id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
12.4k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2018-13573 | The mintToken function of a smart contract implementation for TripPay, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:trippay_project:trippay:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-34292 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Tiff_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing TIFF files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12959) | [
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
] |
|
CVE-2010-3611 | ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field. | [
"cpe:2.3:a:isc:dhcp:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.0.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.0.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.1:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.1:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*"
] |
|
GHSA-vhg5-556r-83fw | In Progress Flowmon before 12.2.0, an application endpoint failed to sanitize user-supplied input. A threat actor could leverage a reflected XSS vulnerability to execute arbitrary code within the context of a Flowmon user's web browser. | [] |
|
CVE-2017-14714 | In EPESI 1.8.2 rev20170830, there is Stored XSS in the Phonecalls Subject parameter. | [
"cpe:2.3:a:telaxius:epesi:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-28046 | An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch. | [
"cpe:2.3:o:pax:prolinos:*:*:*:*:*:*:*:*"
] |
|
GHSA-527m-px5j-w6x7 | Innokas Yhtymä Oy Vital Signs Monitor VC150 prior to Version 1.7.15 A stored cross-site scripting (XSS) vulnerability exists in the affected products that allow an attacker to inject arbitrary web script or HTML via the filename parameter to multiple update endpoints of the administrative web interface. | [] |
|
GHSA-4554-7vw9-cmc7 | SQL injection vulnerability in featured_article.php in AJ Article 1.0 allows remote attackers to execute arbitrary SQL commands via the artid parameter in a search detail action. | [] |
|
CVE-2022-41978 | WordPress Zoho CRM Lead Magnet plugin <= 1.7.5.8 - Auth. Arbitrary Options Update vulnerability | Auth. (subscriber+) Arbitrary Options Update vulnerability in Zoho CRM Lead Magnet plugin <= 1.7.5.8 on WordPress. | [
"cpe:2.3:a:zohocorp:zoho_crm_lead_magnet:*:*:*:*:*:wordpress:*:*"
] |
GHSA-x6j6-cjpj-gpm9 | It was discovered that the Subiquity installer for Ubuntu Server logged the LUKS full disk encryption password if one was entered. | [] |
|
GHSA-9jvm-5xgq-52vp | Multiple stack-based buffer overflows in waHTTP.exe (aka the SAP DB Web Server) in SAP DB, possibly 7.3 through 7.5, allow remote attackers to execute arbitrary code via (1) a certain cookie value; (2) a certain additional parameter, related to sapdbwa_GetQueryString; and other unspecified vectors related to "numerous other fields." | [] |
|
GHSA-f8q5-rrg5-h693 | Unauth. Arbitrary File Deletion vulnerability in WatchTowerHQ plugin <= 3.6.15 on WordPress. | [] |
|
GHSA-w8x2-w4qr-v3x4 | Moodle Code Injection vulnerability | A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers. | [] |
GHSA-fp76-24v2-8wq4 | TELSAT marKoni FM Transmitters are vulnerable to a command injection vulnerability through the manipulation of settings and could allow an attacker to gain unauthorized access to the system with administrative privileges. | [] |
|
GHSA-xmjf-2rqj-vxj4 | A Buffer Overflow was discovered in EvoStream Media Server 1.7.1. A crafted HTTP request with a malicious header will cause a crash. An example attack methodology may include a long message-body in a GET request. | [] |
|
CVE-2022-30516 | In Hospital-Management-System v1.0, the editid parameter in the doctor.php page is vulnerable to SQL injection attacks. | [
"cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2010-1229 | The sandbox infrastructure in Google Chrome before 4.1.249.1036 does not properly use pointers, which has unspecified impact and attack vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.149.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.48:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.52:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:1.0.154.65:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.156.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.157.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.157.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.158.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.169.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.169.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.170.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:2.0.172.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.182.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.190.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.193.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:3.0.195.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.244.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.78:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.78:beta:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.0.249.89:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1001:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1004:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1006:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1007:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1008:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1009:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1010:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1011:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1012:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1013:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1014:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1015:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1016:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1017:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1018:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1019:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1020:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1021:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1022:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1023:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1024:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1025:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1026:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1027:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1028:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1029:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1030:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1031:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1032:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1033:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1034:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1036:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1045:*:*:*:*:*:*:*"
] |
|
GHSA-j3ff-r323-h59r | vRealize Network Insight (vRNI) contains a command injection vulnerability present in the vRNI REST API. A malicious actor with network access to the vRNI REST API can execute commands without authentication. | [] |
|
CVE-2012-0981 | Directory traversal vulnerability in phpShowtime 2.0 allows remote attackers to list arbitrary directories and image files via a .. (dot dot) in the r parameter to index.php. NOTE: Some of these details are obtained from third party information. | [
"cpe:2.3:a:kybernetika:phpshowtime:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-vr87-63px-9cxx | An Allocation of Resources Without Limits or Throttling vulnerability in the operating system network configuration used in B&R APROL <4.4-00P5 may allow an unauthenticated adjacent attacker to per-form Denial-of-Service (DoS) attacks against the product. | [] |
|
GHSA-r2xw-4p4f-wp3m | The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function. | [] |
|
GHSA-cg4p-5qfm-pjjj | HyperLPR Denial of Service vulnerability | A vulnerability in szad670401/hyperlpr v3.0 allows for a Denial of Service (DoS) attack. The server fails to handle excessive characters appended to the end of multipart boundaries, regardless of the character used. This flaw can be exploited by sending malformed multipart requests with arbitrary characters at the end of the boundary, leading to excessive resource consumption and a complete denial of service for all users. The vulnerability is unauthenticated, meaning no user login or interaction is required for an attacker to exploit this issue. | [] |
GHSA-673v-6c89-8w4x | Various vulnerabilities in the AIX portmir command allows local users to obtain root access. | [] |
|
GHSA-f839-84cr-67jq | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPDeveloper EmbedPress allows Stored XSS.This issue affects EmbedPress: from n/a through 4.0.8. | [] |
|
GHSA-hwq7-cvp8-6hm3 | phpBB Open Redirect | Open redirect vulnerability in phpBB before 3.0.14 and 3.1.x before 3.1.4 allows remote attackers to redirect users of Google Chrome to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [] |
GHSA-h8p9-p3q3-7x89 | IBM MQ Appliance and IBM MQ AMQP Channels 8.0, 9.0 LTS, 9.1 LTS, and 9.1 CD do not correctly block or allow clients based on the certificate distinguished name SSLPEER setting. IBM X-Force ID: 177403. | [] |
|
GHSA-94v4-v74g-2hx6 | A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. A malicious website may be able to access restricted ports on arbitrary servers. | [] |
|
CVE-2011-1446 | Google Chrome before 11.0.696.57 allows remote attackers to spoof the URL bar via vectors involving (1) a navigation error or (2) an interrupted load. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-10745 | XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .rle file, related to a "Stack Buffer Overrun (/GS Exception) starting at ntdll_77df0000!RtlProcessFlsData+0x00000000000000b0." | [
"cpe:2.3:a:xnview:xnview:2.40:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-3936 | Blog2Social < 7.2.1 - Reflected XSS | The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | [
"cpe:2.3:a:adenion:blog2social:*:*:*:*:*:wordpress:*:*"
] |
GHSA-gppm-h73v-3rx6 | Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8. | [] |
|
CVE-2018-9981 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5431. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] |
|
GHSA-3f56-567j-9g37 | In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable to a cross-site request forgery, which may allow an attacker to remotely execute arbitrary code. | [] |
|
GHSA-j2x8-qgjm-w8gp | Phabricator before 2017-11-10 does not block the --config and --debugger flags to the Mercurial hg program, which allows remote attackers to execute arbitrary code by using the web UI to browse a branch whose name begins with a --config= or --debugger= substring. | [] |
|
GHSA-254v-c952-g64w | EasyVirt DCScope 8.6.0 and earlier and co2Scope 1.3.0 and earlier are vulnerable to SQL Injection on the authentication portal. | [] |
|
GHSA-5xvg-88mc-r6q7 | Missing Authorization vulnerability in TechnoVama Quotes for WooCommerce.This issue affects Quotes for WooCommerce: from n/a through 2.0.1. | [] |
|
CVE-2011-1255 | The Timed Interactive Multimedia Extensions (aka HTML+TIME) implementation in Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Time Element Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
] |
|
GHSA-xgjw-vr88-rxg7 | Auth. Remote Code Execution vulnerability in Easy WP SMTP plugin <= 1.5.1 on WordPress. | [] |
|
CVE-2007-3630 | changePW.php in AV Tutorial Script (avtutorial) 1.0 does not require authentication or knowledge of an old password for password changes, which allows remote attackers to change passwords for arbitrary users via a modified password parameter. | [
"cpe:2.3:a:av_scripts:av_tutorial_script:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-97cq-fh25-3qg4 | Unspecified vulnerability in the SVG BiDi implementation in Opera before 11.50 allows remote attackers to cause a denial of service (application crash or hang) via unknown vectors. | [] |
|
CVE-2024-21843 | Uncontrolled search path for some Intel(R) Computing Improvement Program software before version 2.4.0.10654 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:computing_improvement_program:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-7834 | A CWE-79 Cross-Site Scripting vulnerability exists in all versions of the TSXETG100 allowing an attacker to send a specially crafted URL with an embedded script to a user that would then be executed within the context of that user. | [
"cpe:2.3:o:schneider-electric:tsxetg100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxetg100:-:*:*:*:*:*:*:*"
] |
|
GHSA-6mpc-7r8q-fcvf | ClamAV before 0.97.7: dbg_printhex possible information leak | [] |
|
GHSA-w59v-cjq7-x6rw | An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). The WebToLeadCapture functionality is found vulnerable to unauthenticated cross-site scripting (XSS) attacks. This attack vector is mitigated by proper validating the redirect URL values being passed along. | [] |
|
CVE-2023-4435 | Improper Input Validation in hamza417/inure | Improper Input Validation in GitHub repository hamza417/inure prior to build88. | [
"cpe:2.3:a:hamza417:inure:*:*:*:*:*:android:*:*"
] |
CVE-2016-2418 | media/libmedia/IOMX.cpp in mediaserver in Android 6.x before 2016-04-01 does not initialize certain metadata buffer pointers, which allows attackers to obtain sensitive information from process memory, and consequently bypass an unspecified protection mechanism, via unspecified vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 26324358. | [
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2019-13012 | The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450. | [
"cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*"
] |
|
GHSA-jg5p-7m49-jgfj | Multiple command injection vulnerabilities in the command line interpreter of FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, and 6.1.0 through 6.1.2 may allow an authenticated attacker to execute arbitrary commands on the underlying system shell via specially crafted command arguments. | [] |
|
CVE-2019-20715 | Certain NETGEAR devices are affected by stored XSS. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6100 before 1.0.0.63, D7800 before 1.0.1.47, DM200 before 1.0.0.61, R7500v2 before 1.0.3.40, R7800 before 1.0.2.60, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, and RBS50 before 2.3.0.32. | [
"cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:dm200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:dm200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*"
] |
|
GHSA-mj2p-jqh8-c5vw | An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations, aka 'Windows Storage Service Elevation of Privilege Vulnerability'. | [] |
|
CVE-2023-29386 | WordPress Manager for Icomoon plugin <= 2.0 - Arbitrary File Upload vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in Julien Crego Manager for Icomoon.This issue affects Manager for Icomoon: from n/a through 2.0.
| [
"cpe:2.3:a:juliencrego:manager_for_icomoon:*:*:*:*:*:wordpress:*:*"
] |
GHSA-44fx-gcf9-j252 | The CC Child Pages WordPress plugin before 1.43 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [] |
|
GHSA-c264-8834-ppj2 | CSRF vulnerability in Jenkins Swarm Plugin | Swarm Plugin adds API endpoints to add or remove agent labels. In Swarm Plugin 3.20 and earlier these only require a global Swarm secret to use, and no regular permission check is performed. This allows users with Agent/Create permission to add or remove labels of any agent.Additionally, these API endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.Swarm Plugin 3.21 requires POST requests and Agent/Configure permission for the affected agent to these endpoints. It no longer uses the global Swarm secret for these API endpoints. | [] |
CVE-2024-42037 | Vulnerability of uncaught exceptions in the Graphics module
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | [
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:*:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-44742 | WordPress Community Events Plugin <= 1.4.8 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting vulnerability in Yannick Lefebvre Community Events plugin <= 1.4.8 versions. | [
"cpe:2.3:a:community_events_project:community_events:*:*:*:*:*:wordpress:*:*"
] |
GHSA-c67q-vq7m-wxm5 | ftpd in IBM AIX 5.2.0 and 5.3.0 allows remote authenticated users to cause a denial of service (port exhaustion) via unspecified vectors. NOTE: some details were obtained from third party sources. | [] |
|
CVE-2022-47715 | In Last Yard 22.09.8-1, the cookie can be stolen via via unencrypted traffic. | [
"cpe:2.3:a:lastyard:last_yard:22.09.8-1:*:*:*:*:*:*:*"
] |
|
CVE-2021-31680 | Deserialization of Untrusted Data vulnerability in yolo 5 allows attackers to execute arbitrary code via crafted yaml file. | [
"cpe:2.3:a:ultralytics:yolov5:-:*:*:*:*:*:*:*"
] |
|
GHSA-cr63-g524-3rp9 | A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-232674 is the identifier assigned to this vulnerability. | [] |
|
CVE-2018-9569 | In impd_init_drc_decode_post_config of impd_drc_gain_decoder.c there is a possible out-of-bound write due to incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-113885537. | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-mw3j-855g-6jp8 | Multiple cross-site scripting (XSS) vulnerabilities in Bitweaver 1.1 and 1.1.1 beta allow remote attackers to inject arbitrary web script or HTML via the (1) sort_mode parameter to (a) fisheye/list_galleries.php, (b) messages/message_box.php, and (c) users/my.php; the (2) post_id parameter to (d) blogs/view_post.php; the (3) blog_id parameter to (e) blogs/view.php; and the (4) search field to (f) users/my_groups.php. | [] |
|
CVE-2022-49547 | btrfs: fix deadlock between concurrent dio writes when low on free data space | In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix deadlock between concurrent dio writes when low on free data space
When reserving data space for a direct IO write we can end up deadlocking
if we have multiple tasks attempting a write to the same file range, there
are multiple extents covered by that file range, we are low on available
space for data and the writes don't expand the inode's i_size.
The deadlock can happen like this:
1) We have a file with an i_size of 1M, at offset 0 it has an extent with
a size of 128K and at offset 128K it has another extent also with a
size of 128K;
2) Task A does a direct IO write against file range [0, 256K), and because
the write is within the i_size boundary, it takes the inode's lock (VFS
level) in shared mode;
3) Task A locks the file range [0, 256K) at btrfs_dio_iomap_begin(), and
then gets the extent map for the extent covering the range [0, 128K).
At btrfs_get_blocks_direct_write(), it creates an ordered extent for
that file range ([0, 128K));
4) Before returning from btrfs_dio_iomap_begin(), it unlocks the file
range [0, 256K);
5) Task A executes btrfs_dio_iomap_begin() again, this time for the file
range [128K, 256K), and locks the file range [128K, 256K);
6) Task B starts a direct IO write against file range [0, 256K) as well.
It also locks the inode in shared mode, as it's within the i_size limit,
and then tries to lock file range [0, 256K). It is able to lock the
subrange [0, 128K) but then blocks waiting for the range [128K, 256K),
as it is currently locked by task A;
7) Task A enters btrfs_get_blocks_direct_write() and tries to reserve data
space. Because we are low on available free space, it triggers the
async data reclaim task, and waits for it to reserve data space;
8) The async reclaim task decides to wait for all existing ordered extents
to complete (through btrfs_wait_ordered_roots()).
It finds the ordered extent previously created by task A for the file
range [0, 128K) and waits for it to complete;
9) The ordered extent for the file range [0, 128K) can not complete
because it blocks at btrfs_finish_ordered_io() when trying to lock the
file range [0, 128K).
This results in a deadlock, because:
- task B is holding the file range [0, 128K) locked, waiting for the
range [128K, 256K) to be unlocked by task A;
- task A is holding the file range [128K, 256K) locked and it's waiting
for the async data reclaim task to satisfy its space reservation
request;
- the async data reclaim task is waiting for ordered extent [0, 128K)
to complete, but the ordered extent can not complete because the
file range [0, 128K) is currently locked by task B, which is waiting
on task A to unlock file range [128K, 256K) and task A waiting
on the async data reclaim task.
This results in a deadlock between 4 task: task A, task B, the async
data reclaim task and the task doing ordered extent completion (a work
queue task).
This type of deadlock can sporadically be triggered by the test case
generic/300 from fstests, and results in a stack trace like the following:
[12084.033689] INFO: task kworker/u16:7:123749 blocked for more than 241 seconds.
[12084.034877] Not tainted 5.18.0-rc2-btrfs-next-115 #1
[12084.035562] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[12084.036548] task:kworker/u16:7 state:D stack: 0 pid:123749 ppid: 2 flags:0x00004000
[12084.036554] Workqueue: btrfs-flush_delalloc btrfs_work_helper [btrfs]
[12084.036599] Call Trace:
[12084.036601] <TASK>
[12084.036606] __schedule+0x3cb/0xed0
[12084.036616] schedule+0x4e/0xb0
[12084.036620] btrfs_start_ordered_extent+0x109/0x1c0 [btrfs]
[12084.036651] ? prepare_to_wait_exclusive+0xc0/0xc0
[12084.036659] btrfs_run_ordered_extent_work+0x1a/0x30 [btrfs]
[12084.036688] btrfs_work_helper+0xf8/0x400 [btrfs]
[12084.0367
---truncated--- | [] |
GHSA-hg3g-m938-5q63 | Multiple SQL injection vulnerabilities in TikiWiki CMS/Groupware 4.x before 4.2 allow remote attackers to execute arbitrary SQL commands via unspecified vectors, probably related to (1) tiki-searchindex.php and (2) tiki-searchresults.php. | [] |
|
GHSA-568g-vvx2-2rr3 | Adobe After Effects versions 16.1.2 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution. | [] |
|
GHSA-8cxj-vc9j-xq64 | CX-Motion-MCH v2.32 and earlier contains an access of uninitialized pointer vulnerability. Having a user to open a specially crafted project file may lead to information disclosure and/or arbitrary code execution. | [] |
|
CVE-2023-21057 | In ProfSixDecomTcpSACKoption of RohcPacketCommon, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-244450646References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-fjh7-5624-9g7v | The The Permalinker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'permalink' shortcode in all versions up to, and including, 1.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2020-21124 | UReport 2.2.9 allows attackers to execute arbitrary code due to a lack of access control to the designer page. | [
"cpe:2.3:a:ureport_project:ureport:2.2.9:*:*:*:*:*:*:*"
] |
|
CVE-2016-2839 | Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 on Linux make cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10, which allows remote attackers to cause a denial of service (application crash) via a crafted video. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-26957 | An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because there is an out-of-bounds read in xcb::xproto::change_property(), as demonstrated by a format=32 T=u8 situation where out-of-bounds bytes are sent to an X server. | [
"cpe:2.3:a:xcb_project:xcb:*:*:*:*:*:rust:*:*"
] |
|
CVE-2021-32633 | Remote Code Execution via traversal in TAL expressions | Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, users can access untrusted modules indirectly through Python modules that are available for direct use. By default, only users with the Manager role can add or edit Zope Page Templates through the web, but sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk from this vulnerability. The problem has been fixed in Zope 5.2 and 4.6. As a workaround, a site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. | [
"cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zope:zope:*:*:*:*:*:*:*:*"
] |
CVE-2015-7367 | Revive Adserver before 3.2.2 allows remote attackers to perform unspecified actions by leveraging an unexpired session after the user has been (1) deleted or (2) unlinked. | [
"cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:*"
] |
|
GHSA-gfc5-vx7h-qx8m | A vulnerability was found in Xianqi Kindergarten Management System 2.0 Bulid 20190808. It has been rated as critical. This issue affects some unknown processing of the file stu_list.php of the component Child Management. The manipulation of the argument sex leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [] |
|
CVE-2021-35683 | Vulnerability in the Oracle Essbase Administration Services product of Oracle Essbase (component: EAS Console). The supported version that is affected is Prior to 11.1.2.4.047. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Essbase Administration Services. While the vulnerability is in Oracle Essbase Administration Services, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Essbase Administration Services. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:essbase_administration_services:*:*:*:*:*:*:*:*"
] |
|
CVE-2004-1453 | GNU glibc 2.3.4 before 2.3.4.20040619, 2.3.3 before 2.3.3.20040420, and 2.3.2 before 2.3.2-r10 does not restrict the use of LD_DEBUG for a setuid program, which allows local users to gain sensitive information, such as the list of symbols used by the program. | [
"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"
] |
|
GHSA-phmw-jx86-x666 | Authenticated Rundeck users can view or delete jobs they do not have authorization for. | Access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks.The affected URLs are:`http[s]://[host]/context/rdJob/*``http[s]://[host]/context/api/*/incubator/jobs`ImpactRundeck, Process Automation version 4.12.0 up to 4.16.0PatchesPatched versions: 4.17.3WorkaroundsAccess to two URLs used in either Rundeck Open Source or Process Automation products could be blocked at a load balancer level.`http[s]://host/context/rdJob/*``http[s]://host/context/api/*/incubator/jobs`For more informationIf you have any questions or comments about this advisory:Open an issue in [our forums](https://community.pagerduty.com/forum/c/process-automation)Enterprise Customers can open a [Support ticket](https://support.rundeck.com) | [] |
GHSA-r6rj-wrr3-48q3 | pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not validate hostnames, which allows remote authenticated users to write to arbitrary files via an upload URL with a host other than pixabay.com. | [] |
|
CVE-2025-0204 | code-projects Online Shoe Store details.php sql injection | A vulnerability was found in code-projects Online Shoe Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file /details.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-f4vj-gp62-vjxm | Cross-site scripting (XSS) vulnerability in home/rss.php in eggblog before 3.1.1 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF). | [] |
|
GHSA-6h4q-p2hp-mmhq | The FusionSphere OpenStack V100R006C00SPC102(NFV) has an improper authentication vulnerability. Due to improper authentication on one port, an authenticated, remote attacker may exploit the vulnerability to execute more operations by send a crafted rest message. | [] |
|
CVE-2019-5217 | There is an information disclosure vulnerability on Mate 9 Pro Huawei smartphones versions earlier than LON-AL00B9.0.1.150 (C00E61R1P8T8). An attacker could view the photos after a series of operations without unlocking the screen lock. Successful exploit could cause an information disclosure condition. | [
"cpe:2.3:o:huawei:mate_9_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_9_pro:-:*:*:*:*:*:*:*"
] |
|
GHSA-xwh3-6m65-fmmj | SAP HANA Database, version - 2.0, does not correctly validate the username when performing SAML bearer token-based user authentication. It is possible to manipulate a valid existing SAML bearer token to authenticate as a user whose name is identical to the truncated username for whom the SAML bearer token was issued. | [] |
|
CVE-2025-29975 | Microsoft PC Manager Elevation of Privilege Vulnerability | Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally. | [] |
GHSA-98fg-qw7m-42fj | Missing Authorization vulnerability in Themeisle Multiple Page Generator Plugin – MPG.This issue affects Multiple Page Generator Plugin – MPG: from n/a through 3.4.0. | [] |
|
GHSA-qx2w-mxmv-5766 | Cybozu Garoon 3.0.0 to 4.2.3 allow remote attackers to obtain tokens used for CSRF protection via unspecified vectors. | [] |
|
GHSA-f8fq-8pvw-p4xw | Buffer overflow vulnerability while processing QMI QOS TLVs. Product: Android. Versions: versions that have qmi_qos_srvc.c. Android ID: 31805216. References: QC CR#912775. | [] |
|
GHSA-33q9-hj3m-p778 | The HTTP module in the (1) Branch Intelligent Management System (BIMS) and (2) web management components on Huawei AR routers and S2000, S3000, S3500, S3900, S5100, S5600, S7800, and S8500 switches does not check whether HTTP data is longer than the value of the Content-Length field, which allows remote HTTP servers to conduct heap-based buffer overflow attacks and execute arbitrary code via a crafted response. | [] |
|
CVE-2021-23362 | Regular Expression Denial of Service (ReDoS) | The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity. | [
"cpe:2.3:a:npmjs:hosted-git-info:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"
] |
CVE-2014-7564 | The Simple Car Care Tip and Advice (aka com.a1481542198504ee106f182c8a.a40350826a) application 1.03 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:bookformobile:simple_car_care_tip_and_advice:1.03:*:*:*:*:android:*:*"
] |
|
CVE-2023-43730 | Os Commerce 4.12.56860 - Cross Site Scripting Reflected (XSS) | Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "countries_name[1]" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser. | [
"cpe:2.3:a:oscommerce:oscommerce:4.12.56860:*:*:*:*:*:*:*"
] |
GHSA-9g9j-gh9g-48x5 | pollit.cgi in Poll It 2.01 and earlier allows remote attackers to access administrative functions without knowing the real password by specifying the same value to the entered_password and admin_password parameters. | [] |
|
CVE-2017-8804 | The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Information provided from upstream and references | [
"cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*"
] |
|
CVE-2014-9635 | Jenkins before 1.586 does not set the HttpOnly flag in a Set-Cookie header for session cookies when run on Tomcat 7.0.41 or later, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.58:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.68:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.69:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.70:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.71:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.72:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.73:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.74:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.76:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.77:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.78:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.81:*:*:*:*:*:*:*"
] |
|
CVE-2012-1167 | The JBoss Server in JBoss Enterprise Application Platform 5.1.x before 5.1.2 and 5.2.x before 5.2.2, Web Platform before 5.1.2, BRMS Platform before 5.3.0, and SOA Platform before 5.3.0, when the server is configured to use the JaccAuthorizationRealm and the ignoreBaseDecision property is set to true on the JBossWebRealm, does not properly check the permissions created by the WebPermissionMapping class, which allows remote authenticated users to access arbitrary applications. | [
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_brms_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_web_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-f6cv-7h5c-8g4r | Trend Micro Antivirus for Mac 2020 v10.5 and 2021 v11 (Consumer) is vulnerable to an improper access control privilege escalation vulnerability that could allow an attacker to establish a connection that could lead to full local privilege escalation within the application. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | [] |
|
GHSA-rj7r-7xgg-2mrc | An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'. | [] |
|
GHSA-pmmg-4g9w-jf76 | Dell Power Manager, Versions 3.3 to 3.14 contains an Improper Access Control vulnerability. A low-privileged malicious user may potentially exploit this vulnerability to perform arbitrary code execution with limited access. | [] |
|
GHSA-4hhg-8ghq-vwq6 | The hotrod java client in infinispan before 9.1.0.Final automatically deserializes bytearray message contents in certain events. A malicious user could exploit this flaw by injecting a specially-crafted serialized object to attain remote code execution or conduct other attacks. | [] |
|
CVE-2024-54290 | WordPress Role Includer plugin <= 1.6 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Fletcher Role Includer allows Reflected XSS.This issue affects Role Includer: from n/a through 1.6. | [] |
CVE-2023-6143 | Mali GPU Kernel Driver allows improper GPU memory processing operations | Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to exploit a software race condition to perform improper memory processing operations. If the system’s memory is carefully prepared by the user and the system is under heavy load, then this in turn cause a use-after-free.This issue affects Midgard GPU Kernel Driver: from r13p0 through r32p0; Bifrost GPU Kernel Driver: from r1p0 through r18p0; Valhall GPU Kernel Driver: from r37p0 through r46p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r46p0.
| [
"cpe:2.3:a:arm:midgard_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.