1c) and is available in Fleet version 4.64.2.The following backport versions also address this issue:4.63.24.62.44.58.14.53.2WorkaroundsIf an immediate upgrade is not possible, Fleet users should temporarily disable [single-sign-on (SSO)](https://fleetdm.com/docs/deploy/single-sign-on-sso) and use password authentication.CreditThank you @hakivvi, as well as Jeffrey Hofmann and Colby Morgan from the Robinhood Red Team for finding and reporting this vulnerability using our [responsible disclosure process](https://github.com/fleetdm/fleet/blob/main/SECURITY.md).For more informationIf you have any questions or comments about this advisory:Email us at security@fleetdm.comJoin #fleet in [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw)
[]