id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
12.4k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-w8j8-5xfx-m586 | Cross-site scripting (XSS) vulnerability on Brother HL series printers allows remote attackers to inject arbitrary web script or HTML via the url parameter to etc/loginerror.html. | [] |
|
CVE-2020-20139 | Cross Site Scripting (XSS) vulnerability in the Remote JSON component Under the Connect menu in Flexmonster Pivot Table & Charts 2.7.17. | [
"cpe:2.3:a:flexmonster:pivot_table_\\&_charts:2.7.17:*:*:*:*:*:*:*"
] |
|
GHSA-mpmv-mg9c-5wvq | Xigla Software Absolute News Feed 1.0 and possibly 1.5 allows remote attackers to bypass authentication and gain administrative access by setting a certain cookie. | [] |
|
GHSA-7q89-2pq5-3fpq | The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘no_more_items_text’ parameter in all versions up to, and including, 5.9.27 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2023-36550 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters. | [
"cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-15424 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_mod_security.php. When parsing the domain parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9735. | [
"cpe:2.3:a:control-webpanel:webpanel:0.9.8.923:*:*:*:*:*:*:*"
] |
|
CVE-2006-5299 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in Gcontact 0.6.5 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:gcontact:gcontact:0.6.5:*:*:*:*:*:*:*"
] |
|
CVE-2008-0232 | Multiple SQL injection vulnerabilities in Zero CMS 1.0 Alpha allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to index.php, or the (2) f or t parameters to forums/index.php. | [
"cpe:2.3:a:zero_cms:zero_cms:1.0_alpha:*:*:*:*:*:*:*"
] |
|
CVE-2014-0370 | Unspecified vulnerability in the Siebel Life Sciences component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect availability via unknown vectors related to Clinical Trip Report. | [
"cpe:2.3:a:oracle:siebel_crm:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_crm:8.2.2:*:*:*:*:*:*:*"
] |
|
GHSA-r53w-756j-vcfp | In Settings, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-198296421 | [] |
|
CVE-2008-1262 | The administration panel on the Airspan WiMax ProST 4.1 antenna with 6.5.38.0 software does not verify authentication credentials, which allows remote attackers to (1) upload malformed firmware or (2) bind the antenna to a different WiMAX base station via unspecified requests to forms under process_adv/. | [
"cpe:2.3:h:airspan:wimax_prost:4.1:*:6.5.38.0:*:*:*:*:*"
] |
|
CVE-2021-32737 | XSS Injection in Media Collection Title was possible | Sulu is an open-source PHP content management system based on the Symfony framework. In versions of Sulu prior to 1.6.41, it is possible for a logged in admin user to add a script injection (cross-site-scripting) in the collection title. The problem is patched in version 1.6.41. As a workaround, one may manually patch the affected JavaScript files in lieu of updating. | [
"cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*"
] |
CVE-2019-15089 | An issue was discovered in PRiSE adAS 1.7.0. Forms have no CSRF protection, letting an attacker execute actions as the administrator. | [
"cpe:2.3:a:prise:adas:1.7.0:*:*:*:*:*:*:*"
] |
|
GHSA-fwhj-j6cr-5qw4 | IBM Spectrum Fusion HCI 2.5.2 through 2.7.2 could allow an attacker to perform unauthorized actions in RGW for Ceph due to improper bucket access. IBM X-Force ID: 266807. | [] |
|
GHSA-jpx9-h8vx-j99q | Out of bounds read in ANGLE allowed a remote attacker to obtain sensitive data via a crafted HTML page. | [] |
|
GHSA-v76m-v8ff-rhq8 | In JetBrains YouTrack before 2024.1.25893 user without appropriate permissions could restore issues and articles | [] |
|
GHSA-v786-5qwc-rfj3 | In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-170646036 | [] |
|
CVE-2022-38236 | XPDF commit ffaf11c was discovered to contain a global-buffer overflow via Lexer::getObj(Object*) at /xpdf/Lexer.cc. | [
"cpe:2.3:a:xpdf_project:xpdf:3.04:*:*:*:*:*:*:*"
] |
|
GHSA-v82h-xf3f-qj32 | A remote code execution vulnerability exists in Remote Desktop Services - formerly known as Terminal Services - when an authenticated attacker abuses clipboard redirection, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. | [] |
|
GHSA-hhvv-m62h-5c8j | A vulnerability, which was classified as problematic, has been found in vexim2. This issue affects some unknown processing. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 21c0a60d12e9d587f905cd084b2c70f9b1592065. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215903. | [] |
|
CVE-2025-46633 | Cleartext transmission of sensitive information in the web management portal of the Tenda RX2 Pro 16.03.30.14 allows an attacker to decrypt traffic between the client and server by collecting the symmetric AES key from collected and/or observed traffic. The AES key in sent in cleartext in response to successful authentication. The IV is always EU5H62G9ICGRNI43. | [] |
|
GHSA-8phh-ch6h-hm63 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Felipe Peixoto Powerful Auto Chat allows Stored XSS. This issue affects Powerful Auto Chat: from n/a through 1.9.8. | [] |
|
CVE-2020-10582 | A SQL injection on the /admin/display_errors.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote attackers to execute arbitrary SQL requests (including data reading and modification) on the database. | [
"cpe:2.3:a:invigo:automatic_device_management:*:*:*:*:*:*:*:*"
] |
|
GHSA-r2rj-8r7j-cph4 | Stack-based and heap-based buffer overflows in ProxyNow! 2.75 and earlier allow remote attackers to execute arbitrary code via a GET request with a long ftp:// URL. | [] |
|
GHSA-6wh2-8hw7-jw94 | Grafana XSS via adding a link in General feature | Grafana 5.3.1 has XSS via a link on the "Dashboard > All Panels > General" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099. | [] |
CVE-2017-6734 | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of an affected device, related to the Guest Portal. More Information: CSCvd74794. Known Affected Releases: 1.3(0.909) 2.1(0.800). | [
"cpe:2.3:a:cisco:identity_services_engine:1.3\\(0.722\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:1.3\\(0.876\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:1.3\\(0.909\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:1.3\\(106.146\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:1.3\\(120.135\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.1\\(0.474\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.1\\(0.800\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.1\\(102.101\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:2.1_base:*:*:*:*:*:*:*"
] |
|
CVE-2010-3565 | Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API. | [
"cpe:2.3:a:sun:jre:*:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:*:update25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:update25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*"
] |
|
GHSA-3ppq-p8g9-x6rg | Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute, read, create, modify, or delete arbitrary files via a .. (dot dot) in a string. | [] |
|
CVE-2024-57798 | drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() | In the Linux kernel, the following vulnerability has been resolved:
drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
While receiving an MST up request message from one thread in
drm_dp_mst_handle_up_req(), the MST topology could be removed from
another thread via drm_dp_mst_topology_mgr_set_mst(false), freeing
mst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL.
This could lead to a NULL deref/use-after-free of mst_primary in
drm_dp_mst_handle_up_req().
Avoid the above by holding a reference for mst_primary in
drm_dp_mst_handle_up_req() while it's used.
v2: Fix kfreeing the request if getting an mst_primary reference fails. | [] |
CVE-2024-5138 | The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar. | [
"cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*"
] |
|
GHSA-gpx3-xw93-vw67 | Mozilla Firefox 2.0.0.3 does not check URLs embedded in (1) object or (2) iframe HTML tags against the phishing site blacklist, which allows remote attackers to bypass phishing protection. | [] |
|
GHSA-5cwj-wmj7-j224 | systemd 242 changes the VT1 mode upon a logout, which allows attackers to read cleartext passwords in certain circumstances, such as watching a shutdown, or using Ctrl-Alt-F1 and Ctrl-Alt-F2. This occurs because the KDGKBMODE (aka current keyboard mode) check is mishandled. | [] |
|
CVE-2017-8314 | Directory Traversal in Zip Extraction built-in function in Kodi 17.1 and earlier allows arbitrary file write on disk via a Zip file as subtitles. | [
"cpe:2.3:a:kodi:kodi:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2006-3942 | The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL dereference in the ExecuteTransaction function, possibly related to an "SMB PIPE," aka the "Mailslot DOS" vulnerability. NOTE: the name "Mailslot DOS" was derived from incomplete initial research; the vulnerability is not associated with a mailslot. | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:fr:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:itanium:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:tablet_pc:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*"
] |
|
GHSA-qpc8-xc65-pq5w | PrivaShare 1.1b allows remote attackers to cause a denial of service (crash) via a malformed message. | [] |
|
GHSA-wq9x-qwcq-mmgf | Diesel vulnerable to Binary Protocol Misinterpretation caused by Truncating or Overflowing Casts | The following presentation at this year's DEF CON was brought to our attention on the Diesel Gitter Channel:SQL Injection isn't Dead: Smuggling Queries at the Protocol Level
<http://web.archive.org/web/20240812130923/https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn't%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf>
(Archive link for posterity.)
Essentially, encoding a value larger than 4GiB can cause the length prefix in the protocol to overflow,
causing the server to interpret the rest of the string as binary protocol commands or other data.It appears Diesel _does_ perform truncating casts in a way that could be problematic,
for example: <https://github.com/diesel-rs/diesel/blob/ae82c4a5a133db65612b7436356f549bfecda1c7/diesel/src/pg/connection/stmt/mod.rs#L36>This code has existed essentially since the beginning,
so it is reasonable to assume that all published versions `<= 2.2.2` are affected.MitigationThe prefered migration to the outlined problem is to update to a Diesel version newer than 2.2.2, which includes
fixes for the problem.As always, you should make sure your application is validating untrustworthy user input.
Reject any input over 4 GiB, or any input that could _encode_ to a string longer than 4 GiB.
Dynamically built queries are also potentially problematic if it pushes the message size over this 4 GiB bound.For web application backends, consider adding some middleware that limits the size of request bodies by default.ResolutionDiesel now uses `#[deny]` directives for the following Clippy lints:[`cast_possible_truncation`](https://rust-lang.github.io/rust-clippy/master/#/cast_possible_truncation)[`cast_possible_wrap`](https://rust-lang.github.io/rust-clippy/master/#/cast_possible_wrap)[`cast_sign_loss`](https://rust-lang.github.io/rust-clippy/master/#/cast_sign_loss)to prevent casts that will lead to precision loss or other trunctations. Additionally we performed an
audit of the relevant code.A fix is included in the `2.2.3` release. | [] |
CVE-2014-3700 | eDeploy through at least 2014-10-14 has remote code execution due to eval() of untrusted data | [
"cpe:2.3:a:redhat:edeploy:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-1514 | Microsoft Office SharePoint XSS Vulnerability | <p>A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server.</p>
<p>The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current user. The attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the SharePoint site on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user.</p>
<p>The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests.</p>
| [
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*"
] |
CVE-2022-22015 | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | [
"cpe:2.3:a:microsoft:remote_desktop:-:*:*:*:*:windows:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
CVE-2016-2363 | Fonality (previously trixbox Pro) 12.6 through 14.1i before 2016-06-01 uses weak permissions for the /var/www/rpc/surun script, which allows local users to obtain root access for unspecified command execution by leveraging access to the nobody account. | [
"cpe:2.3:a:fonality:fonality:12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fonality:fonality:12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fonality:fonality:14.1i:*:*:*:*:*:*:*"
] |
|
CVE-2012-0537 | Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 12.1.3 allows remote attackers to affect confidentiality and integrity, related to HTML pages. | [
"cpe:2.3:a:oracle:e-business_suite:12.1.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-21117 | Insufficient policy enforcement in Cryptohome in Google Chrome prior to 88.0.4324.96 allowed a local attacker to perform OS-level privilege escalation via a crafted file. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-fxvx-gfmr-5xfj | Koillection Cross Site Scripting vulnerability | Cross Site Scripting vulnerability in Koillection v.1.6.10 allows a remote attacker to escalate privileges via the collection, Wishlist and album components | [] |
CVE-2022-20281 | In Core, there is a possible way to start an activity from the background due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-204083967 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
GHSA-h3gj-5fpq-cmpr | Improper access control in the firmware for the Intel(R) Ethernet Network Controller E810 before version 1.5.5.6 may allow a privileged user to potentially enable a denial of service via local access. | [] |
|
CVE-2021-29004 | rConfig 3.9.6 is affected by SQL Injection. A user must be authenticated to exploit the vulnerability. If --secure-file-priv in MySQL server is not set and the Mysql server is the same as rConfig, an attacker may successfully upload a webshell to the server and access it remotely. | [
"cpe:2.3:a:rconfig:rconfig:3.9.6:*:*:*:*:*:*:*"
] |
|
CVE-2021-1032 | In getMimeGroup of PackageManagerService.java, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-184745603 | [
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2025-47445 | WordPress Eventin <= 4.0.26 - Arbitrary File Download Vulnerability | Relative Path Traversal vulnerability in Themewinter Eventin allows Path Traversal.This issue affects Eventin: from n/a through 4.0.26. | [] |
CVE-2025-37757 | tipc: fix memory leak in tipc_link_xmit | In the Linux kernel, the following vulnerability has been resolved:
tipc: fix memory leak in tipc_link_xmit
In case the backlog transmit queue for system-importance messages is overloaded,
tipc_link_xmit() returns -ENOBUFS but the skb list is not purged. This leads to
memory leak and failure when a skb is allocated.
This commit fixes this issue by purging the skb list before tipc_link_xmit()
returns. | [] |
CVE-2010-1131 | JavaScriptCore.dll, as used in Apple Safari 4.0.5 on Windows XP SP3, allows remote attackers to cause a denial of service (application crash) via an HTML document composed of many successive occurrences of the <object> substring. | [
"cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] |
|
GHSA-723j-vwr2-6865 | A vulnerability in the implementation of the Cisco Network Plug-and-Play (PnP) agent of Cisco DNA Center could allow an authenticated, remote attacker to view sensitive information in clear text. The attacker must have valid low-privileged user credentials. This vulnerability is due to improper role-based access control (RBAC) with the integration of PnP. An attacker could exploit this vulnerability by authenticating to the device and sending a query to an internal API. A successful exploit could allow the attacker to view sensitive information in clear text, which could include configuration files. | [] |
|
GHSA-g4rw-8m5q-6453 | Out of bounds access in rgb | Affected versions of rgb crate allow viewing and modifying data of any type T wrapped in RGB<T> as bytes, and do not correctly constrain RGB<T> and other wrapper structures to the types for which it is safe to do so.Safety violation possible for a type wrapped in RGB<T> and similar wrapper structures:If T contains padding, viewing it as bytes may lead to exposure of contents of uninitialized memory.If T contains a pointer, modifying it as bytes may lead to dereferencing of arbitrary pointers.Any safety and/or validity invariants for T may be violated.The issue was resolved by requiring all types wrapped in structures provided by RGB crate to implement an unsafe marker trait. | [] |
GHSA-rq95-33vv-7jxc | On controllers running versions of v8.20 prior to vCR8.20.200221b (distributed in v8.20.1093(MR2)), v8.10 prior to vGR8.10.179 (distributed in v8.10.1211(MR5)), v8.00 prior to vGR8.00.165 (Distributed in v8.00.1228(MR6)), v7.90 prior to vGR7.90.165 (distributed in v7.90.1038(MRX)), v7.80 or earlier, It is possible to retrieve site keys used for securing MIFARE Plus and Desfire using debug ports on T Series readers. | [] |
|
GHSA-rqwg-pq3r-vw9v | Vulnerability in the Oracle Outside In Technology component of Oracle Fusion Middleware (subcomponent: Outside In Filters). The supported version that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Outside In Technology. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Note: Outside In Technology is a suite of software development kits (SDKs). The protocol and CVSS score depend on the software that uses the Outside In Technology code. The CVSS score assumes that the software passes data received over a network directly to Outside In Technology code, but if data is not received over a network the CVSS score may be lower. CVSS 3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). | [] |
|
GHSA-vc86-6vwr-63qp | IBM Tivoli Business Service Manager 6.1.0 before 6.1.0-TIV-BSM-FP0004 and 6.1.1 before 6.1.1-TIV-BSM-FP0004 allows remote authenticated users to obtain administrator passwords by leveraging unspecified privileges. BM X-Force ID: 111234. | [] |
|
CVE-2024-8908 | Inappropriate implementation in Autofill in Google Chrome prior to 129.0.6668.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-22512 | VARTA: Multiple devices prone to hard-coded credentials | Hard-coded credentials in Web-UI of multiple VARTA Storage products in multiple versions allows an unauthorized attacker to gain administrative access to the Web-UI via network. | [
"cpe:2.3:o:varta:element_backup_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:varta:element_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:o:varta:element_s1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:varta:element_s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:varta:element_s2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:varta:element_s2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:varta:element_s3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:varta:element_s3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:varta:element_s4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:varta:element_s4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:varta:one_l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:varta:one_l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:varta:one_xl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:varta:one_xl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:varta:pulse_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:varta:pulse:-:*:*:*:*:*:*:*"
] |
CVE-2023-39432 | Improper access control element in some Intel(R) Ethernet tools and driver install software, before versions 28.2, may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:h:intel:ethernet_adapter_complete_driver_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:ethernet_adapter_complete_driver:*:*:*:*:*:*:*:*"
] |
|
GHSA-8cmg-w5hw-x6p6 | The Modern Events Calendar Lite WordPress plugin before 6.1.5 does not sanitise and escape the time parameter before using it in a SQL statement in the mec_load_single_page AJAX action, available to unauthenticated users, leading to an unauthenticated SQL injection issue | [] |
|
GHSA-58hg-m3wr-hj5r | The log_prefix function in kernel/printk.c in the Linux kernel 3.x before 3.4.33 does not properly remove a prefix string from a syslog header, which allows local users to cause a denial of service (buffer overflow and system crash) by leveraging /dev/kmsg write access and triggering a call_console_drivers function call. | [] |
|
GHSA-2rgh-8rcv-gfrg | In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation. | [] |
|
GHSA-38h4-hmr8-8c7q | Memory corruption when IOCTL call is invoked from user-space to read board data. | [] |
|
GHSA-9p2c-f575-r7xw | A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). When processing a DHCP ACK message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0013) | [] |
|
CVE-2019-17232 | Functions/EWD_UFAQ_Import.php in the ultimate-faqs plugin through 1.8.24 for WordPress allows unauthenticated options import. | [
"cpe:2.3:a:etoilewebdesign:ultimate_faq:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2020-15389 | jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice. | [
"cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*"
] |
|
CVE-2008-5992 | Multiple SQL injection vulnerabilities in Jetik Emlak Sistem A (ESA) 2.0 allow remote attackers to execute arbitrary SQL commands via the KayitNo parameter to (1) diger.php and (2) sayfalar.php. | [
"cpe:2.3:a:jetik:jetik_emlak_sistem_a:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-5ggp-22rv-4jh2 | Improper input validation in TrustZone memory transfer interface can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking | [] |
|
GHSA-rvp7-wrjj-rgvf | IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote authenticated users to obtain sensitive information about application implementation via unspecified vectors, a different vulnerability than CVE-2013-0463, CVE-2013-2985, CVE-2013-2987, CVE-2013-3020, CVE-2013-0475, and CVE-2013-0567. | [] |
|
CVE-2007-1947 | Cross-zone scripting vulnerability in the DOM templates (domplates) used by the console.log function in the Firebug extension before 1.04 for Mozilla Firefox allows remote attackers to bypass zone restrictions, read arbitrary file:// URIs, or execute arbitrary code in the browser chrome by overwriting the toString function via a certain function declaration, related to incorrect identification of anonymous JavaScript functions, a different issue than CVE-2007-1878. | [
"cpe:2.3:a:parakey_inc.:firebug:*:*:*:*:*:*:*:*"
] |
|
GHSA-7v4f-45vh-vpff | Session fixation vulnerability in TIBCO iProcess Engine before 11.1.3 and iProcess Workspace before 11.3.1 allows remote attackers to hijack web sessions via unspecified vectors. | [] |
|
CVE-2020-26046 | FUEL CMS 1.4.11 has stored XSS in Blocks/Navigation/Site variables. This could lead to cookie stealing and other malicious actions. This vulnerability can be exploited with an authenticated account and also impact other visitors. | [
"cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.11:*:*:*:*:*:*:*"
] |
|
GHSA-2hv7-f89v-j5wh | A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.2, macOS Monterey 12.6.3, macOS Big Sur 11.7.3. An app may be able to gain root privileges. | [] |
|
CVE-2020-9979 | A trust issue was addressed by removing a legacy API. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0. An attacker may be able to misuse a trust relationship to download malicious content. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] |
|
GHSA-qwxx-r7ph-8m3q | SaltOS 3.1 r8126 contains a database download vulnerability. | [] |
|
GHSA-c4fg-wvr4-wwx7 | Apple QuickTime / Darwin Streaming Server before 4.1.3f allows remote attackers to cause a denial of service (crash) via a request to view_broadcast.cgi that does not contain the required parameters. | [] |
|
GHSA-32f7-cmr3-vpjv | Moderate severity vulnerability that affects aioxmpp | **Withdrawn:** Duplicate of GHSA-6m9g-jr8c-cqw3 | [] |
CVE-2021-21568 | Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an insufficient logging vulnerability. An authenticated user with ISI_PRIV_LOGIN_PAPI could make un-audited and un-trackable configuration changes to settings that their roles have privileges to change. | [
"cpe:2.3:o:dell:emc_powerscale_onefs:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_powerscale_onefs:8.2.2:*:*:*:*:*:*:*"
] |
|
GHSA-69vj-962m-hmhv | A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution. | [] |
|
CVE-2015-4522 | The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow." | [
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] |
|
GHSA-6hjj-8mx7-m633 | A vulnerability in the web interface of Lenovo EZ Media & Backup Center, ix2 & ix2-dl version 4.1.406.34763 and prior could allow an unauthenticated, remote attacker to redirect a user to an untrusted web page. | [] |
|
GHSA-jwhc-74h7-9587 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, iOS 15.7.4 and iPadOS 15.7.4. Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution | [] |
|
GHSA-r48c-4vfj-h426 | collective.dms.basecontent Cross-site Scripting vulnerability | A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 or later will address this issue. The patch is at commit 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability. | [] |
CVE-2007-2105 | Directory traversal vulnerability in admin/index.php in Monkey CMS 0.0.3 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the admin_skin parameter. | [
"cpe:2.3:a:monkey_cms:monkey_cms:0.0.3:*:*:*:*:*:*:*"
] |
|
CVE-2010-4625 | MyBB (aka MyBulletinBoard) before 1.4.12 does not properly handle a configuration with a visible forum that contains hidden threads, which allows remote attackers to obtain sensitive information by reading the Latest Threads block of the Portal Page. | [
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.04:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mybb:mybb:1.4.10:*:*:*:*:*:*:*"
] |
|
CVE-2020-13306 | A vulnerability was discovered in GitLab versions before 13.1.10, 13.2.8 and 13.3.4. GitLab Webhook feature could be abused to perform denial of service attacks due to the lack of rate limitation. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
] |
|
GHSA-72vr-chh5-3rgj | The Crafthemes Demo Import plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'process_uploaded_files' function in all versions up to, and including, 3.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | [] |
|
GHSA-qccm-wmcq-pwr6 | Tailscale daemon is vulnerable to information disclosure via CSRF | A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables.**Affected platforms:** All
**Patched Tailscale client versions:** v1.32.3 or later, v1.33.257 or later (unstable)What happened?In the Tailscale client, the peer API was vulnerable to DNS rebinding. This allowed an attacker-controlled website visited by the node to rebind DNS for the peer API to an attacker-controlled DNS server, and then making peer API requests in the client, including accessing the node’s Tailscale environment variables.Who is affected?All Tailscale clients prior to version v.1.32.3 are affected.What should I do?Upgrade to v1.32.3 or later to remediate the issue.What is the impact?An attacker with access to the peer API on a node could use that access to read the node’s environment variables, including any credentials or secrets stored in environment variables. This may include Tailscale authentication keys, which could then be used to add new nodes to the user’s tailnet. The peer API access could also be used to learn of other nodes in the tailnet or send files via Taildrop.An attacker with access to the peer API who sent a malicious file via Taildrop which was accessed while it was loading could use this to gain access to the local API, and remotely execute code.There is no evidence of this vulnerability being purposefully triggered or exploited.CreditsWe would like to thank [Emily Trau](https://github.com/emilytrau) and [Jamie McClymont (CyberCX)](https://twitter.com/JJJollyjim) for reporting this issue. Further detail is available in [their blog post](https://emily.id.au/tailscale).References[TS-2022-005](https://tailscale.com/security-bulletins/#ts-2022-005)[Researcher blog post](https://emily.id.au/tailscale)For more informationIf you have any questions or comments about this advisory, [contact Tailscale support](https://tailscale.com/contact/support/). | [] |
GHSA-m392-235j-9r7r | TYPO3 CMS vulnerable to User Enumeration via Response Timing | MetaCVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C` (4.9)ProblemIt has been discovered that observing response time during user authentication (backend and frontend) can be used to distinguish between existing and non-existing user accounts.Extension authors of 3rd party TYPO3 extensions providing a custom authentication service should check if the extension is affected by the described problem. Affected extensions must implement new `MimicServiceInterface::mimicAuthUser`, which simulates corresponding times regular processing would usually take.SolutionUpdate to TYPO3 version 7.6.58 ELTS, 8.7.48 ELTS, 9.5.37 ELTS, 10.4.32 or 11.5.16 that fix the problem described above.CreditsThanks to Vautia who reported this issue and to TYPO3 core & security team members Oliver Hader who fixed the issue.References[TYPO3-CORE-SA-2022-007](https://typo3.org/security/advisory/typo3-core-sa-2022-007)[Vulnerability Report on huntr.dev](https://huntr.dev/bounties/7d519735-2877-4fad-bd77-accde3e290a7/) (embargoed +30 days) | [] |
GHSA-p9cw-g386-7q2x | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. Parsing a file may lead to disclosure of user information. | [] |
|
CVE-2019-11042 | heap-buffer-overflow on exif_process_user_comment in EXIF extension | When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*"
] |
CVE-2014-9824 | Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9825. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] |
|
GHSA-f6p3-m24c-6r2v | A mass assignment vulnerability in eyecomms eyeCMS through 2019-10-15 allows any candidate to take over another candidate's account (by also exploiting CVE-2019-17604) via a modified candidate id and an additional password parameter. The outcome is that the password of this other candidate is changed. | [] |
|
CVE-2020-35932 | Insecure Deserialization in the Newsletter plugin before 6.8.2 for WordPress allows authenticated remote attackers with minimal privileges (such as subscribers) to use the tpnc_render AJAX action to inject arbitrary PHP objects via the options[inline_edits] parameter. NOTE: exploitability depends on PHP objects that might be present with certain other plugins or themes. | [
"cpe:2.3:a:tribulant:newsletter:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-vf9q-x8rh-jxqq | Microsoft ODBC Driver Remote Code Execution Vulnerability. | [] |
|
GHSA-cm8j-xhg4-hrg4 | Integer overflow in the PolyPolygon function in Graphics Rendering Engine on Microsoft Windows 98 and Me allows remote attackers to execute arbitrary code via a Windows Metafile (WMF) or EMF image with a sum of entries in the vertext counts array and number of polygons that triggers a heap-based buffer overflow. | [] |
|
CVE-2020-12385 | Improper input validation in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:graphics_drivers:*:*:*:*:*:*:*:*"
] |
|
CVE-2005-0295 | npptnt2.sys in nProtect Gameguard provides unrestricted I/O to any process that calls it, which allows local users to gain privileges. | [
"cpe:2.3:a:inca:nprotect_gameguard:*:*:*:*:*:*:*:*"
] |
|
GHSA-c8ff-j5gm-6492 | Jenkins Report Portal Plugin Cross-Site Request Forgery vulnerability | Jenkins Report Portal Plugin 0.5 and earlier does not perform a permission check in a method implementing form validation.This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified bearer token authentication. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. | [] |
GHSA-hwj5-x3jv-hmff | The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents. | [] |
|
CVE-2022-2156 | Use after free in Core in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.