id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2024-0512
|
The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.87. This is due to missing or incorrect nonce validation on the add_to_wishlist function. This makes it possible for unauthenticated attackers to add items to user wishlists via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-rpc6-w47v-qqr6
|
CHMLib through 2bef8d0, as used in SumatraPDF and other products, has a chm_lib.c _chm_decompress_block integer overflow. There is a resultant heap-based buffer overflow in _chm_fetch_bytes.
|
[] |
|
GHSA-4j97-qmhm-9528
|
A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
|
[] |
|
GHSA-24m9-4jgr-2wjp
|
Unspecified vulnerability in the Siebel CRM component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Security.
|
[] |
|
CVE-2016-3565
|
Unspecified vulnerability in the Oracle Retail Order Broker component in Oracle Retail Applications 5.1 and 5.2 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to System Administration.
|
[
"cpe:2.3:a:oracle:retail_order_broker:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_order_broker:5.2:*:*:*:*:*:*:*"
] |
|
GHSA-xpfx-g9x8-6hx6
|
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockTraceLevelSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
|
[] |
|
CVE-2020-1766
|
Improper handling of uploaded inline images
|
Due to improper handling of uploaded images it is possible in very unlikely and rare conditions to force the agents browser to execute malicious javascript from a special crafted SVG file rendered as inline jpg file. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
|
[
"cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*",
"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
GHSA-9rp9-4vx9-p834
|
SAP Bank Account Management does not perform necessary authorization check for an authorized user, resulting in escalation of privileges. As a result, it has a low impact to confidentiality to the system.
|
[] |
|
CVE-2020-36364
|
An issue was discovered in Smartstore (aka SmartStoreNET) before 4.1.0. Administration/Controllers/ImportController.cs allows path traversal (for copy and delete actions) in the ImportController.Create method via a TempFileName field.
|
[
"cpe:2.3:a:smartstore:smartstorenet:*:*:*:*:*:*:*:*"
] |
|
GHSA-rxg5-5wmp-79m2
|
index.php in Gurock TestRail 5.3.0.3603 returns potentially sensitive information for an invalid request, as demonstrated by full path disclosure and the identification of PHP as the backend technology.
|
[] |
|
CVE-2024-9483
|
Uninitialized variable in digital signiture verification may crash the application
|
A null-pointer-dereference in the signature verification module in AVG/Avast Antivirus signature <24092400 released on 24/Sep/2024 on MacOS may allow a malformed xar file to crash the application during processing.
|
[
"cpe:2.3:a:avast:antivirus:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:avg:antivirus:*:*:*:*:*:macos:*:*"
] |
CVE-2016-5182
|
Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation in bitmap handling, which allowed a remote attacker to potentially exploit heap corruption via crafted HTML pages.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-rq57-fwfx-h5r3
|
Unspecified vulnerability in IBM Lotus Quickr 8.1 before 8.1.0.5 services for Lotus Domino allows remote authenticated users to cause a denial of service (daemon crash) by deleting an item that is accessed through a connector, aka SPR RELS7LARKR.
|
[] |
|
CVE-2023-22875
|
IBM Security QRadar SIEM information disclosure
|
IBM QRadar SIEM 7.4 and 7.5copies certificate key files used for SSL/TLS in the QRadar web user interface to managed hosts in the deployment that do not require that key. IBM X-Force ID: 244356.
|
[
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
GHSA-636m-5wm3-vw3x
|
Multiple unspecified vulnerabilities in Google Chrome before 29.0.1547.57 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
|
[] |
|
CVE-2005-0812
|
The web interface in NotifyLink 3.0 displays passwords in cleartext on the administrative page, which could allow remote attackers or local users to obtain sensitive information.
|
[
"cpe:2.3:a:notify_technology:notifylink:enterprise_server:*:*:*:*:*:*:*"
] |
|
GHSA-67wr-rj87-j8qx
|
Quick Heal Total Security before 19.0 allows attackers with local admin rights to modify sensitive anti virus settings via a brute-attack on the settings password.
|
[] |
|
GHSA-mpx2-gc6v-g7g7
|
A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Scheduled Cron Jobs feature.
|
[] |
|
CVE-2009-0229
|
The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka "Print Spooler Read File Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_2000:sp4:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:x32:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:x32:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:x64:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:gold:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:sp1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:sp3:*:*:*:*:*:*:*"
] |
|
CVE-2005-3298
|
Multiple buffer overflows in OpenWBEM on SuSE Linux 9 allow remote attackers to execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-2x7m-prqf-x77x
|
A vulnerability in the Session Initiation Protocol (SIP) call-handling functionality of Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware could allow an unauthenticated, remote attacker to cause an affected phone to reload unexpectedly, resulting in a temporary denial of service (DoS) condition. The vulnerability exists because the firmware of an affected phone incorrectly handles errors that could occur when an incoming phone call is not answered. An attacker could exploit this vulnerability by sending a set of maliciously crafted SIP packets to an affected phone. A successful exploit could allow the attacker to cause the affected phone to reload unexpectedly, resulting in a temporary DoS condition. This vulnerability affects Cisco IP Phone 6800, 7800, and 8800 Series Phones with Multiplatform Firmware if they are running a Multiplatform Firmware release prior to Release 11.1(2). Cisco Bug IDs: CSCvi24718.
|
[] |
|
GHSA-h9xm-4wcm-9hmh
|
e107_admin/banlist.php in e107 2.1.8 allows SQL injection via the old_ip parameter.
|
[] |
|
CVE-2022-41954
|
Temporary File Information Disclosure Vulnerability
|
MPXJ is an open source library to read and write project plans from a variety of file formats and databases. On Unix-like operating systems (not Windows or macos), MPXJ's use of `File.createTempFile(..)` results in temporary files being created with the permissions `-rw-r--r--`. This means that any other user on the system can read the contents of this file. When MPXJ is reading a schedule file which requires the creation of a temporary file or directory, a knowledgeable local user could locate these transient files while they are in use and would then be able to read the schedule being processed by MPXJ. The problem has been patched, MPXJ version 10.14.1 and later includes the necessary changes. Users unable to upgrade may set `java.io.tmpdir` to a directory to which only the user running the application has access will prevent other users from accessing these temporary files.
|
[
"cpe:2.3:a:mpxj:mpxj:*:*:*:*:*:*:*:*"
] |
CVE-2008-4137
|
PHP remote file inclusion vulnerability in footer.php in PHP-Crawler 0.8 allows remote attackers to execute arbitrary PHP code via a URL in the footer_file parameter.
|
[
"cpe:2.3:a:php_crawler:php_crawler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php_crawler:php_crawler:*:alpha:*:*:*:*:*:*"
] |
|
GHSA-m8pg-77c8-3wj6
|
A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.7.5, macOS Sonoma 14.7.5. An app may be able to access sensitive user data.
|
[] |
|
CVE-2022-34178
|
Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.
|
[
"cpe:2.3:a:jenkins:embeddable_build_status:2.0.3:*:*:*:*:jenkins:*:*"
] |
|
CVE-2010-2076
|
Apache CXF 2.0.x before 2.0.13, 2.1.x before 2.1.10, and 2.2.x before 2.2.9, as used in Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via a crafted DTD, as demonstrated by an entity declaration in a request to samples/wsdl_first_pure_xml, a similar issue to CVE-2010-1632.
|
[
"cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-23936
|
WordPress CC Circle Progress Bar plugin <= 1.0.0 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Harun R. Rayhan (Cr@zy Coder) CC Circle Progress Bar allows Stored XSS.This issue affects CC Circle Progress Bar: from n/a through 1.0.0.
|
[] |
CVE-2015-6618
|
Bluetooth in Android 4.4 and 5.x before 5.1.1 LMY48Z allows user-assisted remote attackers to execute arbitrary code by leveraging access to the local physical environment, aka internal bug 24595992.
|
[
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*"
] |
|
GHSA-842w-g3x4-648j
|
The web interface in McAfee Firewall Reporter before 5.1.0.13 does not properly implement cookie authentication, which allows remote attackers to obtain access, and disable anti-virus functionality, via an HTTP request.
|
[] |
|
CVE-2022-31684
|
Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may log request headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where logging at WARN level is enabled.
|
[
"cpe:2.3:a:pivotal:reactor_netty:*:*:*:*:*:*:*:*"
] |
|
GHSA-vj7x-j42w-v27g
|
The Meta Box – WordPress Custom Fields Framework plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom post meta values displayed through the plugin's shortcode in all versions up to, and including, 5.9.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
CVE-2004-1881
|
SQL injection vulnerability in (1) mailorder.asp or (2) payonline.asp in CactuShop 5.x allows remote attackers to execute arbitrary SQL commands via the strItems parameter.
|
[
"cpe:2.3:a:cactusoft:cactushop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cactusoft:cactushop:5.1:*:*:*:*:*:*:*"
] |
|
GHSA-6q8c-85p2-954c
|
In Progress Telerik UI for WPF versions prior to 2024 Q3 (2024.3.924), a code execution attack is possible through an insecure deserialization vulnerability.
|
[] |
|
GHSA-mf6g-2h9h-jw37
|
Cloud Foundry SMB Volume, versions prior to v2.0.3, accidentally outputs sensitive information to the logs. A remote user with access to the SMB Volume logs can discover the username and password for volumes that have been recently created, allowing the user to take control of the SMB Volume.
|
[] |
|
GHSA-7v8v-3xwh-j47p
|
An information disclosure vulnerability exists in the Rocket.Chat server fixed v3.13, v3.12.2 & v3.11.3 that allowed email addresses to be disclosed by enumeration and validation checks.
|
[] |
|
GHSA-68pq-wqvv-h959
|
Unspecified vulnerability in an ActiveX control in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.0 through 2.1.5 allows remote attackers to execute arbitrary code via unknown vectors.
|
[] |
|
CVE-2022-1614
|
WP-Email < 2.69.0 - Anti-Spam Protection Bypass via IP Spoofing
|
The WP-EMail WordPress plugin before 2.69.0 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based anti-spamming restrictions.
|
[
"cpe:2.3:a:wp-email_project:wp-email:*:*:*:*:*:wordpress:*:*"
] |
GHSA-5p32-vrmx-q8c6
|
alert.d/test.alert in mon 0.99.2 allows local users to overwrite arbitrary files via a symlink attack on the test.alert.log temporary file.
|
[] |
|
GHSA-2xmh-6vrf-q89v
|
An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31651010.
|
[] |
|
CVE-2017-2937
|
Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class, when using class inheritance. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-2448
|
VMware ESXi 3.5 through 5.0 and ESX 3.5 through 4.1 allow remote attackers to execute arbitrary code or cause a denial of service (memory overwrite) via NFS traffic.
|
[
"cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:3.5:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:3:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.0:4:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:4.1:2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:3.5:update1:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:3.5:update2:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:3.5:update3:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*"
] |
|
CVE-2018-6683
|
- Data Loss Prevention (DLP) for Windows - Exploiting Incorrectly Configured Access Control Security Levels vulnerability
|
Exploiting Incorrectly Configured Access Control Security Levels vulnerability in McAfee Data Loss Prevention (DLP) for Windows versions prior to 10.0.505 and 11.0.405 allows local users to bypass DLP policy via editing of local policy files when offline.
|
[
"cpe:2.3:a:mcafee:data_loss_prevention_endpoint:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2023-6930
|
Improper Access Control in EuroTel ETL3100
|
EuroTel ETL3100 versions v01c01 and v01x37 suffer from an unauthenticated configuration and log download vulnerability. This enables the attacker to disclose sensitive information and assist in authentication bypass, privilege escalation, and full system access.
|
[
"cpe:2.3:o:eurotel:etl3100_firmware:01c01:*:*:*:*:*:*:*",
"cpe:2.3:o:eurotel:etl3100_firmware:01x37:*:*:*:*:*:*:*",
"cpe:2.3:h:eurotel:etl3100:-:*:*:*:*:*:*:*"
] |
GHSA-jh94-6vqx-6xvm
|
An issue was discovered in Poppler 0.71.0. There is a NULL pointer dereference in goo/GooString.h, will lead to denial of service, as demonstrated by utils/pdfdetach.cc not validating a filename of an embedded file before constructing a save path.
|
[] |
|
GHSA-p5h7-fv48-95r8
|
Cross-site scripting (XSS) vulnerability in im.php in IMessenger for PHP-Nuke allows remote attackers to inject arbitrary web script or HTML via a message.
|
[] |
|
CVE-2022-23901
|
A stack overflow re2c 2.2 exists due to infinite recursion issues in src/dfa/dead_rules.cc.
|
[
"cpe:2.3:a:re2c:re2c:2.2:*:*:*:*:*:*:*"
] |
|
GHSA-p4xv-mj4j-5j9q
|
The integrated web server on Siemens SCALANCE X-200 switches with firmware before 4.5.0 and X-200IRT switches with firmware before 5.1.0 does not properly enforce authentication requirements, which allows remote attackers to perform administrative actions via requests to the management interface.
|
[] |
|
CVE-2024-4120
|
Tenda W15E modifyIpMacBind formIPMacBindModify stack-based overflow
|
A vulnerability was found in Tenda W15E 15.11.0.14. It has been rated as critical. This issue affects the function formIPMacBindModify of the file /goform/modifyIpMacBind. The manipulation of the argument IPMacBindRuleId/IPMacBindRuleIp/IPMacBindRuleMac/IPMacBindRuleRemark leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261863. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:h:tenda:w15e:-:*:*:*:*:*:*:*"
] |
CVE-2020-15609
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the service_stop parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9726.
|
[
"cpe:2.3:a:centos-webpanel:centos_web_panel:17.0.9.8.923:*:*:*:*:*:*:*"
] |
|
CVE-2021-3442
|
A flaw was found in the Red Hat OpenShift API Management product. User input is not validated allowing an authenticated user to inject scripts into some text boxes leading to a XSS attack. The highest threat from this vulnerability is to data confidentiality.
|
[
"cpe:2.3:a:redhat:openshift_api_management:2.9.1:*:*:*:*:*:*:*"
] |
|
GHSA-56vf-rqwg-h55c
|
An issue was discovered in LibSass through 3.5.4. A NULL pointer dereference was found in the function Sass::Inspect::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact.
|
[] |
|
GHSA-977g-q8w5-59p4
|
A vulnerability in the Cisco Jabber Guest Server could allow an unauthenticated, remote attacker to initiate connections to arbitrary hosts. More Information: CSCvc31635. Known Affected Releases: 10.6(9). Known Fixed Releases: 11.0(0).
|
[] |
|
GHSA-q98g-xp96-f3cm
|
PHP remote file inclusion vulnerability in search_wA.php in OpenPro 1.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the LIBPATH parameter.
|
[] |
|
GHSA-68gj-fr3h-542g
|
OpenVAS Manager v2.0.3 allows plugin remote code execution.
|
[] |
|
CVE-2007-2793
|
PHP remote file inclusion vulnerability in ImageImageMagick.php in Geeklog 2.x allows remote attackers to execute arbitrary PHP code via a URL in the glConf[path_system] parameter.
|
[
"cpe:2.3:a:geeklog:geeklog:2.x:*:*:*:*:*:*:*"
] |
|
CVE-2011-0471
|
The node-iteration implementation in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 does not properly handle pointers, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
|
[
"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-17416
|
A SQL injection vulnerability exists in zzcms v8.3 via the /admin/adclass.php bigclassid parameter.
|
[
"cpe:2.3:a:zzcms:zzcms:8.3:*:*:*:*:*:*:*"
] |
|
GHSA-5m66-hppq-vhmq
|
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
|
[] |
|
CVE-2022-27845
|
WordPress Plausible Analytics plugin <= 1.2.2 - Authenticated Stored Cross-Site Scripting (XSS) vulnerability
|
Authenticated (admin or higher user role) Stored Cross-Site Scripting (XSS) in PlausibleHQ Plausible Analytics (WordPress plugin) <= 1.2.2
|
[
"cpe:2.3:a:plausible:plausible_analytics:*:*:*:*:*:wordpress:*:*"
] |
CVE-2012-1936
|
The wp_create_nonce function in wp-includes/pluggable.php in WordPress 3.3.1 and earlier associates a nonce with a user account instead of a user session, which might make it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks on specific actions and objects by sniffing the network, as demonstrated by attacks against the wp-admin/admin-ajax.php and wp-admin/user-new.php scripts. NOTE: the vendor reportedly disputes the significance of this issue because wp_create_nonce operates as intended, even if it is arguably inconsistent with certain CSRF protection details advocated by external organizations
|
[
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.3:*:iis:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*"
] |
|
CVE-2023-23537
|
A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, watchOS 9.4, macOS Big Sur 11.7.5. An app may be able to read sensitive location information.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-2860
|
Directory traversal vulnerability in Avigilon Control Center (ACC) 4 before 4.12.0.54 and 5 before 5.4.2.22 allows remote attackers to read arbitrary files via a crafted help/ URL.
|
[
"cpe:2.3:a:avigilon:avigilon_control_center:*:*:*:*:*:*:*:*"
] |
|
GHSA-cxj5-9j38-qv4q
|
SQL injection vulnerability in the Konsultasi (com_konsultasi) component 1.0.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the sid parameter in a detail action to index.php.
|
[] |
|
CVE-2024-34100
|
Use-After-Free vulnerability in the latest Adobe Acrobat Reader DC when open malicious PDF file
|
Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_dc:-:*:*:*:pro:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:-:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:2020:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] |
GHSA-c2wq-x47x-v744
|
Reflected XSS in wordpress plugin tera-charts v1.0
|
[] |
|
GHSA-5533-3642-whwv
|
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK & Compiler before 18.0.0.180 allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2014-0578, CVE-2015-3115, CVE-2015-3125, and CVE-2015-5116.
|
[] |
|
GHSA-fg2g-p9qq-jw38
|
Pi-hole 5.0, 5.1, and 5.1.1 allows Session Fixation. The application does not generate a new session cookie after the user is logged in. A malicious user is able to create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the attacker access to the user's account through the active session.
|
[] |
|
CVE-2024-36495
|
Read/Write Permissions for Everyone on Configuration File
|
The application Faronics WINSelect (Standard + Enterprise) saves its configuration in an encrypted file on the file system which "Everyone" has read and write access to, path to file:
C:\ProgramData\WINSelect\WINSelect.wsd
The path for the affected WINSelect Enterprise configuration file is:
C:\ProgramData\Faronics\StorageSpace\WS\WINSelect.wsd
|
[
"cpe:2.3:a:faronics:winselect:*:*:*:*:*:*:*:*"
] |
GHSA-chw3-m944-9vc7
|
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Sante DICOM Viewer Pro 11.8.7.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DCM files. Crafted data in a DCM file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15099.
|
[] |
|
CVE-2023-45770
|
WordPress Fast WP Speed Plugin <= 1.0.0 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fastwpspeed Fast WP Speed plugin <= 1.0.0 versions.
|
[
"cpe:2.3:a:fastwpspeed:fast_wp_speed:*:*:*:*:*:wordpress:*:*"
] |
GHSA-q9hw-w9f9-xp3r
|
Cross-site scripting (XSS) vulnerability in cgi/b/ic/connect in the Thomson SpeedTouch 716 with firmware 5.4.0.14 allows remote attackers to inject arbitrary web script or HTML via the url parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] |
|
GHSA-mw36-6r6x-grr2
|
IBM Aspera Console 3.4.0 through 3.4.4is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.
|
[] |
|
GHSA-44ff-mrhx-mf5w
|
The _tokenize_matrix function in audio_out.c in Xiph.Org libao 1.2.0 allows remote attackers to cause a denial of service (memory corruption) via a crafted MP3 file.
|
[] |
|
CVE-2019-11452
|
whatsns 4.0 allows index.php?admin_category/remove.html cid[] SQL injection.
|
[
"cpe:2.3:a:whatsns:whatsns:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2016-0848
|
Race condition in Download Manager in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-04-01 allows attackers to bypass private-storage file-access restrictions via a crafted application that changes a symlink target, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26211054.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2011-5000
|
The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
|
[
"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.2.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.4p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.5p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.8.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:3.9.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.0p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.1p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.2p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.3p2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.4p1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:5.7:*:*:*:*:*:*:*"
] |
|
GHSA-pw7h-6fp2-pvmv
|
The Optimize Your Campaigns – Google Shopping – Google Ads – Google Adwords plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.1 due to the print_php_information.php being publicly accessible. This makes it possible for unauthenticated attackers to extract sensitive configuration data that can be leveraged in another attack.
|
[] |
|
CVE-2012-0576
|
Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 6.0.1 and 6.2.0 allows remote authenticated users to affect integrity via unknown vectors related to Core-Help.
|
[
"cpe:2.3:a:oracle:financial_services_software:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:6.2.0:*:*:*:*:*:*:*"
] |
|
GHSA-p4gw-2vrq-j64q
|
In Jp2Image::readMetadata() in jp2image.cpp in Exiv2 0.27.2, an input file can result in an infinite loop and hang, with high CPU consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
|
[] |
|
GHSA-c2fw-gwff-m58h
|
HP CentralView Fraud Risk Management 11.1, 11.2, and 11.3; CentralView Revenue Leakage Control 4.1, 4.2, and 4.3; CentralView Dealer Performance Audit 2.0 and 2.1; CentralView Credit Risk Control 2.1, 2.2, and 2.3; CentralView Roaming Fraud Control 2.1, 2.2, and 2.3; and CentralView Subscription Fraud Prevention 2.0 and 2.1 allow remote attackers to obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2015-5406 and CVE-2015-5407.
|
[] |
|
GHSA-rxmr-c9jm-7mm8
|
Exposure of Sensitive Information to an Unauthorized Actor in Apache hive
|
In Apache Hive 0.6.0 to 2.3.2, malicious user might use any xpath UDFs (xpath/xpath_string/xpath_boolean/xpath_number/xpath_double/xpath_float/xpath_long/xpath_int/xpath_short) to expose the content of a file on the machine running HiveServer2 owned by HiveServer2 user (usually hive) if hive.server2.enable.doAs=false.
|
[] |
CVE-2025-37745
|
PM: hibernate: Avoid deadlock in hibernate_compressor_param_set()
|
In the Linux kernel, the following vulnerability has been resolved:
PM: hibernate: Avoid deadlock in hibernate_compressor_param_set()
syzbot reported a deadlock in lock_system_sleep() (see below).
The write operation to "/sys/module/hibernate/parameters/compressor"
conflicts with the registration of ieee80211 device, resulting in a deadlock
when attempting to acquire system_transition_mutex under param_lock.
To avoid this deadlock, change hibernate_compressor_param_set() to use
mutex_trylock() for attempting to acquire system_transition_mutex and
return -EBUSY when it fails.
Task flags need not be saved or adjusted before calling
mutex_trylock(&system_transition_mutex) because the caller is not going
to end up waiting for this mutex and if it runs concurrently with system
suspend in progress, it will be frozen properly when it returns to user
space.
syzbot report:
syz-executor895/5833 is trying to acquire lock:
ffffffff8e0828c8 (system_transition_mutex){+.+.}-{4:4}, at: lock_system_sleep+0x87/0xa0 kernel/power/main.c:56
but task is already holding lock:
ffffffff8e07dc68 (param_lock){+.+.}-{4:4}, at: kernel_param_lock kernel/params.c:607 [inline]
ffffffff8e07dc68 (param_lock){+.+.}-{4:4}, at: param_attr_store+0xe6/0x300 kernel/params.c:586
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #3 (param_lock){+.+.}-{4:4}:
__mutex_lock_common kernel/locking/mutex.c:585 [inline]
__mutex_lock+0x19b/0xb10 kernel/locking/mutex.c:730
ieee80211_rate_control_ops_get net/mac80211/rate.c:220 [inline]
rate_control_alloc net/mac80211/rate.c:266 [inline]
ieee80211_init_rate_ctrl_alg+0x18d/0x6b0 net/mac80211/rate.c:1015
ieee80211_register_hw+0x20cd/0x4060 net/mac80211/main.c:1531
mac80211_hwsim_new_radio+0x304e/0x54e0 drivers/net/wireless/virtual/mac80211_hwsim.c:5558
init_mac80211_hwsim+0x432/0x8c0 drivers/net/wireless/virtual/mac80211_hwsim.c:6910
do_one_initcall+0x128/0x700 init/main.c:1257
do_initcall_level init/main.c:1319 [inline]
do_initcalls init/main.c:1335 [inline]
do_basic_setup init/main.c:1354 [inline]
kernel_init_freeable+0x5c7/0x900 init/main.c:1568
kernel_init+0x1c/0x2b0 init/main.c:1457
ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
-> #2 (rtnl_mutex){+.+.}-{4:4}:
__mutex_lock_common kernel/locking/mutex.c:585 [inline]
__mutex_lock+0x19b/0xb10 kernel/locking/mutex.c:730
wg_pm_notification drivers/net/wireguard/device.c:80 [inline]
wg_pm_notification+0x49/0x180 drivers/net/wireguard/device.c:64
notifier_call_chain+0xb7/0x410 kernel/notifier.c:85
notifier_call_chain_robust kernel/notifier.c:120 [inline]
blocking_notifier_call_chain_robust kernel/notifier.c:345 [inline]
blocking_notifier_call_chain_robust+0xc9/0x170 kernel/notifier.c:333
pm_notifier_call_chain_robust+0x27/0x60 kernel/power/main.c:102
snapshot_open+0x189/0x2b0 kernel/power/user.c:77
misc_open+0x35a/0x420 drivers/char/misc.c:179
chrdev_open+0x237/0x6a0 fs/char_dev.c:414
do_dentry_open+0x735/0x1c40 fs/open.c:956
vfs_open+0x82/0x3f0 fs/open.c:1086
do_open fs/namei.c:3830 [inline]
path_openat+0x1e88/0x2d80 fs/namei.c:3989
do_filp_open+0x20c/0x470 fs/namei.c:4016
do_sys_openat2+0x17a/0x1e0 fs/open.c:1428
do_sys_open fs/open.c:1443 [inline]
__do_sys_openat fs/open.c:1459 [inline]
__se_sys_openat fs/open.c:1454 [inline]
__x64_sys_openat+0x175/0x210 fs/open.c:1454
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
-> #1 ((pm_chain_head).rwsem){++++}-{4:4}:
down_read+0x9a/0x330 kernel/locking/rwsem.c:1524
blocking_notifier_call_chain_robust kerne
---truncated---
|
[] |
CVE-2019-1872
|
Cisco TelePresence Video Communication Server and Cisco Expressway Series Server-Side Request Forgery Vulnerability
|
A vulnerability in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway Series software could allow an unauthenticated, remote attacker to cause an affected system to send arbitrary network requests. The vulnerability is due to improper restrictions on network services in the affected software. An attacker could exploit this vulnerability by sending malicious requests to the affected system. A successful exploit could allow the attacker to send arbitrary network requests sourced from the affected system.
|
[
"cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*"
] |
CVE-2016-11039
|
An issue was discovered on Samsung mobile devices with KK(4.4), L(5.0/5.1), and M(6.0) (AP + CP MDM9x35, or Qualcomm Onechip) software. There is a NULL pointer dereference issue in the IPC socket code. The Samsung ID is SVE-2016-5980 (July 2016).
|
[
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-0617
|
Cisco ASR 5500 System Architecture Evolution (SAE) Gateway devices allow remote attackers to cause a denial of service (CPU consumption and SNMP outage) via malformed SNMP packets, aka Bug ID CSCur13393.
|
[
"cpe:2.3:a:cisco:asr_5000_series_software:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-10904
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-10464.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-14259
|
On the Polycom Obihai Obi1022 VoIP phone with firmware 5.1.11, a command injection (missing input validation) issue in the NTP server IP address field for the "Time Service Settings web" interface allows an authenticated remote attacker in the same network to trigger OS commands via shell commands in a POST request.
|
[
"cpe:2.3:o:polycom:obihai_obi1022_firmware:5.1.11:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:obihai_obi1022:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-4995
|
Protocol Downgrade in Wapro ERP Desktop
|
Wapro ERP Desktop is vulnerable to MS SQL protocol downgrade request from a server side, what could lead to an unencrypted communication vulnerable to data interception and modification. This issue affects Wapro ERP Desktop versions before 9.00.0.
|
[] |
GHSA-jf46-jf6f-38v2
|
Cross-site scripting (XSS) vulnerability in client_details.php in Proman Xpress 5.0.1 allows remote attackers to inject arbitrary web script or HTML via the cl_comments parameter. NOTE: some of these details are obtained from third party information.
|
[] |
|
CVE-2018-5096
|
A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Thunderbird < 52.6.
|
[
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
GHSA-h9fq-4hj4-g596
|
A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
|
[] |
|
GHSA-32r8-wpf6-r2gw
|
A vulnerability classified as critical was found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256951. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-rh57-387c-v987
|
A vulnerability, which was classified as problematic, has been found in EyouCMS up to 1.5.4. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument typename leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224750 is the identifier assigned to this vulnerability.
|
[] |
|
GHSA-8c63-c298-4546
|
libming v0.4.8 was discovered to contain a memory leak via the parseSWF_MORPHFILLSTYLES function.
|
[] |
|
GHSA-g8wv-2fpc-qgf8
|
Format string vulnerability in the php_snmp_error function in ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via format string specifiers in an SNMP::get call.
|
[] |
|
GHSA-26v6-j796-w9w7
|
A vulnerability, which was classified as critical, was found in VAM Virtual Airlines Manager up to 2.6.2. Affected is an unknown function of the file /vam/index.php of the component HTTP GET Parameter Handler. The manipulation of the argument ID/registry_id/plane_icao leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-cmfv-8pfm-mx7m
|
A vulnerability classified as critical has been found in SourceCodester Simple Task Managing System. This affects an unknown part of the file /loginVaLidation.php. The manipulation of the argument login leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-207423.
|
[] |
|
CVE-2005-4312
|
SQL injection vulnerability in index.php in AlmondSoft Almond Classifieds 5.02 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:almondsoft:almond_classifieds:5.02:*:*:*:*:*:*:*"
] |
|
GHSA-m755-gxxg-r5qh
|
Zope management interface vulnerable to stored cross site scripting via the title property
|
ImpactThe title property, available on most Zope objects, can be used to store script code that is executed while viewing the affected object in the Zope Management Interface (ZMI) because the title property is displayed unquoted in the breadcrumbs element. All versions of Zope 4 and Zope 5 are affected.PatchesPatches will be released with Zope versions 4.8.11 and 5.8.6.WorkaroundsMake sure only Manager users can edit and view Zope objects in the Zope Management Interface. This is the default.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.