id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2007-5230 | admin/upload_files.php in Zomplog 3.8.1 and earlier does not check for administrative credentials, which allows remote attackers to perform administrative actions via a direct request. NOTE: this can be leveraged for code execution by exploiting CVE-2007-5231. | [
"cpe:2.3:a:zomplog:zomplog:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zomplog:zomplog:3.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zomplog:zomplog:3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zomplog:zomplog:3.8.1:*:*:*:*:*:*:*"
] |
|
CVE-2011-3265 | popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter. | [
"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zabbix:zabbix:1.8.6:rc2:*:*:*:*:*:*"
] |
|
CVE-2025-23713 | WordPress Hack me if you can plugin <= 1.2 - CSRF to Stored XSS vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in Artem Anikeev Hack me if you can allows Stored XSS.This issue affects Hack me if you can: from n/a through 1.2. | [] |
GHSA-vhxm-j92c-jf79 | Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PCA Predict plugin <= 1.0.3 at WordPress. | [] |
|
GHSA-82p3-37jm-2r8w | An issue was discovered in zeek version 4.1.0. There is a HTTP request splitting vulnerability that will invalidate any ZEEK HTTP based security analysis. | [] |
|
GHSA-rmpg-qm23-v7r4 | Due to the unrestricted scope of the RFC function module, SAP BASIS - versions 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, 791, allows an authenticated non-administrator attacker to access a system class and execute any of its public methods with parameters provided by the attacker. On successful exploitation the attacker can have full control of the system to which the class belongs, causing a high impact on the integrity of the application. | [] |
|
GHSA-qg25-rr8f-97f2 | utilities/register.asp in Nukedit 4.9.6 and earlier allows remote attackers to create new users as part of arbitrary groups, including the administrative group, via a modified groupid parameter when creating a user via the addDB action. | [] |
|
CVE-2024-43866 | net/mlx5: Always drain health in shutdown callback | In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Always drain health in shutdown callback
There is no point in recovery during device shutdown. if health
work started need to wait for it to avoid races and NULL pointer
access.
Hence, drain health WQ on shutdown callback. | [] |
CVE-2017-6864 | The integrated web server in Siemens RUGGEDCOM ROX I (all versions) at port 10000/TCP could allow an authenticated user to perform stored Cross-Site Scripting attacks. | [
"cpe:2.3:o:siemens:ruggedcom_rox_i:*:*:*:*:*:*:*:*"
] |
|
GHSA-v2x5-mw7f-884p | A SQL injection issue exists in a file upload handler in REDCap 7.x before 7.0.11 via a trailing substring to SendITController:upload. | [] |
|
GHSA-23cm-frh8-jp6q | The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font. | [] |
|
GHSA-gcg3-3cx8-rgqh | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in the fastrpc kernel driver, a buffer overflow vulnerability from userspace may potentially exist. | [] |
|
GHSA-qhr5-qqjv-rv9m | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. | [] |
|
CVE-2023-43086 |
Dell Command | Configure, versions prior to 4.11.0, contains an improper access control vulnerability. A local malicious user could potentially modify files inside installation folder during application upgrade, leading to privilege escalation.
| [
"cpe:2.3:a:dell:command\\|configure:*:*:*:*:*:*:*:*"
] |
|
GHSA-256v-c957-m9f7 | Multiple cross-site scripting (XSS) vulnerabilities in msg.php in FoeCMS allow remote attackers to inject arbitrary web script or HTML via the (1) e or (2) r parameter. | [] |
|
CVE-2015-5681 | Unrestricted file upload vulnerability in upload.php in the Powerplay Gallery plugin 3.3 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in *_uploadfolder/big/. | [
"cpe:2.3:a:wpslideshow:powerplay_gallery:3.3:*:*:*:*:wordpress:*:*"
] |
|
CVE-2010-1137 | Cross-site scripting (XSS) vulnerability in WebAccess in VMware VirtualCenter 2.0.2 and 2.5 and VMware ESX 3.0.3 and 3.5, and the Server Console in VMware Server 1.0, allows remote attackers to inject arbitrary web script or HTML via the name of a virtual machine. | [
"cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:esx_server:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:esx_server:3.5:*:*:*:*:*:*:*"
] |
|
CVE-2024-12912 | An improper input insertion vulnerability in AiCloud on certain router models may lead to arbitrary command execution.
Refer to the '01/02/2025 ASUS Router AiCloud vulnerability' section on the ASUS Security Advisory for more information. | [] |
|
CVE-2018-17935 | All versions of Telecrane F25 Series Radio Controls before 00.0A use fixed codes that are reproducible by sniffing and re-transmission. This can lead to unauthorized replay of a command, spoofing of an arbitrary message, or keeping the controlled load in a permanent "stop" state. | [
"cpe:2.3:o:telecrane:f25-2s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-2s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telecrane:f25-2d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-2d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telecrane:f25-4s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-4s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telecrane:f25-4d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-4d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telecrane:f25-6s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-6s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telecrane:f25-6d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-6d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telecrane:f25-8s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-8s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telecrane:f25-8d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-8d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telecrane:f25-10s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-10s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telecrane:f25-10d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-10d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:telecrane:f25-60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:telecrane:f25-60:-:*:*:*:*:*:*:*"
] |
|
GHSA-w2pm-fr62-jgv4 | Moodle vulnerable to stored Cross-site Scripting | Moodle 3.10.1 is vulnerable to persistent/stored cross-site scripting (XSS) due to the improper input sanitization on the "Additional HTML Section" via "Header and Footer" parameter in `/admin/settings.php`. This vulnerability may lead an attacker to steal admin and all user account cookies by storing the malicious XSS payload in Header and Footer. | [] |
CVE-2023-32798 | WordPress Simple Page Ordering plugin <= 2.5.0 - Broken Access Control vulnerability | Missing Authorization vulnerability in 10up Simple Page Ordering allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simple Page Ordering: from n/a through 2.5.0. | [] |
CVE-2015-8230 | Memory leak in Huawei eSpace 8950 IP phones with software before V200R003C00SPC300 allows remote attackers to cause a denial of service (memory consumption and restart) via a large number of crafted ARP packets. | [
"cpe:2.3:a:huawei:espace_8950:v200r003c00spc200:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:espace_8950:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-41879 | Magento LTS's guest order "protect code" can be brute-forced too easily | Magento LTS is the official OpenMage LTS codebase. Guest orders may be viewed without authentication using a "guest-view" cookie which contains the order's "protect_code". This code is 6 hexadecimal characters which is arguably not enough to prevent a brute-force attack. Exposing each order would require a separate brute force attack. This issue has been patched in versions 19.5.1 and 20.1.1. | [
"cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*"
] |
GHSA-f44w-mwwr-gqvq | ClanTiger 1.1.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by widgets/statistics/statistics.php and certain other files. | [] |
|
GHSA-f7cp-72mv-6mq4 | SQL injection vulnerability in Ginkgo CMS 5.0 allows remote attackers to execute arbitrary SQL commands via the rang parameter to index.php. | [] |
|
CVE-2011-1190 | The Web Workers implementation in Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak." | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-x2pg-v5fr-hp3f | Juniper Junos Pulse Secure Access Service (aka SSL VPN) with IVE OS 7.0r2 through 7.0r8 and 7.1r1 through 7.1r5 and Junos Pulse Access Control Service (aka UAC) with UAC OS 4.1r1 through 4.1r5 include a test Certification Authority (CA) certificate in the Trusted Server CAs list, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging control over that test CA. | [] |
|
GHSA-7gr5-45fc-7wjh | This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18327. | [] |
|
GHSA-6v8f-c4v7-qcfg | ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file. | [] |
|
CVE-2022-48703 | thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR | In the Linux kernel, the following vulnerability has been resolved:
thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR
In some case, the GDDV returns a package with a buffer which has
zero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).
Then the data_vault_read() got NULL point dereference problem when
accessing the 0x10 value in data_vault.
[ 71.024560] BUG: kernel NULL pointer dereference, address:
0000000000000010
This patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or
NULL value in data_vault. | [] |
GHSA-9w85-68h7-c4c7 | In the Linux kernel, the following vulnerability has been resolved:net/sched: act_mpls: Fix warning during failed attribute validationThe 'TCA_MPLS_LABEL' attribute is of 'NLA_U32' type, but has a
validation type of 'NLA_VALIDATE_FUNCTION'. This is an invalid
combination according to the comment above 'struct nla_policy':"
Meaning of `validate' field, use via NLA_POLICY_VALIDATE_FN:
NLA_BINARY Validation function called for the attribute.
All other Unused - but note that it's a union
"This can trigger the warning [1] in nla_get_range_unsigned() when
validation of the attribute fails. Despite being of 'NLA_U32' type, the
associated 'min'/'max' fields in the policy are negative as they are
aliased by the 'validate' field.Fix by changing the attribute type to 'NLA_BINARY' which is consistent
with the above comment and all other users of NLA_POLICY_VALIDATE_FN().
As a result, move the length validation to the validation function.No regressions in MPLS tests:./tdc.py -f tc-tests/actions/mpls.json[...]echo $?0[1]
WARNING: CPU: 0 PID: 17743 at lib/nlattr.c:118
nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117
Modules linked in:
CPU: 0 PID: 17743 Comm: syz-executor.0 Not tainted 6.1.0-rc8 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 04/01/2014
RIP: 0010:nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117
[...]
Call Trace:
<TASK>
__netlink_policy_dump_write_attr+0x23d/0x990 net/netlink/policy.c:310
netlink_policy_dump_write_attr+0x22/0x30 net/netlink/policy.c:411
netlink_ack_tlv_fill net/netlink/af_netlink.c:2454 [inline]
netlink_ack+0x546/0x760 net/netlink/af_netlink.c:2506
netlink_rcv_skb+0x1b7/0x240 net/netlink/af_netlink.c:2546
rtnetlink_rcv+0x18/0x20 net/core/rtnetlink.c:6109
netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
netlink_unicast+0x5e9/0x6b0 net/netlink/af_netlink.c:1345
netlink_sendmsg+0x739/0x860 net/netlink/af_netlink.c:1921
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg net/socket.c:734 [inline]
____sys_sendmsg+0x38f/0x500 net/socket.c:2482
___sys_sendmsg net/socket.c:2536 [inline]
__sys_sendmsg+0x197/0x230 net/socket.c:2565
__do_sys_sendmsg net/socket.c:2574 [inline]
__se_sys_sendmsg net/socket.c:2572 [inline]
__x64_sys_sendmsg+0x42/0x50 net/socket.c:2572
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd | [] |
|
GHSA-xpr7-cmp4-v4v3 | Cross-Site Request Forgery (CSRF) vulnerability in Advanced Coupons for WooCommerce Coupons plugin <= 4.5 on WordPress leading to notice dismissal. | [] |
|
CVE-2016-0299 | IBM TRIRIGA Application Platform 3.3 before 3.3.2.6, 3.4 before 3.4.2.3, and 3.5 before 3.5.0.1 allows remote attackers to obtain sensitive information via vectors involving a database query. IBM X-Force ID: 111382. | [
"cpe:2.3:a:ibm:tririga_application_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tririga_application_platform:3.5.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2008-6006 | Multiple PHP remote file inclusion vulnerabilities in Micronation Banking System (minba) 1.5.0 allow remote attackers to execute arbitrary PHP code via a URL in the minsoft_path parameter to (1) utdb_access.php and (2) utgn_message.php in utility/. | [
"cpe:2.3:a:minbank:micronation_banking_system:1.5.0:*:*:*:*:*:*:*"
] |
|
GHSA-cqmc-38m3-4v5v | Cross-site scripting (XSS) vulnerability in the NGP COO/CWP Integration (crmngp) module 6.x before 6.x-1.12 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified "user-supplied information." | [] |
|
CVE-2024-34701 | CreateWiki vulnerable to impersonation of wiki requester | CreateWiki is Miraheze's MediaWiki extension for requesting & creating wikis. It is possible for users to be considered as the requester of a specific wiki request if their local user ID on any wiki in a wiki farm matches the local ID of the requester at the wiki where the wiki request was made. This allows them to go to that request entry's on Special:RequestWikiQueue on the wiki where their local user ID matches and take any actions that the wiki requester is allowed to take from there.
Commit 02e0f298f8d35155c39aa74193cb7b867432c5b8 fixes the issue. Important note about the fix: This vulnerability has been fixed by disabling access to the REST API and special pages outside of the wiki configured as the "global wiki" in `$wgCreateWikiGlobalWiki` in a user's MediaWiki settings.
As a workaround, it is possible to disable the special pages outside of one's own global wiki by doing something similar to `miraheze/mw-config` commit e5664995fbb8644f9a80b450b4326194f20f9ddc that is adapted to one's own setup. As for the REST API, before the fix, there wasn't any REST endpoint that allowed one to make writes. Regardless, it is possible to also disable it outside of the global wiki by using `$wgCreateWikiDisableRESTAPI` and `$wgConf` in the configuration for one's own wiki farm.. | [
"cpe:2.3:a:miraheze:createwiki:-:*:*:*:*:*:*:*"
] |
CVE-2008-3566 | Cross-site scripting (XSS) vulnerability in ZoneO-soft freeForum 1.7 allows remote attackers to inject arbitrary web script or HTML via the acuparam parameter to (1) the default URI or (2) index.php, or (3) the PATH_INFO to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:zoneo-soft:freeforum:1.7:*:*:*:*:*:*:*"
] |
|
CVE-2022-42149 | kkFileView 4.0 is vulnerable to Server-side request forgery (SSRF) via controller\OnlinePreviewController.java. | [
"cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-jjxm-vqh7-h8pw | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Container). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). | [] |
|
GHSA-r9jh-6r48-qhmq | Integer overflow in SQLite via WebSQL in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [] |
|
CVE-2022-20632 | Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.
The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | [] |
GHSA-44v2-prcf-pc3m | Joomla Framework Database Package Vulnerable to SQL Injection | Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used. | [] |
GHSA-ggx4-j822-3742 | SQL injection vulnerability in CoBaLT 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) urun.asp, (2) admin/bayi_listele.asp, (3) admin/urun_grup_listele.asp, and (4) admin/urun_listele.asp. | [] |
|
CVE-2022-30781 | Gitea before 1.16.7 does not escape git fetch remote. | [
"cpe:2.3:a:gitea:gitea:*:*:*:*:*:*:*:*"
] |
|
GHSA-j3v8-v77f-fvgm | Grav Server-side Template Injection (SSTI) via Denylist Bypass Vulnerability | Hi,actually we have sent the bug report to security@getgrav.org on 27th March 2023 and on 10th April 2023.Grav Server-side Template Injection (SSTI) via Denylist Bypass VulnerabilitySummary:| **Product** | Grav CMS |
| ----------------------- | --------------------------------------------- |
| **Vendor** | Grav |
| **Severity** | High - Users with login access to Grav Admin panel and page creation/update permissions are able to obtain remote code/command execution |
| **Affected Versions** | <= [v1.7.40](https://github.com/getgrav/grav/tree/1.7.40) (Commit [685d762](https://github.com/getgrav/grav/commit/685d76231a057416651ed192a6a2e83720800e61)) (Latest version as of writing) |
| **Tested Versions** | v1.7.40 |
| **Internal Identifier** | STAR-2023-0006 |
| **CVE Identifier** | Reserved CVE-2023-30592, CVE-2023-30593, CVE-2023-30594 |
| **CWE(s)** | CWE-184: Incomplete List of Disallowed Inputs, CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine |CVSS3.1 Scoring System:**Base Score:** 7.2 (High)
**Vector String:** `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H`
| **Metric** | **Value** |
| ---------------------------- | --------- |
| **Attack Vector (AV)** | Network |
| **Attack Complexity (AC)** | Low |
| **Privileges Required (PR)** | High |
| **User Interaction (UI)** | None |
| **Scope (S)** | Unchanged |
| **Confidentiality \(C)** | High |
| **Integrity (I)** | High |
| **Availability (A)** | High |Product Overview:Grav is a PHP-based flat-file content management system (CMS) designed to provide a fast and simple way to build websites. It supports rendering of web pages written in Markdown and Twig expressions, and provides an administration panel to manage the entire website via an optional Admin plugin.Vulnerability Summary:The denylist introduced in commit [9d6a2d](https://www.github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83) to prevent dangerous functions from being executed via injection of malicious templates was insufficient and could be easily subverted in multiple ways -- (1) using unsafe functions that are not banned, (2) using capitalised callable names, and (3) using fully-qualified names for referencing callables. Consequently, a low privileged attacker with login access to Grav Admin panel and page creation/update permissions is able to inject malicious templates to obtain remote code execution.Vulnerability Details:In addressing [CVE-2022-2073](https://huntr.dev/bounties/3ef640e6-9e25-4ecb-8ec1-64311d63fe66/), a denylist was introduced in commit [9d6a2d](https://www.github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83) to validate and ensure that dangerous functions could not be executed via injection of malicious templates.The implementation of the denylist can be found in `Utils::isDangerousFunction()` within [/system/src/Grav/Common/Utils.php](https://github.com/getgrav/grav/blob/1.7.40/system/src/Grav/Common/Utils.php#L1952-L2190):The list of banned functions appears to be adapted from a [StackOverflow post](https://stackoverflow.com/a/3697776). While the denylist looks rather comprehensive, there are actually multiple issues with the denylist implementation:There may be unsafe functions, be it built-in to PHP or user-defined, which are not be blocked. For example, `unserialize()` and aliases of blocked functions, such as `ini_alter()`, are not being included in the denylist.A case-sensitive comparison is performed against the denylist, but PHP function names are case-insensitive. This allows using `filter('SYSTEM')` to trivially bypass the denylist validation check.Fully qualified names can be used when referencing functions, allowing `filter('\system')` to trivially bypass the denylist validation checks.Exploit Conditions:This vulnerability can be exploited if the attacker has access to:an administrator account, ora non-administrative user account with the following permissions granted:login access to Grav admin panel, andpage creation or update rightsReproduction Steps:Log in to Grav Admin using an administrator account.Navigate to `Accounts > Add`, and ensure that the following permissions are assigned when creating a new low-privileged user:Login to Admin - AllowedPage Update - AllowedLog out of Grav Admin, and log back in using the account created in step 2.Navigate to `http://<grav_installation>/admin/pages/home`.Click the `Advanced` tab and select the checkbox beside `Twig` to ensure that Twig processing is enabled for the modified webpage.Under the `Content` tab, insert the following payload within the editor:Click the Preview button. Observe that the output of the `id` shell command is returned in the preview.Suggested Mitigations:It is recommended to review the list of functions, both default functions in PHP and user-defined functions, and include missing unsafe functions in the denylist. A non-exhaustive list of missing unsafe functions discovered is shown below:`unserialize()``ini_alter()``simplexml_load_file()``simplexml_load_string()``forward_static_call()``forward_static_call_array()`The `Utils::isDangerousFunction()` function in [/system/src/Grav/Common/Utils.php](https://github.com/getgrav/grav/blob/1.7.40/system/src/Grav/Common/Utils.php#L1956-L2074) should also be patched to disallow usage of fully qualified names when specifying callables, as well as ensure that validation performed on the `$name` parameter is case-insensitive.For example,End users should also ensure that `twig.undefined_functions` and `twig.undefined_filters` properties in `/path/to/webroot/system/config/system.yaml` configuration file are set to `false` to disallow Twig from treating undefined filters/functions as PHP functions and executing them.Detection Guidance:The following strategies may be used to detect potential exploitation attempts.Searching within Markdown pages using the following shell command:
`grep -Priz -e '(ini_alter|unserialize|simplexml_load_file|simplexml_load_string|forward_static_call|forward_static_call_array|\|\s*(filter|map|reduce))\s*\(' /path/to/webroot/user/pages/`Searching within Doctrine cache data using the following shell command:
`grep -Priz -e '(ini_alter|unserialize|simplexml_load_file|simplexml_load_string|forward_static_call|forward_static_call_array|\|\s*(filter|map|reduce))\s*\(' --include '*.doctrinecache.data' /path/to/webroot/cache/`Searching within Twig cache using the following shell command:
`grep -Priz -e '(ini_alter|unserialize|simplexml_load_file|simplexml_load_string|forward_static_call|forward_static_call_array|twig_array_(filter|map|reduce))\s*\(' /path/to/webroot/cache/twig/`Searching within compiled Twig template files using the following shell command:
`grep -Priz -e '(ini_alter|unserialize|simplexml_load_file|simplexml_load_string|forward_static_call|forward_static_call_array|\|\s*(filter|map|reduce))\s*\(' /path/to/webroot/cache/compiled/files/`Note that it is not possible to detect indicators of compromise reliably using the Grav log file (located at `/path/to/webroot/logs/grav.log` by default), as successful exploitation attempts do not generate any additional logs. However, it is worthwhile to examine any PHP errors or warnings logged to determine the existence of any failed exploitation attempts.Credits:Ngo Wei Lin ([@Creastery](https://twitter.com/Creastery)) & Wang Hengyue ([@w_hy_04](https://twitter.com/w_hy_04)) of STAR Labs SG Pte. Ltd. ([@starlabs_sg](https://twitter.com/starlabs_sg))The scheduled disclosure date is _**25th July, 2023**_. Disclosure at an earlier date is also possible if agreed upon by all parties.Kindly note that STAR Labs reserved and assigned the following CVE identifiers to the respective vulnerabilities presented in this report:**CVE-2023-30592**
Server-side Template Injection (SSTI) in getgrav/grav <= v1.7.40 allows Grav Admin users with page creation or update rights to bypass the dangerous functions denylist check in `Utils::isDangerousFunction()` and to achieve remote code execution via usage of unsafe functions, such as `unserialize()`, that are not blocked. This is a bypass of CVE-2022-2073.**CVE-2023-30593**
Server-side Template Injection (SSTI) in getgrav/grav <= v1.7.40 allows Grav Admin users with page creation or update rights to bypass the dangerous functions denylist check in `Utils::isDangerousFunction()` and to achieve remote code execution via usage of capitalised names, supplied as strings, when referencing callables. This is a bypass of CVE-2022-2073.**CVE-2023-30594**
Server-side Template Injection (SSTI) in getgrav/grav <= v1.7.40 allows Grav Admin users with page creation or update rights to bypass the dangerous functions denylist check in `Utils::isDangerousFunction()` and to achieve remote code execution via usage of fully-qualified names, supplied as strings, when referencing callables. This is a bypass of CVE-2022-2073. | [] |
CVE-2020-10582 | A SQL injection on the /admin/display_errors.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote attackers to execute arbitrary SQL requests (including data reading and modification) on the database. | [
"cpe:2.3:a:invigo:automatic_device_management:*:*:*:*:*:*:*:*"
] |
|
GHSA-xf9w-8ghj-9mwp | Adobe Flash Player versions 32.0.0.156 and earlier, 32.0.0.156 and earlier, and 32.0.0.156 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | [] |
|
CVE-2022-1411 | Unrestructed file upload in yetiforcecompany/yetiforcecrm | Unrestructed file upload in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. Attacker can send malicious files to the victims is able to retrieve the stored data from the web application without that data being made safe to render in the browser and steals victim's cookie leads to account takeover. | [
"cpe:2.3:a:yetiforce:yetiforce_customer_relationship_management:*:*:*:*:*:*:*:*"
] |
CVE-2017-14407 | A stack-based buffer over-read was discovered in filterYule in gain_analysis.c in MP3Gain version 1.5.2. The vulnerability causes an application crash, which leads to remote denial of service. | [
"cpe:2.3:a:mp3gain:mp3gain:1.5.2:*:*:*:*:*:*:*"
] |
|
GHSA-h26h-5ww8-xhfr | A vulnerability was found in kkFileView 4.4.0. It has been classified as critical. This affects an unknown part of the file /fileUpload. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-2j6m-7wgj-f48m | Multiple directory traversal vulnerabilities in 2532designs 2532|Gigs 1.2.2 Stable, when register_globals is enabled and magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter to (1) settings.php, (2) deleteuser.php, (3) mini_calendar.php, (4) manage_venues.php, and (5) manage_gigs.php, a different vector than CVE-2007-4585. | [] |
|
CVE-2008-3202 | Cross-site scripting (XSS) vulnerability in index.php in Xomol CMS 1.2 allows remote attackers to inject arbitrary web script or HTML via the current_url parameter in a tellafriend action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:xomol:xomol_cms:1.2:*:*:*:*:*:*:*"
] |
|
GHSA-5g4q-39w7-g8vv | A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is the function getUserList of the file src/main/java/com/futvan/z/system/zrole/ZroleAction.java. The manipulation of the argument roleid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
CVE-2023-26553 | mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd. | [
"cpe:2.3:a:ntp:ntp:4.2.8:p15:*:*:*:*:*:*"
] |
|
CVE-2005-0980 | PHP remote file inclusion vulnerability in index.php in AlstraSoft EPay Pro 2.0 allows remote attackers to execute arbitrary PHP code by modifying the view parameter to reference a URL on a remote web server that contains the code. | [
"cpe:2.3:a:alstrasoft:epay:2.0:*:enterprise:*:*:*:*:*"
] |
|
CVE-2010-1756 | The Settings application in Apple iOS before 4 on the iPhone and iPod touch does not properly report the wireless network that is in use, which might make it easier for remote attackers to trick users into communicating over an unintended network. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:apple:ipod_touch:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-51593 | WordPress Курс валют UAH plugin <= 2.0 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Glopium Studio Курс валют UAH allows Stored XSS.This issue affects Курс валют UAH: from n/a through 2.0. | [
"cpe:2.3:a:glopium:ukrainian-currency:*:*:*:*:*:wordpress:*:*"
] |
GHSA-23wh-25r8-cjxj | Multiple cross-site scripting (XSS) vulnerabilities in event/index2.do in ManageEngine EventLog Analyzer before 9.0 build 9002 allow remote attackers to inject arbitrary web script or HTML via the (1) width, (2) height, (3) url, (4) helpP, (5) tab, (6) module, (7) completeData, (8) RBBNAME, (9) TC, (10) rtype, (11) eventCriteria, (12) q, (13) flushCache, or (14) product parameter. Fixed in Build 11072. | [] |
|
CVE-2018-15658 | An issue was discovered in 42Gears SureMDM before 2018-11-27. By visiting the page found at /console/ConsolePage/Master.html, an attacker is able to see the markup that would be presented to an authenticated user. This is caused by the session validation occurring after the initial markup is loaded. This results in a list of unprotected API endpoints that disclose call logs, SMS logs, and user-account data. | [
"cpe:2.3:a:42gears:suremdm:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-12462 | YOGO Booking <= 1.6.2 - Authenticated (Contributor+) Stored Cross-Site Scripting | The YOGO Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'yogo-calendar' shortcode in all versions up to, and including, 1.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
GHSA-q7qj-rx6w-8pxw | A race condition was addressed with additional validation. This issue is fixed in iPadOS 17.7.3, watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, iOS 18.2 and iPadOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2. An attacker may be able to create a read-only memory mapping that can be written to. | [] |
|
CVE-2018-17641 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the deleteItem method of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6478. | [
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-mqf9-26mh-8fj9 | There is a NULL dereference pointer vulnerability in some Hikvision NVRs. Due to an insufficient validation of a parameter in a message, an attacker may send specially crafted messages to an affected product, causing a process abnormality. | [] |
|
GHSA-vvwg-mm2q-wvgr | In JetBrains PyCharm before 2022.1 exposure of the debugger port to the internal network was possible | [] |
|
GHSA-35p2-v8mc-67vh | Remote authentication bypass vulnerability in HPE Alletra Storage MP B10000 in versions prior to version 10.4.5 could be remotely exploited to allow disclosure of information. | [] |
|
GHSA-7578-q947-48mq | On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and all versions of 12.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated | [] |
|
GHSA-m3hw-79rm-2g8f | Lexmark Markvision Enterprise (MVE) before 2.4.1 allows remote attackers to execute arbitrary commands by uploading files. ( | [] |
|
GHSA-f2mp-8fgg-7465 | Vertical Privilege Escalation in KONGA 0.14.9 allows attackers to higher privilege users to full administration access. The attack vector is a crafted condition, as demonstrated by the /api/user/{ID} at ADMIN parameter. | [] |
|
GHSA-364c-g6gq-6jw3 | D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via keys smartqos_express_devices and smartqos_normal_devices in SetSmartQoSSettings. | [] |
|
CVE-2024-32213 | The LoMag WareHouse Management application version 1.0.20.120 and older were found to allow weak passwords. By default, hard-coded passwords of 10 characters with little or no complexity are allowed. | [
"cpe:2.3:a:lomag:warehouse_management:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-6415 | Cisco Unified Computing System (UCS) 2.2(3f)A on Fabric Interconnect 6200 devices allows remote attackers to cause a denial of service (CPU consumption or device outage) via a SYN flood on the SSH port during the booting process, aka Bug ID CSCuu81757. | [
"cpe:2.3:o:cisco:unified_computing_system:2.2\\(3f\\)a:*:*:*:*:*:*:*"
] |
|
GHSA-rxwh-wq59-wv5r | Failure to dismiss http auth dialogs on navigation in Network Authentication in Google Chrome on Android prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of an auto dialog via a crafted HTML page. | [] |
|
CVE-2007-6217 | Multiple SQL injection vulnerabilities in login.asp in Irola My-Time (aka Timesheet) 3.5 allow remote attackers to execute arbitrary SQL commands via the (1) login (aka Username) and (2) password parameters. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:irola:my-time:3.5:*:*:*:*:*:*:*"
] |
|
GHSA-3w26-vfvh-2v33 | A potential memory leakage vulnerability was reported in some Lenovo Notebook products that may allow a local attacker with elevated privileges to write to NVRAM variables. | [] |
|
CVE-2003-0153 | bonsai Mozilla CVS query tool leaks the absolute pathname of the tool in certain error messages generated by (1) cvslog.cgi, (2) cvsview2.cgi, or (3) multidiff.cgi. | [
"cpe:2.3:a:mozilla:bonsai:1.3:*:*:*:*:*:*:*"
] |
|
CVE-2018-11167 | Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 25 of 46). | [
"cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-2782 | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L). | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*"
] |
|
GHSA-575r-j98x-7v3j | Unspecified vulnerability in the Bluetooth stack on Mac OS 10.4.7 and earlier has unknown impact and local attack vectors, related to "Mach Exception Handling", a different issue than CVE-2006-6900. | [] |
|
GHSA-j84j-6hfg-p7h6 | Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.2.4.0, 10.0.2.0, 10.3.3.0, 10.3.4.0, and 10.3.5.0 allows local users to affect confidentiality, related to WLS Security. | [] |
|
CVE-2025-21207 | Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability | Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability | [] |
CVE-2004-2018 | PHP remote file inclusion vulnerability in index.php in Php-Nuke 6.x through 7.3 allows remote attackers to execute arbitrary PHP code by modifying the modpath parameter to reference a URL on a remote web server that contains the code. | [
"cpe:2.3:a:francisco_burzi:php-nuke:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5_final:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.5_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:7.0_final:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:francisco_burzi:php-nuke:7.3:*:*:*:*:*:*:*"
] |
|
CVE-2023-27400 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20300) | [
"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
] |
|
GHSA-xpfq-g4p2-qqqf | peertube is vulnerable to Server-Side Request Forgery (SSRF) | [] |
|
GHSA-grc8-v8w8-2h25 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to a buffer overflow. An attacker can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the class_name variable.. | [] |
|
GHSA-h4c6-653v-jpqr | The SGK Hizmet Dokumu 4a (aka tr.gov.sgk.hizmetDokumu4a) application 1.103 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-2mf5-fw29-w5cx | Multiple PHP remote file inclusion vulnerabilities in DynamicPAD before 1.03.31 allow remote attackers to execute arbitrary PHP code via a URL in the HomeDir parameter to (1) dp_logs.php or (2) index.php. | [] |
|
GHSA-q3qj-89j7-f5fh | Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Login - SSO). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Application Object Library. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). | [] |
|
GHSA-638c-cq5x-v2qp | Untrusted search path vulnerability in Adobe Dreamweaver CS5 11.0 build 4916, build 4909, and probably other versions, allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) mfc90loc.dll or (2) dwmapi.dll that is located in the same folder as a CSS, PHP, ASP, or other file that automatically launches Dreamweaver. | [] |
|
CVE-2015-6077 | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6068, CVE-2015-6072, CVE-2015-6073, CVE-2015-6075, CVE-2015-6079, CVE-2015-6080, and CVE-2015-6082. | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
GHSA-xqwx-w735-fj7f | Unknown "Denial of Service Attack" vulnerability in Computer Associates (CA) Unicenter Remote Control (URC) 6.0 allows attackers to cause a denial of service (CPU consumption in URC host service). | [] |
|
GHSA-7gr4-mrjx-cjx9 | The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not. | [] |
|
CVE-2021-30506 | Incorrect security UI in Web App Installs in Google Chrome on Android prior to 90.0.4430.212 allowed an attacker who convinced a user to install a web application to inject scripts or HTML into a privileged page via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] |
|
GHSA-286p-xm2q-ghvg | The issue was addressed with improved permissions logic. This issue is fixed in iTunes for Windows 12.10.4. A user may gain access to protected parts of the file system. | [] |
|
GHSA-j7jv-8w7c-6jr8 | TP-Link WR840N devices have a buffer overflow via a long Authorization HTTP header. | [] |
|
GHSA-vc76-xf92-jm9m | Multiple SQL injection vulnerabilities in DeskPRO 1.1.0 and earlier allow remote attackers to insert arbitrary SQL and conduct unauthorized activities via (1) the cat parameter in faq.php, (2) the article parameter in faq.php, (3) the tickedid parameter in view.php, and (4) the Password entry on the logon screen. | [] |
|
CVE-2024-40955 | ext4: fix slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists() | In the Linux kernel, the following vulnerability has been resolved:
ext4: fix slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists()
We can trigger a slab-out-of-bounds with the following commands:
mkfs.ext4 -F /dev/$disk 10G
mount /dev/$disk /tmp/test
echo 2147483647 > /sys/fs/ext4/$disk/mb_group_prealloc
echo test > /tmp/test/file && sync
==================================================================
BUG: KASAN: slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4]
Read of size 8 at addr ffff888121b9d0f0 by task kworker/u2:0/11
CPU: 0 PID: 11 Comm: kworker/u2:0 Tainted: GL 6.7.0-next-20240118 #521
Call Trace:
dump_stack_lvl+0x2c/0x50
kasan_report+0xb6/0xf0
ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4]
ext4_mb_regular_allocator+0x19e9/0x2370 [ext4]
ext4_mb_new_blocks+0x88a/0x1370 [ext4]
ext4_ext_map_blocks+0x14f7/0x2390 [ext4]
ext4_map_blocks+0x569/0xea0 [ext4]
ext4_do_writepages+0x10f6/0x1bc0 [ext4]
[...]
==================================================================
The flow of issue triggering is as follows:
// Set s_mb_group_prealloc to 2147483647 via sysfs
ext4_mb_new_blocks
ext4_mb_normalize_request
ext4_mb_normalize_group_request
ac->ac_g_ex.fe_len = EXT4_SB(sb)->s_mb_group_prealloc
ext4_mb_regular_allocator
ext4_mb_choose_next_group
ext4_mb_choose_next_group_best_avail
mb_avg_fragment_size_order
order = fls(len) - 2 = 29
ext4_mb_find_good_group_avg_frag_lists
frag_list = &sbi->s_mb_avg_fragment_size[order]
if (list_empty(frag_list)) // Trigger SOOB!
At 4k block size, the length of the s_mb_avg_fragment_size list is 14,
but an oversized s_mb_group_prealloc is set, causing slab-out-of-bounds
to be triggered by an attempt to access an element at index 29.
Add a new attr_id attr_clusters_in_group with values in the range
[0, sbi->s_clusters_per_group] and declare mb_group_prealloc as
that type to fix the issue. In addition avoid returning an order
from mb_avg_fragment_size_order() greater than MB_NUM_ORDERS(sb)
and reduce some useless loops. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-xv56-c9px-vg88 | Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability,
which allows attackers to inject JS via the "title" parameter, in the "/admin/admin-menu/add-submit"
endpoint, which can lead to unauthorized execution of scripts in a user's web browser. | [] |
|
CVE-2017-9201 | imagew-cmd.c:850:46 in libimageworsener.a in ImageWorsener 1.3.1 allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted image, related to imagew-api.c. | [
"cpe:2.3:a:entropymine:imageworsener:1.3.1:*:*:*:*:*:*:*"
] |
|
GHSA-97rh-hvhj-xf5r | Unspecified vulnerability in the Portal in HP Operations Dashboard 2.1 on Windows Server 2003 SP2 allows remote attackers to have an unknown impact, related to a "Remote exploit," as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. | [] |
|
GHSA-g9ph-q425-qq92 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aiiddqd WooMS allows Reflected XSS. This issue affects WooMS: from n/a through 9.12. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.