id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2022-34350
|
IBM API Connect security bypass
|
IBM API Connect 10.0.0.0 through 10.0.5.0, 10.0.1.0 through 10.0.1.7, and 2018.4.1.0 through 2018.4.1.20 is vulnerable to External Service Interaction attack, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to induce the application to perform server-side DNS lookups or HTTP requests to arbitrary domain names. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with. IBM X-Force ID: 230264.
|
[
"cpe:2.3:a:ibm:api_connect:*:*:*:*:*:*:*:*"
] |
GHSA-pm8g-g665-8r7q
|
HCL XPages applications are susceptible to a Cross Site Request Forgery (CSRF) vulnerability. An unauthenticated attacker could exploit this vulnerability to perform actions in the application on behalf of the logged in user.
|
[] |
|
GHSA-vwpr-mjg8-vhm9
|
Cross-site scripting (XSS) vulnerability in the MultiBlock module 6.x-1.x before 6.x-1.4 and 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the administer blocks permission to inject arbitrary web script or HTML via the block title.
|
[] |
|
GHSA-p5xc-g9x9-74jh
|
In the Linux kernel, the following vulnerability has been resolved:md/raid1: Fix data corruption for degraded array with slow diskread_balance() will avoid reading from slow disks as much as possible,
however, if valid data only lands in slow disks, and a new normal disk
is still in recovery, unrecovered data can be read:raid1_read_request
read_balance
raid1_should_read_first
-> return false
choose_best_rdev
-> normal disk is not recovered, return -1
choose_bb_rdev
-> missing the checking of recovery, return the normal disk
-> read unrecovered dataRoot cause is that the checking of recovery is missing in
choose_bb_rdev(). Hence add such checking to fix the problem.Also fix similar problem in choose_slow_rdev().
|
[] |
|
CVE-2014-2786
|
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2792 and CVE-2014-2813.
|
[
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
CVE-2007-4593
|
Unspecified vulnerability in vstor2-ws60.sys in VMWare Workstation 6.0 allows local users to cause a denial of service (host operating system crash) via unspecified vectors, as demonstrated by the DC2 test suite, possibly a related issue to CVE-2007-4591. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:vmware:workstation:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-8377
|
GeniXCMS 1.0.2 has SQL Injection in inc/lib/Control/Backend/menus.control.php via the menuid parameter.
|
[
"cpe:2.3:a:genixcms:genixcms:1.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-9c6m-8qcj-w423
|
Employee Performance Evaluation System v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server.
|
[] |
|
CVE-2024-53138
|
net/mlx5e: kTLS, Fix incorrect page refcounting
|
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: kTLS, Fix incorrect page refcounting
The kTLS tx handling code is using a mix of get_page() and
page_ref_inc() APIs to increment the page reference. But on the release
path (mlx5e_ktls_tx_handle_resync_dump_comp()), only put_page() is used.
This is an issue when using pages from large folios: the get_page()
references are stored on the folio page while the page_ref_inc()
references are stored directly in the given page. On release the folio
page will be dereferenced too many times.
This was found while doing kTLS testing with sendfile() + ZC when the
served file was read from NFS on a kernel with NFS large folios support
(commit 49b29a573da8 ("nfs: add support for large folios")).
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*"
] |
CVE-2020-29662
|
In Harbor 2.0 before 2.0.5 and 2.1.x before 2.1.2 the catalog’s registry API is exposed on an unauthenticated path.
|
[
"cpe:2.3:a:linuxfoundation:harbor:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-24267
|
gpac v2.2.1 was discovered to contain a memory leak via the gfio_blob variable in the gf_fileio_from_blob function.
|
[
"cpe:2.3:a:gpac:gpac:2.2.1:*:*:*:*:*:*:*"
] |
|
CVE-2020-35262
|
Cross Site Scripting (XSS) vulnerability in Digisol DG-HR3400 can be exploited via the NTP server name in Time and date module and "Keyword" in URL Filter.
|
[
"cpe:2.3:o:digisol:dg-hr3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:digisol:dg-hr3400:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-7365
|
All versions up to ZXCLOUD iRAI V5.01.05 of the ZTE uSmartView product are impacted by untrusted search path vulnerability, which may allow an unauthorized user to perform unauthorized operations.
|
[
"cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zte:usmartview:-:*:*:*:*:*:*:*"
] |
|
GHSA-gh7c-cg3x-pmcr
|
pyftpdlib Use of Insufficiently Random Values of port selection on PASV command
|
pyftpdlib before 0.1.1 does not choose a random value for the port associated with the PASV command, which makes it easier for remote attackers to obtain potentially sensitive information about the number of in-progress data connections by reading the response to this command.
|
[] |
CVE-2024-39496
|
btrfs: zoned: fix use-after-free due to race with dev replace
|
In the Linux kernel, the following vulnerability has been resolved:
btrfs: zoned: fix use-after-free due to race with dev replace
While loading a zone's info during creation of a block group, we can race
with a device replace operation and then trigger a use-after-free on the
device that was just replaced (source device of the replace operation).
This happens because at btrfs_load_zone_info() we extract a device from
the chunk map into a local variable and then use the device while not
under the protection of the device replace rwsem. So if there's a device
replace operation happening when we extract the device and that device
is the source of the replace operation, we will trigger a use-after-free
if before we finish using the device the replace operation finishes and
frees the device.
Fix this by enlarging the critical section under the protection of the
device replace rwsem so that all uses of the device are done inside the
critical section.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2017-16270
|
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_b, at 0x9d01679c, the value for the `s_sonos_cmd` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
|
[
"cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-26149
|
NATS nats.js before 2.0.0-209, nats.ws before 1.0.0-111, and nats.deno before 1.0.0-9 allow credential disclosure from a client to a server.
|
[
"cpe:2.3:a:linuxfoundation:nats.deno:*:*:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:nats.js:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:linuxfoundation:nats.ws:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-3229
|
PHPGurukul Restaurant Table Booking System edit-subadmin.php sql injection
|
A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /edit-subadmin.php. The manipulation of the argument fullname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
|
[] |
GHSA-9723-j4pc-8jhh
|
Buffer overflow in 1st Up Mail Server 4.1 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long MAIL FROM command.
|
[] |
|
GHSA-3w4p-5chr-2r8f
|
xterm through Patch #365 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
|
[] |
|
GHSA-jwf7-c2x3-76h8
|
Apache CouchDB 0.8.0 through 0.10.1 allows remote attackers to obtain sensitive information by measuring the completion time of operations that verify (1) hashes or (2) passwords.
|
[] |
|
CVE-2023-24511
|
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process.
|
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system.
|
[
"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arista:ceos-lab:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arista:cloudeos:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arista:veos-lab:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7010t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7010t-48:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7010tx-48:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7010tx-48-dc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7020sr-24c2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7020sr-32c2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7020tr-48:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7020tra-48:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050cx3-32s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050cx3m-32s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050qx-32s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050qx2-32s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050sx-128:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050sx-64:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050sx-72q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050sx2-128:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050sx2-72q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050sx3-48c8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050sx3-48yc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050sx3-48yc12:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050sx3-48yc8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050sx3-96yc8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050tx-48:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050tx-64:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050tx-72q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050tx2-128:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7050tx3-48c8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7060cx-32s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7060cx2-32s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7060dx4-32:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7060px4-32:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7060sx2-48yc6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7150s-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7150s-52:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7150s-64:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7150sc-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7150sc-64:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7160-32cq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7160-48tc6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7160-48yc6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7170-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7170-32cd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7170-64c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7170b-64c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720df-48y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720dp-24s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720dp-48s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720dt-24s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720dt-48s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720dt-48y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720xp-24y6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720xp-24zy4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720xp-48y6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720xp-48zc2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:720xp-96zc2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:722xpm-48y4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:722xpm-48zy8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7250qx-64:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7260cx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7260cx3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7260cx3-64:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7260qx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7260qx-64:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr2ak-30:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr2k-60:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3-32d4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3-32p4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3-96:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3k-32d4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3k-32p4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3k-96:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280dr3-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280dr3k-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280pr3-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280pr3k-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280r2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280r3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280sr3-48yc8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280sr3k-48yc8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7300x-32q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7300x-64s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7300x-64t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7300x3-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7300x3-48yc4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7304:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7308:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7316:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7320x-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7368x4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7388x5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r3-24d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r3-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r3-36cq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r3k-36cq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3-36p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3-48cq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3k-48cq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:ccs-750x-48thp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:ccs-750x-48tp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:ccs-750x-48zp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:ccs-750x-48zxp:-:*:*:*:*:*:*:*"
] |
GHSA-q7x4-5349-4gcf
|
In the Linux kernel, the following vulnerability has been resolved:ip: Fix a data-race around sysctl_ip_autobind_reuse.While reading sysctl_ip_autobind_reuse, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
|
[] |
|
CVE-2019-8600
|
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. A maliciously crafted SQL query may lead to arbitrary code execution.
|
[
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-3768
|
Integer underflow in filecpnt.exe in FileCOPA FTP Server 1.01 before 2006-07-21 allow remote authenticated users to execute arbitrary code via a long argument to the (1) CWD, (2) DELE, (3) MDTM, and (4) MKD commands, which triggers a stack-based buffer overflow.
|
[
"cpe:2.3:a:intervations:filecopa:1.01:*:*:*:*:*:*:*"
] |
|
CVE-2020-10546
|
rConfig 3.9.4 and previous versions has unauthenticated compliancepolicies.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
|
[
"cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*"
] |
|
GHSA-grwq-5xxg-8mfg
|
A flaw was found in OpenShift. The existing Cross-Site Request Forgery (CSRF) protections in place do not properly protect GET requests, allowing for the creation of WebSockets via CSRF.
|
[] |
|
GHSA-fxmg-2c5f-xhvq
|
Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[] |
|
GHSA-jqw4-2625-36jw
|
RE11S v1.11 was discovered to contain a command injection vulnerability via the command parameter at /goform/mp.
|
[] |
|
CVE-2019-18641
|
Rock RMS before 1.8.6 mishandles vCard access control within the People/GetVCard/REST controller.
|
[
"cpe:2.3:a:sparkdevnetwork:rock_rms:*:*:*:*:*:*:*:*"
] |
|
GHSA-mvhh-qc36-2778
|
Multiple buffer overflows in drivers/media/platform/msm/camera_v2/isp/msm_isp_util.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices allow attackers to gain privileges via a crafted application, aka Android internal bug 28749803 and Qualcomm internal bug CR514717.
|
[] |
|
GHSA-mjmw-3m65-4c84
|
Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality.
|
[] |
|
CVE-2024-40815
|
A race condition was addressed with additional validation. This issue is fixed in macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, macOS Sonoma 14.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
|
[
"cpe:2.3:o:apple:watchos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-fqcv-rfp6-wv92
|
Microweber Cross-site Scripting vulnerability
|
Microweber 1.3.4 and prior is vulnerable to stored cross-site scripting via an alert on the `Editing` page. This issue is fixed in commit 42efa981a2239d042d910069952d6276497bdcf1.
|
[] |
GHSA-7q8m-969g-prjp
|
forum.asp in bttlxeForum 2.0 allows remote attackers to obtain full path information via a certain hex-encoded argument to the page parameter, possibly due to a SQL injection vulnerability.
|
[] |
|
GHSA-x8hw-99fp-gmh6
|
Halo before 1.2.0-beta.1 allows Server Side Template Injection (SSTI) because TemplateClassResolver.SAFER_RESOLVER is not used in the FreeMarker configuration.
|
[] |
|
GHSA-cpg3-5g4r-7vjm
|
MailEnable 1.5 015 through 1.5 018 allows remote attackers to cause a denial of service (crash) via a long USER string, possibly due to a buffer overflow.
|
[] |
|
CVE-2022-32853
|
An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory.
|
[
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*"
] |
|
GHSA-56v2-82g7-86h7
|
Cross-site scripting (XSS) vulnerability in Cisco TelePresence Video Communication Server (VCS) X8.5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCut27635.
|
[] |
|
GHSA-7xhf-frpm-r9fm
|
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
|
[] |
|
GHSA-wqxf-447m-6f5f
|
Information exposure in MLflow
|
An issue in MLFlow versions 2.8.1 and before allows a remote attacker to obtain sensitive information via a crafted request to REST API.
|
[] |
CVE-2018-14453
|
An issue was discovered in libgig 4.1.0. There is a heap-based buffer overflow in pData[1] access in the function store16 in helper.h.
|
[
"cpe:2.3:a:linuxsampler:libgig:4.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-rxpx-7fp6-7726
|
Multiple stack-based buffer overflows in urban before 1.5.3 allow local users to gain privileges via a long HOME environment variable to (1) config.cc, (2) game.cc, (3) highscor.cc, or (4) meny.cc.
|
[] |
|
GHSA-hvj4-9777-32f9
|
HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21926, CVE-2022-21927.
|
[] |
|
CVE-2014-9890
|
Off-by-one error in drivers/media/platform/msm/camera_v2/sensor/cci/msm_cci.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices allows attackers to gain privileges via a crafted application that sends an I2C command, aka Android internal bug 28770207 and Qualcomm internal bug CR529177.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-5270
|
SQL injection vulnerability in view.topics.php in Yuhhu Superstar 2008 allows remote attackers to execute arbitrary SQL commands via the board parameter.
|
[
"cpe:2.3:a:wareziz:yuhhu_superstar_2008:_nil_:*:*:*:*:*:*:*"
] |
|
GHSA-pv77-pr9x-9r7m
|
The AlT Monitoring plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to missing or incorrect nonce validation on the 'ALT_Monitoring_edit' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] |
|
CVE-2019-7935
|
A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to modify content page titles to inject malicious javascript.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*"
] |
|
GHSA-w8ch-p5g4-xj7g
|
** DISPUTED ** WonderCMS 2.3.1 is vulnerable to an HTTP Host header injection attack. It uses user-entered values to redirect pages. NOTE: the vendor reports that exploitation is unlikely because the attack can only come from a local machine or from the administrator as a self attack.
|
[] |
|
CVE-2023-41151
|
An uncaught exception issue discovered in Softing OPC UA C++ SDK before 6.30 for Windows operating system may cause the application to crash when the server wants to send an error packet, while socket is blocked on writing.
|
[
"cpe:2.3:a:softing:opc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:softing:opc_ua_c\\+\\+_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:softing:secure_integration_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2005-3022
|
Multiple SQL injection vulnerabilities in vBulletin 3.0.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) announcement parameter to announcement.php, (2) userid parameter to user.php, (3) calendar parameter to admincalendar.php, (4) cronid parameter to cronlog.php, (5) usergroupid parameter to email.php, (6) help parameter to help.php, (7) rvt parameter to language.php, (8) keep parameter to phrase.php, or (9) updateprofilepic parameter to usertools.php.
|
[
"cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*",
"cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*"
] |
|
CVE-2021-34790
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Application Level Gateway Bypass Vulnerabilities
|
Multiple vulnerabilities in the Application Level Gateway (ALG) for the Network Address Translation (NAT) feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the ALG and open unauthorized connections with a host located behind the ALG. For more information about these vulnerabilities, see the Details section of this advisory. Note: These vulnerabilities have been publicly discussed as NAT Slipstreaming.
|
[
"cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5512-x_firmware:009.008:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5512-x_firmware:009.015:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5505_firmware:009.008:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5505_firmware:009.015:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5515-x_firmware:009.008:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5515-x_firmware:009.015:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5525-x_firmware:009.008:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5525-x_firmware:009.015:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5545-x_firmware:009.008:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5545-x_firmware:009.015:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5555-x_firmware:009.008:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5555-x_firmware:009.015:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5580_firmware:009.008:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5580_firmware:009.015:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5585-x_firmware:009.008:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asa_5585-x_firmware:009.015:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*"
] |
CVE-2021-24744
|
WordPress Contact Forms by Cimatti < 1.4.12 - Admin+ Stored Cross-Site Scripting
|
The WordPress Contact Forms by Cimatti WordPress plugin before 1.4.12 does not sanitise and escape the Form Title before outputting it in some admin pages. which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.
|
[
"cpe:2.3:a:cimatti:contact_forms:*:*:*:*:*:wordpress:*:*"
] |
CVE-2017-1000141
|
An issue was discovered in Mahara before 18.10.0. It mishandled user requests that could discontinue a user's ability to maintain their own account (changing username, changing primary email address, deleting account). The correct behavior was to either prompt them for their password and/or send a warning to their primary email address.
|
[
"cpe:2.3:a:mahara:mahara:*:*:*:*:*:*:*:*"
] |
|
GHSA-7wjg-92rv-969v
|
A certain ActiveX control in the DivXBrowserPlugin (npdivx32.dll) in DivX Web Player, as distributed with DivX Player 1.3.0, allows remote attackers to cause a denial of service (Internet Explorer 7 crash) via large values to DivxWP.Resize, related to resizing images.
|
[] |
|
GHSA-p7g9-f957-fr79
|
An issue was found in Genesys CIC Polycom phone provisioning TFTP Server all version allows a remote attacker to execute arbitrary code via the login crednetials to the TFTP server configuration page.
|
[] |
|
CVE-2023-21085
|
In nci_snd_set_routing_cmd of nci_hmsgs.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-264879662
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
GHSA-34wv-v24v-vm88
|
An issue was discovered on Belkin Wemo Switch 28B WW_2.00.11057.PVT-OWRT-SNS devices. They allow remote attackers to cause a denial of service (persistent rules-processing outage) via a crafted ruleDbBody element in a StoreRules request to the upnp/control/rules1 URI, because database corruption occurs.
|
[] |
|
GHSA-h5f7-qr3g-h455
|
Buffer overflow in the plugin in Apple QuickTime before 7.7.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted MIME type.
|
[] |
|
GHSA-wrfg-qw24-93h8
|
When a BIG-IP PEM classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. This issue affects classification engines using signatures released between 09-08-2022 and 02-16-2023. See the table in the F5 Security Advisory for a complete list of affected classification signature files. NOTE: Software versions which have reached End of Technical Support (EoTS) are not evaluated
|
[] |
|
GHSA-4grv-37wf-jg36
|
Alpine Halo9 prh_l2_sar_data_ind Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.The specific flaw exists within the prh_l2_sar_data_ind function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root.Was ZDI-CAN-22945
|
[] |
|
GHSA-7p49-jrwj-cxrj
|
Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
|
[] |
|
CVE-2019-19456
|
A Reflected XSS was found in the server selection box inside the login page at: enginemanager/loginfailed.html in Wowza Streaming Engine <= 4.x.x. This issue was resolved in Wowza Streaming Engine 4.8.0.
|
[
"cpe:2.3:a:wowza:streaming_engine:*:*:*:*:*:*:*:*"
] |
|
GHSA-52p9-v744-mwjj
|
Remote code execution in Kramdown
|
Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated.
|
[] |
CVE-1999-1320
|
Vulnerability in Novell NetWare 3.x and earlier allows local users to gain privileges via packet spoofing.
|
[
"cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*"
] |
|
GHSA-5qgc-vjvp-m7mj
|
H3C H3Cloud OS all versions allows SQL injection via the ear/grid_event sidx parameter.
|
[] |
|
GHSA-6954-h5c8-m29f
|
Jenkins Lucene-Search Plugin vulnerable to reflected (XSS) cross-site scripting
|
Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not escape the search query parameter displayed on the search result page.This results in a reflected cross-site scripting (XSS) vulnerability.
|
[] |
CVE-2007-6583
|
SQL injection vulnerability in admin/ops/findip/ajax/search.php in 1024 CMS 1.3.1 allows remote attackers to execute arbitrary SQL commands via the ip parameter.
|
[
"cpe:2.3:a:1024_cms:1024_cms:1.3.1:*:*:*:*:*:*:*"
] |
|
GHSA-pgmp-52m7-9hfg
|
A vulnerability in a specific REST API method of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
|
[] |
|
CVE-2023-1143
|
CVE-2023-1143
|
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
|
[
"cpe:2.3:a:deltaww:infrasuite_device_master:*:*:*:*:*:*:*:*"
] |
GHSA-rjch-hj8f-vm5c
|
An issue was discovered in Zoho ManageEngine DataSecurity Plus before 5.0.1 5012. An exposed service allows a basic user ("Operator" access level) to access the configuration file of the mail server (except for the password).
|
[] |
|
CVE-2006-4955
|
Directory traversal vulnerability in the downloadfile servlet in Neon WebMail for Java before 5.08 allows remote attackers to read arbitrary files via a .. (dot dot) sequence in the (1) savefolder and (2) savefilename parameters.
|
[
"cpe:2.3:a:neosys:neon_webmail:5.06:*:java:*:*:*:*:*",
"cpe:2.3:a:neosys:neon_webmail:5.07:*:java:*:*:*:*:*"
] |
|
CVE-2016-0254
|
IBM Cognos Business Intelligence 10.1 and 10.2 is vulnerable to a denial of service, caused by an XML External Entity Injection (XXE) error when processing XML data. A remote authenticated attacker could exploit this vulnerability to consume all available CPU resources and cause a denial of service. IBM X-Force ID: 110563.
|
[
"cpe:2.3:a:ibm:cognos_business_intelligence:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_business_intelligence:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_business_intelligence:10.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:*"
] |
|
GHSA-6pmp-vh39-v2fh
|
A Cross-Site Scripting vulnerability in Fortinet FortiOS versions 5.6.0 and earlier allows attackers to Execute unauthorized code or commands via the action input during the activation of a FortiToken.
|
[] |
|
GHSA-97wv-5vh3-mx28
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28327, CVE-2021-28329, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434.
|
[] |
|
GHSA-5mj6-4rmf-8cv8
|
SQL injection vulnerability found in PrestaSHp faqs v.3.1.6 allows a remote attacker to escalate privileges via the faqsBudgetModuleFrontController::displayAjaxGenerateBudget component.
|
[] |
|
CVE-2020-1295
|
An elevation of privilege vulnerability exists in Microsoft SharePoint, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'.
|
[
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] |
|
CVE-2023-26855
|
The hashing algorithm of ChurchCRM v4.5.3 utilizes a non-random salt value which allows attackers to use precomputed hash tables or dictionary attacks to crack the hashed passwords.
|
[
"cpe:2.3:a:churchcrm:churchcrm:4.5.3:*:*:*:*:*:*:*"
] |
|
GHSA-g2mg-vmcx-3677
|
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setOpModeCfg. This vulnerability allows an attacker to execute arbitrary commands through the "hostName" parameter.
|
[] |
|
GHSA-vfxh-2vqx-ggfv
|
A stored cross site scripting (XSS) vulnerability in the 'Add Page' feature of BlackCat CMS 1.3.6 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Title' parameter.
|
[] |
|
CVE-2025-2248
|
WP-PManager <= 1.2 - Admin+ SQL Injection
|
The WP-PManager WordPress plugin through 1.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
|
[] |
GHSA-9xm4-4cpx-rm88
|
A vulnerability in the Brocade Fabric OS before Brocade Fabric OS v9.0.1a, v8.2.3, v8.2.0_CBN4, and v7.4.2h could allow an authenticated CLI user to abuse the history command to write arbitrary content to files.
|
[] |
|
CVE-2018-17988
|
LayerBB 1.1.1 and 1.1.3 has SQL Injection via the search.php search_query parameter.
|
[
"cpe:2.3:a:layerbb:layerbb:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:layerbb:layerbb:1.1.3:*:*:*:*:*:*:*"
] |
|
CVE-2022-35674
|
Adobe FrameMaker SVG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
|
Adobe FrameMaker versions 2019 Update 8 (and earlier) and 2020 Update 4 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2020-24146
|
Directory traversal in the CM Download Manager (aka cm-download-manager) plugin 2.7.0 for WordPress allows authorized users to delete arbitrary files and possibly cause a denial of service via the fileName parameter in a deletescreenshot action.
|
[
"cpe:2.3:a:cminds:cm_download_manager:2.7.0:*:*:*:*:wordpress:*:*"
] |
|
GHSA-8xhv-724q-h3f3
|
In notifyErrorForPendingRequests of QCamera3HWI.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-149995442
|
[] |
|
CVE-2012-2936
|
Multiple cross-site scripting (XSS) vulnerabilities in Pligg CMS before 1.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) user or (2) page parameter to (a) admin/admin_comments.php or (b) admin/admin_links.php; or list parameter in a (3) move or (4) minimize action to (c) admin/admin_index.php.
|
[
"cpe:2.3:a:pligg:pligg_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:9.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:9.9.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:9.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pligg:pligg_cms:9.9.5:beta:*:*:*:*:*:*"
] |
|
CVE-2023-35907
|
IBM Aspera Faspex information disclosure
|
IBM Aspera Faspex 5.0.0 through 5.0.10 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts.
|
[
"cpe:2.3:a:ibm:aspera_faspex:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_faspex:5.0.10:*:*:*:*:*:*:*"
] |
GHSA-42fm-7h9g-phq7
|
An unrestricted file upload vulnerability in upload.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data via the POST parameter filename. This can be used to place attacker controlled code on the file system that can then be executed. Further, the filename parameter is vulnerable to path traversal and allows the attacker to place the file anywhere on the system.
|
[] |
|
GHSA-x9q5-6p8q-rxm7
|
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted Journal file, aka "Windows Journal Remote Code Execution Vulnerability," a different vulnerability than CVE-2015-1675, CVE-2015-1695, CVE-2015-1696, CVE-2015-1697, and CVE-2015-1698.
|
[] |
|
GHSA-7xvc-v44j-46fh
|
geokit-rails Command Injection vulnerability
|
Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value.**Note:**An attacker can use this vulnerability to execute commands on the host system.
|
[] |
CVE-2024-12198
|
DWFX File Parsing Vulnerabilities in Autodesk Navisworks Desktop Software
|
A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.
|
[] |
GHSA-v47w-94g3-6958
|
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: OSSL Module). Supported versions that are affected are 11.1.1.9.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle HTTP Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle HTTP Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
|
[] |
|
GHSA-j224-87jg-chfr
|
Rejected reason: This is unused.
|
[] |
|
GHSA-rv8c-xfq5-q5vr
|
Directory traversal vulnerability in the SQLJ.DB2_INSTALL_JAR stored procedure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to replace JAR files via unspecified vectors.
|
[] |
|
GHSA-v684-4fqq-vwgc
|
Stack-based buffer overflow in Firebird before 2.0.4, and 2.1.x before 2.1.0 RC1, might allow remote attackers to execute arbitrary code via a long username.
|
[] |
|
GHSA-8f34-8mjp-wwhv
|
In JetBrains YouTrack Mobile before 2021.2, access token protection on Android is incomplete.
|
[] |
|
CVE-2011-3269
|
Lexmark X, W, T, E, C, 6500e, and 25xxN devices before 2011-11-15 allow attackers to obtain sensitive information via a hidden email address in a Scan To Email shortcut.
|
[
"cpe:2.3:o:lexmark:x950_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x952_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x952:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x954_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x954:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x940e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x940e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x945e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x945e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x925de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x925de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x860_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x860:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x862_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x862:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x864_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x864:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x854_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x854:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x792de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x792de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x782e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x782e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x772e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x772e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x734_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x734:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x736_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x736:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x738_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x738:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x644_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x644:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x646_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x646:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x642_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x642:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x548de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x548de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x546_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x546:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x544_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x544:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x46x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x46x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x422_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x422:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x36x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x36x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x34x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x34x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x264_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x264:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:w850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:w850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:w840_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:w840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t656_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t656:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t652_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t642_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t642:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t644_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t644:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t440_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e462_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e462:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e342_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e342:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e330_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e332n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e332n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e234_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e234:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e234n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e234n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e360_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e240n_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e240n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e238_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e238:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e232_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e232:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e230_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c950_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c935dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c935dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c925de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c925de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c920_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c792e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c792e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c789_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c789:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c782_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c782:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c770_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c770:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c772_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c772:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c760_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c760:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c762_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c762:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c734_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c734:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c736_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c736:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c546_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c546:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c540_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c530_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c532_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c534_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c534:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c520_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c522_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c524_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c524:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:6500e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:25xxn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:25xxn:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-0136
|
Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
|
[
"cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*"
] |
|
GHSA-52jx-g6m5-h735
|
Fleet has SAML authentication vulnerability due to improper SAML response validation
|
ImpactIn vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to:Forge authentication assertions, potentially impersonating legitimate users.If Just-In-Time (JIT) provisioning is enabled, the attacker could provision a new administrative user account.If MDM enrollment is enabled, certain endpoints could be used to create new accounts tied to forged assertions.This could allow unauthorized access to Fleet, including administrative access, visibility into device data, and modification of configuration.PatchesThis issue is addressed in commit [fc96cc4](https://github.com/fleetdm/fleet/commit/fc96cc4e91047250afb12f65ad70e90b30a7fb1c) and is available in Fleet version 4.64.2.The following backport versions also address this issue:4.63.24.62.44.58.14.53.2WorkaroundsIf an immediate upgrade is not possible, Fleet users should temporarily disable [single-sign-on (SSO)](https://fleetdm.com/docs/deploy/single-sign-on-sso) and use password authentication.CreditThank you @hakivvi, as well as Jeffrey Hofmann and Colby Morgan from the Robinhood Red Team for finding and reporting this vulnerability using our [responsible disclosure process](https://github.com/fleetdm/fleet/blob/main/SECURITY.md).For more informationIf you have any questions or comments about this advisory:Email us at security@fleetdm.comJoin #fleet in [osquery Slack](https://join.slack.com/t/osquery/shared_invite/zt-h29zm0gk-s2DBtGUTW4CFel0f0IjTEw)
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.