id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-cvmr-qp3p-228w | A denial of service vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory, aka 'Microsoft Outlook Denial of Service Vulnerability'. | [] |
|
GHSA-xmch-wgh7-x2fj | A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6, Security Update 2021-003 Catalina, macOS Big Sur 11.4, watchOS 7.5. A local user may be able to leak sensitive user information. | [] |
|
GHSA-g9wc-c5v2-f8gx | A Externally Controlled Reference to a Resource in Another Sphere vulnerability in obs-service-download_files of openSUSE Open Build Service allows authenticated users to generate HTTP request against internal networks and potentially downloading data that is exposed there. This issue affects: openSUSE Open Build Service . | [] |
|
GHSA-gx49-6279-2p55 | An Unquoted Service Path vulnerability exists in FreeLAN 2.2 via a specially crafted file in the FreeLAN Service path. | [] |
|
CVE-2006-1671 | Control cards for Cisco Optical Networking System (ONS) 15000 series nodes before 20060405 allow remote attackers to cause a denial of service (card reset) via (1) a "crafted" IP packet to a device with secure mode EMS-to-network-element access, aka bug ID CSCsc51390; (2) a "crafted" IP packet to a device with IP on the LAN interface, aka bug ID CSCsd04168; and (3) a "malformed" OSPF packet, aka bug ID CSCsc54558. | [
"cpe:2.3:a:cisco:transport_controller:4.0.x:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ons_15310-cl_series:0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ons_15600:0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ons_15454_mspp:*:*:*:*:*:*:*:*"
] |
|
GHSA-vww9-mp9g-8qvc | A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream "x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped. | [] |
|
CVE-2009-2546 | Directory traversal vulnerability in Advanced Electron Forum (AEF) 1.x allows remote attackers to determine the existence of arbitrary files via the avatargalfile parameter when changing an avatar, which leaks the existence of the file in an error message. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:anelectron:advanced_electron_forum:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:anelectron:advanced_electron_forum:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:anelectron:advanced_electron_forum:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:anelectron:advanced_electron_forum:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:anelectron:advanced_electron_forum:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:anelectron:advanced_electron_forum:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:anelectron:advanced_electron_forum:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:anelectron:advanced_electron_forum:1.0.8:*:*:*:*:*:*:*"
] |
|
CVE-2001-0270 | Marconi ASX-1000 ASX switches allow remote attackers to cause a denial of service in the telnet and web management interfaces via a malformed packet with the SYN-FIN and More Fragments attributes set. | [
"cpe:2.3:a:marconi:forethought:6.2:*:*:*:*:*:*:*",
"cpe:2.3:h:marconi:asx-1000:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-7048 | Multiple cross-site scripting (XSS) vulnerabilities in NatterChat 1.12 allow remote attackers to inject arbitrary web script or HTML via the (1) txtUsername parameter to registerDo.asp, as invoked from register.asp, or (2) txtRoomName parameter to room_new.asp. NOTE: these issues might be resultant from XSS in SQL error messages. | [
"cpe:2.3:a:natterchat:natterchat:1.12:*:*:*:*:*:*:*"
] |
|
GHSA-phxr-r4xw-v9q5 | vcodec2_hls_filter in libvoipCodec_v7a.so in the WeChat application through 7.0.3 for Android allows attackers to cause a denial of service (application crash) by replacing an emoji file (under the /sdcard/tencent/MicroMsg directory) with a crafted .wxgf file. The content of the replacement must be derived from the phone's IMEI. The crash occurs upon receiving a message that contains the replaced emoji. | [] |
|
CVE-2019-17444 | JFrog Artifactory does not enforce default admin password change | Jfrog Artifactory uses default passwords (such as "password") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0. | [
"cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*"
] |
CVE-2021-37102 | There is a command injection vulnerability in CMA service module of FusionCompute product when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system. Affected product versions include: FusionCompute 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0. | [
"cpe:2.3:a:huawei:fusioncompute:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:fusioncompute:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:fusioncompute:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:fusioncompute:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:fusioncompute:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:fusioncompute:8.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2009-3186 | Multiple cross-site scripting (XSS) vulnerabilities in VideoGirls BiZ allow remote attackers to inject arbitrary web script or HTML via the (1) t parameter to forum.php, (2) profile_name parameter to profile.php, and (3) p parameter to view.php. | [
"cpe:2.3:a:videogirls:videogirls_biz:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-10145 | rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources. | [
"cpe:2.3:a:redhat:rkt:*:*:*:*:*:*:*:*"
] |
|
GHSA-hgqx-7x3x-fx5x | The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors. | [] |
|
GHSA-cjqx-m2ff-vgj5 | A flaw was found in gdk-pixbuf in versions before 2.42.0. An integer wraparound leading to an out of bounds write can occur when a crafted GIF image is loaded. An attacker may cause applications to crash or could potentially execute code on the victim system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [] |
|
CVE-2021-33701 | DMIS Mobile Plug-In or SAP S/4HANA, versions - DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105, allows an attacker with access to highly privileged account to execute manipulated query in NDZT tool to gain access to Superuser account, leading to SQL Injection vulnerability, that highly impacts systems Confidentiality, Integrity and Availability. | [
"cpe:2.3:a:sap:dmis:710:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:dmis:2011_1_620:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:dmis:2011_1_640:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:dmis:2011_1_700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:dmis:2011_1_710:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:dmis:2011_1_730:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:dmis:2011_1_731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:dmis:2011_1_752:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:dmis:2020125:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4core:102:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4core:103:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4core:104:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4core:105:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sapscore:125:*:*:*:*:*:*:*"
] |
|
CVE-2017-18723 | Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6200 before 1.1.00.24, R6700v2 before 1.1.0.42, R6800 before 1.1.0.42, and R6900v2 before 1.1.0.42. | [
"cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*"
] |
|
GHSA-qr8x-m34w-97pj | The Rise Blocks – A Complete Gutenberg Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the titleTag parameter in all versions up to, and including, 3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
CVE-2013-4215 | The IPXPING_COMMAND in contrib/check_ipxping.c in Nagios Plugins 1.4.16 allows local users to gain privileges via a symlink attack on /tmp/ipxping/ipxping. | [
"cpe:2.3:a:nagios:plugins:1.4.16:*:*:*:*:*:*:*"
] |
|
CVE-2024-32996 | Privilege escalation vulnerability in the account module
Impact: Successful exploitation of this vulnerability will affect availability. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-43704 | GPU DDK - PowerVR: PVRSRVAcquireProcessHandleBase can cause psProcessHandleBase reuse when PIDs are reused | Software installed and run as a non-privileged user may conduct improper GPU system calls to gain access to the graphics buffers of a parent process. | [
"cpe:2.3:a:imaginationtech:ddk:*:*:*:*:*:*:*:*"
] |
GHSA-p9r3-mw2q-69g9 | Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Command execution. | [] |
|
GHSA-r57r-jrhh-4x69 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the Device Name parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system. | [] |
|
GHSA-rcjr-58r4-7j9r | The Kernel SSL Proxy service (svc:/network/ssl/proxy) in Sun Solaris 10 before 20060926 allows remote attackers to cause a denial of service (system crash) via unspecified vectors related to an SSL client. | [] |
|
GHSA-qw25-r28h-94f9 | Adobe Acrobat Reader versions 11.0.19 and earlier, 15.006.30280 and earlier, 15.023.20070 and earlier have an exploitable memory corruption vulnerability in the JBIG2 image compression module. Successful exploitation could lead to arbitrary code execution. | [] |
|
GHSA-8cpc-3q89-54h2 | Eupla Foros 1.0 stores the inc/config.inc file under the web document root with insufficient access control, which allows remote attackers to obtain sensitive information, including the database configuration. | [] |
|
GHSA-f92q-2q89-r8mx | Integer overflow in the jpeg_data_load_data function in jpeg-data.c in libjpeg in exif 0.6.20 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain potentially sensitive information via a crafted JPEG file. | [] |
|
GHSA-5wvh-g7mv-5v5f | Buffer overflow in the Telnet service in HP JetDirect printer card Firmware x.08.20 and earlier allows remote attackers to cause a denial of service. | [] |
|
GHSA-vp82-6wj7-cprq | SQL injection vulnerability in search.php for MyBulletinBoard (MyBB) 1.00 Release Candidate 1 through 4 allows remote attackers to execute arbitrary SQL commands via the uid parameter. NOTE: this issue might overlap CVE-2005-0282. | [] |
|
CVE-2020-14750 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:fusion_middleware:10.3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:14.1.1.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-pfj7-w373-gqch | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | [] |
GHSA-wwcg-f5f8-7hpj | In the Linux kernel, the following vulnerability has been resolved:ip: Fix data-races around sysctl_ip_prot_sock.sysctl_ip_prot_sock is accessed concurrently, and there is always a chance
of data-race. So, all readers and writers need some basic protection to
avoid load/store-tearing. | [] |
|
GHSA-rjmp-wffv-9cmf | EGavilanMedia User Registration and Login System With Admin Panel 1.0 is affected by cross-site scripting (XSS) in the Admin Panel - Manage User tab using the Full Name of the user. This vulnerability can result in the attacker injecting the XSS payload in the User Registration section and each time admin visits the manage user section from the admin panel, the XSS triggers and the attacker can steal the cookie according to the crafted payload. | [] |
|
GHSA-9695-w6h2-jpv9 | Keycloak users may be able to remove MFA from other users' devices | A community-only flaw was found where a malicious user can register himself and then uses the "remove devices" form to post different credential ids with the hope of removing MFA devices for other users. | [] |
CVE-2017-20007 | Information Exposure in INGEPAC DA AU | Ingeteam INGEPAC DA AU AUC_1.13.0.28 (and before) web application allows access to a certain path that contains sensitive information that could be used by an attacker to execute more sophisticated attacks. An unauthenticated remote attacker with access to the device´s web service could exploit this vulnerability in order to obtain different configuration files. | [
"cpe:2.3:o:ingeteam:ingepac_da_au_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ingeteam:ingepac_da_au:-:*:*:*:*:*:*:*"
] |
GHSA-77c3-8x5f-49r9 | The ABC Lounge Webradio (aka com.nobexinc.wls_66087017.rc) application 3.3.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2004-1573 | The documentation for AJ-Fork 167 implies that users should set permissions for users.db.php to 777, which allows local users to execute arbitrary PHP code and gain privileges as the administrator. | [
"cpe:2.3:a:aj-fork:aj-fork:167:*:*:*:*:*:*:*",
"cpe:2.3:a:cutephp:cutenews:0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:cutephp:cutenews:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cutephp:cutenews:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cutephp:cutenews:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cutephp:cutenews:1.3.6:*:*:*:*:*:*:*"
] |
|
GHSA-38h6-vxp4-qxvm | Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR. | [] |
|
CVE-2017-15127 | A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13. A superfluous implicit page unlock for VM_SHARED hugetlbfs mapping could trigger a local denial of service (BUG). | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-pjxw-22xf-6pwc | Prototype Pollution in defaults-deep | All versions of `defaults-deep` are vulnerable to prototype pollution. Provided certain input `defaults-deep` can add or modify properties of the `Object` prototype. These properties will be present on all objects.RecommendationAs no patch is currently available for this vulnerability it is our recommendation to select another module that can provide this functionality. | [] |
GHSA-6ph2-v7rg-cpr2 | Missing Authorization vulnerability in WebsiteinWP Blogpoet allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Blogpoet: from n/a through 1.0.3. | [] |
|
CVE-2021-43844 | Externally Controlled Reference to a Resource in Another Sphere in MSEdgeRedirect | MSEdgeRedirect is a tool to redirect news, search, widgets, weather, and more to a user's default browser. MSEdgeRedirect versions before 0.5.0.1 are vulnerable to Remote Code Execution via specifically crafted URLs. This vulnerability requires user interaction and the acceptance of a prompt. With how MSEdgeRedirect is coded, parameters are impossible to pass to any launched file. However, there are two possible scenarios in which an attacker can do more than a minor annoyance. In Scenario 1 (confirmed), a user visits an attacker controlled webpage; the user is prompted with, and downloads, an executable payload; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and RCE executes the payload the user previously downloaded, if the download path is successfully guessed. In Scenario 2 (not yet confirmed), a user visits an attacked controlled webpage; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and a payload on a remote, attacker controlled, SMB server is executed. The issue was found in the _DecodeAndRun() function, in which I incorrectly assumed _WinAPI_UrlIs() would only accept web resources. Unfortunately, file:/// passes the default _WinAPI_UrlIs check(). File paths are now directly checked for and must fail. There is no currently known exploitation of this vulnerability in the wild. A patched version, 0.5.0.1, has been released that checks for and denies these crafted URLs. There are no workarounds for this issue. Users are advised not to accept any unexpected prompts from web pages. | [
"cpe:2.3:a:msedgeredirect_project:msedgeredirect:*:*:*:*:*:*:*:*"
] |
CVE-2013-2371 | The Web API in the Statistics Server in TIBCO Spotfire Statistics Services 3.3.x before 3.3.1, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 allows remote attackers to obtain sensitive information via an unspecified HTTP request. | [
"cpe:2.3:a:tibco:spotfire_statistics_services:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_statistics_services:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_statistics_services:5.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-34354 | IBM Sterling Partner Engagement Manager information disclosure |
IBM Sterling Partner Engagement Manager 2.0 allows encrypted storage of client data to be stored locally which can be read by another user on the system. IBM X-Force ID: 230424.
| [
"cpe:2.3:a:ibm:partner_engagement_manager:6.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:partner_engagement_manager:6.2.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:partner_engagement_manager:6.2.1:*:*:*:standard:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
GHSA-x9pw-hh7v-wjpf | HDF5 v1.13.1-1 was discovered to contain a heap-use-after free via the component H5AC_unpin_entry. | [] |
|
GHSA-fcw5-xg8j-vw6m | HCL Connections Docs is vulnerable to a cross-site scripting attack where an attacker may leverage this issue to execute arbitrary code. This may lead to credentials disclosure and possibly launch additional attacks. | [] |
|
CVE-2024-50538 | WordPress Show Visitor IP Address plugin <= 0.2 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Irfan Ardiansah Show Visitor IP Address allows Stored XSS.This issue affects Show Visitor IP Address: from n/a through 0.2. | [] |
CVE-2023-20252 | A vulnerability in the Security Assertion Markup Language (SAML) APIs of Cisco Catalyst SD-WAN Manager Software could allow an unauthenticated, remote attacker to gain unauthorized access to the application as an arbitrary user.
This vulnerability is due to improper authentication checks for SAML APIs. An attacker could exploit this vulnerability by sending requests directly to the SAML API. A successful exploit could allow the attacker to generate an authorization token sufficient to gain access to the application. | [
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2020-6134 | SQL injection vulnerabilities exist in the ID parameters of OS4Ed openSIS 7.3 pages. The id parameter in the page MassDropModal.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | [
"cpe:2.3:a:os4ed:opensis:7.3:*:*:*:*:*:*:*"
] |
|
GHSA-qcm7-2qvw-4c58 | The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands. | [] |
|
CVE-2018-6291 | WebConsole Cross-Site Scripting in Kaspersky Secure Mail Gateway version 1.1. | [
"cpe:2.3:a:kaspersky:secure_mail_gateway:1.1:*:*:*:*:*:*:*"
] |
|
CVE-2007-0315 | Multiple buffer overflows in FileZilla before 2.2.30a allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors related to (1) Options.cpp when storing settings in the registry, and (2) the transfer queue (QueueCtrl.cpp). NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:filezilla:filezilla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:0.9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:0.9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:0.9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:2.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:2.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:2.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:2.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:2.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:2.2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:2.2.26a:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:2.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:2.2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:filezilla:filezilla:2.2.29:*:*:*:*:*:*:*"
] |
|
CVE-2021-40969 | Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the firstname parameter. | [
"cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-1643 | The Faster Permissions module 7.x-2.x before 7.x-1.2 for Drupal does not check the "administer permissions" permission, which allows remote attackers to modify access permissions via unspecified vectors. | [
"cpe:2.3:a:jason_savino:fp:7.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jason_savino:fp:7.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] |
|
GHSA-2vfx-mj86-p92f | The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response. | [] |
|
GHSA-rxr5-9xmw-h4rj | SQL injection vulnerability in include/img_view.class.php in LinPHA 1.3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the order parameter to new_images.php. | [] |
|
CVE-2018-20797 | An issue was discovered in PoDoFo 0.9.6. There is an attempted excessive memory allocation in PoDoFo::podofo_calloc in base/PdfMemoryManagement.cpp when called from PoDoFo::PdfPredictorDecoder::PdfPredictorDecoder in base/PdfFiltersPrivate.cpp. | [
"cpe:2.3:a:podofo_project:podofo:0.9.6:*:*:*:*:*:*:*"
] |
|
GHSA-w28c-prr6-33rc | EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allows remote authenticated administrators to execute arbitrary PHP code via crafted callback values to the call_user_func PHP function, as demonstrated using the newsettings[system] parameter. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2987. | [] |
|
GHSA-fvh7-6jc8-jcgc | Multiple access validation errors in OutStart Participate Enterprise (PE) allow remote attackers to (1) browse arbitrary directory trees by modifying the rootFolder parameter to displaynavigator.jsp, (2) rename arbitrary directory objects by modifying the selectedObject parameter to renamepopup.jsp, (3) delete arbitrary directory objects by modifying the selectedObjectsCSV parameter to displaydeletenavigator.jsp, and conduct other unauthorized activities via the (4) showDeleteView, (5) showWebFolderView, (6) showLibraryView, (7) showMyLibraryView, (8) singleSelectObject, (9) processRadioSelection, (10) processCheckboxSelection, (11) singleSelectObject, (12) addToSelectedObjects, or (13) removeFromSelectedObjects commands. | [] |
|
GHSA-2xh5-xw95-xh7p | A vulnerability was found in Tosei Online Store Management System ネット店舗管理システム 4.02/4.03/4.04. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cgi-bin/p1_ftpserver.php. The manipulation of the argument adr_txt leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2007-4039 | Argument injection vulnerability involving Mozilla, when certain URIs are registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in an unspecified URI, which are inserted into the command line when invoking the handling process, a similar issue to CVE-2007-3670. | [
"cpe:2.3:a:mozilla:mozilla:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-23552 | BIG-IP Advanced WAF and ASM vulnerability | On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.0 before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| [
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*"
] |
CVE-2018-2727 | Vulnerability in the Oracle Financial Services Market Risk Measurement and Management component of Oracle Financial Services Applications (subcomponent: User Interface). The supported version that is affected is 8.0.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Market Risk Measurement and Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Market Risk Measurement and Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Financial Services Market Risk Measurement and Management accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.5:*:*:*:*:*:*:*"
] |
|
CVE-2007-1015 | SQL injection vulnerability in HaberDetay.asp in Aktueldownload Haber script allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:aktueldownload:aktueldownload_haber_script:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-9829 | '/cgi-bin/admin/downloadMedias.cgi' of the web service in most of the VIVOTEK Network Cameras is vulnerable, which allows remote attackers to read any file on the camera's Linux filesystem via a crafted HTTP request containing ".." sequences. This vulnerability is already verified on VIVOTEK Network Camera IB8369/FD8164/FD816BA; most others have similar firmware that may be affected. | [
"cpe:2.3:o:vivotek:network_camera_ib8369_firmware:ib8369-vvtk-0102a:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:network_camera_ib8369:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:network_camera_fd8164_firmware:fd8164-_vvtk-0200b:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:network_camera_fd8164:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vivotek:network_camera_fd816ba_firmware:fd816ba-vvtk-010101.:*:*:*:*:*:*:*",
"cpe:2.3:h:vivotek:network_camera_fd816ba:-:*:*:*:*:*:*:*"
] |
|
GHSA-29cf-w3r7-xw8x | NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an out-of-bounds write can lead to denial of service and data tampering. | [] |
|
CVE-2006-5022 | PHP remote file inclusion vulnerability in includes/global.php in Joshua Wilson pNews System 1.1.0 (aka PowerNews) allows remote attackers to execute arbitrary PHP code via a URL in the nbs parameter. | [
"cpe:2.3:a:pnews_systems:pnews:1.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-pmjq-9rhw-g9xw | Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to elevate privileges due to the way that Microsoft Edge validates JavaScript under specific conditions, aka "Microsoft Edge Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8503. | [] |
|
CVE-2021-22129 | Multiple instances of incorrect calculation of buffer size in the Webmail and Administrative interface of FortiMail before 6.4.5 may allow an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthorized code or commands via specifically crafted HTTP requests. | [
"cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-0917 | Melange Chat Server (aka M-Chat), when accessed via a web browser, automatically sends cookies and other sensitive information for a server to any port specified in the associated link, which allows local users on that server to read the cookies from HTTP headers and possibly gain sensitive information, such as credentials, by setting up a listening port and reading the credentials when the victim clicks on the link. | [
"cpe:2.3:a:melange:melange_chat_system:1.10:*:*:*:*:*:*:*"
] |
|
GHSA-7c3v-2jjv-hq3c | Cross-Site Request Forgery in Jenkins Autocomplete Parameter Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Autocomplete Parameter Plugin 1.1 and earlier allows attackers to execute arbitrary code without sandbox protection if the victim is an administrator. | [] |
GHSA-7f8x-63vw-v3v9 | Insecure default variable initialization of Intel(R) RealSense(TM) ID Solution F450 before version 2.6.0.74 may allow an unauthenticated user to potentially enable information disclosure via physical access. | [] |
|
CVE-2010-4655 | net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability for an ethtool ioctl call. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*"
] |
|
GHSA-3jfq-742w-xg8j | Users with any cluster secret update access may update out-of-bounds cluster secrets | ImpactAll Argo CD versions starting with v2.3.0-rc1 are vulnerable to an improper authorization bug which allows users who have the ability to update at least one cluster secret to update any cluster secret.The attacker could use this access to escalate privileges (potentially controlling Kubernetes resources) or to break Argo CD functionality (by preventing connections to external clusters).How the Attack WorksArgo CD stores [cluster access configurations](https://argo-cd.readthedocs.io/en/stable/operator-manual/declarative-setup/#clusters) as Kubernetes Secrets. To take advantage of the vulnerability, an attacker must know the server URL for the cluster secret they want to modify.The attacker must be authenticated with the Argo CD API server, and they must be authorized to update at least one ([non project-scoped](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#project-scoped-repositories-and-clusters)) cluster. Then they must craft a malicious request to the Argo CD API server.Removing Deployment RestrictionsA cluster Secret's `clusterResources` field determines whether Argo CD users may deploy cluster-scoped resources to that cluster. The `namespaces` field determines the namespaces to which Argo CD users may deploy resources.You can use this command to determine whether any of your cluster configurations employ these restrictions (replace `argocd` with the namespace of your Argo CD installation):The `clusterResources` and `namespaces` fields are one line of defense against unauthorized management of Kubernetes resources. Users should also have AppProject and RBAC restrictions in place.If `clusterResources: "false"` or `namespaces: "some,namespaces"` are the _only_ mechanisms preventing an attacker from maliciously managing certain resources via Argo CD, then this vulnerability could allow that attacker to manage out-of-bounds resources via Argo CD (create, get, update, delete).Modifying Connection ParametersCluster secrets also hold client configuration for connecting to the remote cluster. One option is to skip TLS certificate verification. An attacker could disable certificate verification in an effort to achieve a malicious-in-the-middle (MITM) attack.Alternatively, an attacker could apply an invalid configuration (for example, by setting an invalid bearer token) and achieve a denial-of-service by preventing Argo CD from managing the target cluster.Changing Unscoped Clusters to be ScopedThe vulnerability also allows an attacker to modify a previously-unscoped cluster and make it [scoped](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#project-scoped-repositories-and-clusters). This is important if you are using `permitOnlyProjectScopedClusters: true` in a project under which the attacker can deploy. By scoping a previously-unscoped cluster under that project, they can grant themselves the ability to manage resources on the target cluster.PatchesA patch for this vulnerability has been released in the following Argo CD versions:v2.6.2v2.5.11v2.4.23v2.3.17WorkaroundsThe best way to mitigate the vulnerability is to upgrade. The following two sections explain other ways to mitigate the vulnerability if you are currently unable to upgrade.Limit Users with Cluster Update AccessThe only complete mitigation besides upgrading is to modify your RBAC configuration to completely revoke all `clusters, update` access.To exploit this vulnerability, an attacker must have access to update at least one cluster configuration. Check your [RBAC configuration](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/), for lines like this:Revoke `clusters, update` access for any users who do not absolutely need that access.Restrict Resource Management via AppProjects and RBAC[AppProjects](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/#projects) are a primary tool to restrict what resources may be managed via Argo CD.You can use the `destinations` and `clusterResourceWhitelist` fields to apply similar restrictions as the `namespaces` and `clusterResources` fields described above.Along with adding AppProject restrictions, make sure that your RBAC restrictions are strict enough.For example, limit `projects, update` access to Argo CD administrators only. Also use the `{project}` field in `applications, *, {project}/{application}` field to limit users' access to certain, restricted, AppProjects.AppProject restrictions can only prevent Applications from managing out-of-bounds resources. It cannot prevent an attacker from maliciously changing cluster connection TLS configuration.For more informationOpen an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd | [] |
GHSA-5p8w-7x5q-786r | Insufficiently protected credentials in the installation binaries for Intel(R) SEAPI in all versions may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2025-0103 | Expedition: SQL Injection Vulnerability | An SQL injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. This vulnerability also enables attackers to create and read arbitrary files on the Expedition system. | [] |
GHSA-gx22-p97p-j9pr | A comparefilesresult expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07). | [] |
|
CVE-2015-8631 | Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name. | [
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"
] |
|
CVE-2018-1000836 | bw-calendar-engine version <= bw-calendar-engine-3.12.0 contains a XML External Entity (XXE) vulnerability in IscheduleClient XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via Man in the Middle or malicious server. | [
"cpe:2.3:a:apereo:bw-calendar-engine:*:*:*:*:*:*:*:*"
] |
|
CVE-2004-0080 | The login program in util-linux 2.11 and earlier uses a pointer after it has been freed and reallocated, which could cause login to leak sensitive data. | [
"cpe:2.3:a:andries_brouwer:util-linux:*:*:*:*:*:*:*:*"
] |
|
GHSA-mpvh-7x64-2fc7 | exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled. | [] |
|
GHSA-gm2g-65wj-43g8 | MODX Revolution through v2.7.0-pl allows XSS via an extended user field such as Container name or Attribute name. | [] |
|
CVE-2018-9348 | In SMF_ParseMetaEvent of eas_smf.c, there is a possible integer overflow. This could lead to remote denial of service due to resource exhaustion with no additional execution privileges needed. User interaction is needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
] |
|
GHSA-3w6q-cgc3-v6vv | Cross-site scripting (XSS) vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to inject arbitrary web script or HTML via crafted character sequences with EUC-JP encoding, aka "EUC-JP Character Encoding Vulnerability." | [] |
|
GHSA-c9vv-2c52-w74h | IBM CICS TX 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 229459. | [] |
|
GHSA-v95p-rp86-g7qr | The software contains a hard-coded password that could allow an attacker to take control of the merging unit using these hard-coded credentials on the MU320E (all firmware versions prior to v04A00.1). | [] |
|
GHSA-rxg2-5cmw-p38c | Adobe After Effects versions 22.2.1 (and earlier) and 18.4.5 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file in After Effects. | [] |
|
CVE-2017-10850 | Untrusted search path vulnerability in Installers of ART EX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 12 Apr 2017 02:04 UTC.), PostScript? Driver + Additional Feature Plug-in + PPD File for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 12 Apr 2017 02:10 UTC.), XPS Print Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 3 Nov 2017 23:48 UTC.), ART EX Direct FAX Driver for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 26 May 2017 07:44 UTC.), Setting Restore Tool for ApeosPort-VI C7771/C6671/C5571/C4471/C3371/C2271, DocuCentre-VI C7771/C6671/C5571/C4471/C3371/C2271 (Timestamp of code signing is before 25 Aug 2015 08:51 UTC.) allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | [
"cpe:2.3:a:fujifilm:apeosport-vi:c2271:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:apeosport-vi:c3371:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:apeosport-vi:c4471:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:apeosport-vi:c5571:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:apeosport-vi:c6671:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:apeosport-vi:c7771:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:docucentre-vi:c2271:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:docucentre-vi:c3371:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:docucentre-vi:c4471:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:docucentre-vi:c5571:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:docucentre-vi:c6671:*:*:*:*:*:*:*",
"cpe:2.3:a:fujifilm:docucentre-vi:c7771:*:*:*:*:*:*:*"
] |
|
GHSA-95rh-hf54-5mj7 | Some smartphones have the out-of-bounds write vulnerability. Successful exploitation of this vulnerability may cause system service exceptions. | [] |
|
CVE-2023-1897 | CVE-2023-1897 | Atlas Copco Power Focus 6000 web server does not sanitize the login information stored by the authenticated user’s browser, which could allow an attacker with access to the user’s computer to gain credential information of the controller. | [
"cpe:2.3:o:atlascopco:power_focus_6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:atlascopco:power_focus_6000:-:*:*:*:*:*:*:*"
] |
CVE-2023-44826 | Cross Site Scripting vulnerability in ZenTaoPMS v.18.6 allows a local attacker to obtain sensitive information via a crafted script. | [
"cpe:2.3:a:easycorp:zentao:18.6:*:*:*:*:*:*:*"
] |
|
CVE-2018-4852 | A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could potentially circumvent the authentication mechanism if he/she is able to obtain certain knowledge specific to the attacked device. | [
"cpe:2.3:o:siemens:siclock_tc400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siclock_tc400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:siclock_tc100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:siclock_tc100:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-1984 | SourceCodester Complaint Management System POST Parameter check_availability.php sql injection | A vulnerability classified as critical was found in SourceCodester Complaint Management System 1.0. This vulnerability affects unknown code of the file /users/check_availability.php of the component POST Parameter Handler. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225532. | [
"cpe:2.3:a:complaint_management_system_project:complaint_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-cgw7-3f4w-4c8f | Out of bounds array access in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. | [] |
|
CVE-2023-22769 | Authenticated Remote Command Execution in the ArubaOS Command Line Interface | Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
| [
"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:7280:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:9012:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mc-va-10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mc-va-1k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mc-va-250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mc-va-50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-hw-10k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-hw-1k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-hw-5k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-va-10k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-va-1k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-va-50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-va-500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arubanetworks:mcr-va-5k:-:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:sd-wan:*:*:*:*:*:*:*:*"
] |
CVE-2016-4074 | The jv_dump_term function in jq 1.5 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted JSON file. This issue has been fixed in jq 1.6_rc1-r0. | [
"cpe:2.3:a:jq_project:jq:*:*:*:*:*:*:*:*"
] |
|
GHSA-r55p-5gm9-gq67 | Cisco Integrated Management Controller in Cisco Unified Computing System 2.2(2c)A and earlier allows local users to obtain shell access via a crafted map-nfs command, aka Bug ID CSCup05998. | [] |
|
GHSA-vph9-j5h2-h3xp | Missing Authorization vulnerability in magepeopleteam WpEvently allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WpEvently: from n/a through 4.2.9. | [] |
|
CVE-2023-34127 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | [
"cpe:2.3:a:sonicwall:analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:global_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:global_management_system:9.3.2:-:*:*:*:*:*:*",
"cpe:2.3:a:sonicwall:global_management_system:9.3.2:sp1:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.