id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-q2qw-rmrh-vv42 | Improper Access Control in activejob | A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have. | [] |
CVE-2017-8080 | Atlassian Hipchat Server before 2.2.4 allows remote authenticated users with user level privileges to execute arbitrary code via vectors involving image uploads. | [
"cpe:2.3:a:atlassian:hipchat_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-fg3m-42wq-h6wj | The Discy WordPress theme before 5.2 does not check for CSRF tokens in the AJAX action discy_reset_options, allowing an attacker to trick an admin into resetting the site settings back to defaults. | [] |
|
CVE-2019-10172 | A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes. | [
"cpe:2.3:a:fasterxml:jackson-mapper-asl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:spark:3.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2018-15848 | An issue was discovered in portfolioCMS 1.0.5. There is CSRF to create new pages via admin/portfolio.php?newpage=true. | [
"cpe:2.3:a:portfoliocms_project:portfoliocms:1.0.5:*:*:*:*:*:*:*"
] |
|
GHSA-r667-mpf5-fqrf | Cross-site scripting (XSS) vulnerability in birt-viewer/run in Eclipse Business Intelligence and Reporting Tools (BIRT) before 2.5.0, as used in KonaKart and other products, allows remote attackers to inject arbitrary web script or HTML via the __report parameter. | [] |
|
GHSA-87mw-pv6w-273m | Multiple vulnerabilities in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. Cisco Bug IDs: CSCvg70921. | [] |
|
CVE-2005-3872 | Multiple SQL injection vulnerabilities in Ugroup 2.6.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) FORUM_ID parameter in forum.php, and the (2) TOPIC_ID, (3) FORUM_ID, and (4) CAT_ID parameters in topic.php. | [
"cpe:2.3:a:ugroup:ugroup:*:*:*:*:*:*:*:*"
] |
|
GHSA-2mh7-qxcw-q39g | francoisjacquet/rosariosis vulnerable to Cross-Site Scripting (XSS) | Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 8.9.3. | [] |
GHSA-rqf9-7632-5f93 | check.php in Hinton Design phpht Topsites 1.3 does not validate passwords when using cookies, which allows remote attackers to bypass authentication via unspecified cookies. | [] |
|
CVE-2018-18494 | A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-7xxp-vg6c-3rr8 | Multiple PHP remote file inclusion vulnerabilities in awrate 1.0 allow remote attackers to execute arbitrary PHP code via a URL in the toroot parameter to (1) 404.php or (2) topbar.php, different vectors than CVE-2006-6368. | [] |
|
CVE-2023-41156 | A Stored Cross-Site Scripting (XSS) vulnerability in the filter and forward mail tab in Usermin 2.001 allows remote attackers to inject arbitrary web script or HTML via the save to new folder named field while creating a new filter. | [
"cpe:2.3:a:webmin:usermin:2.001:*:*:*:*:*:*:*"
] |
|
GHSA-vq8r-9572-hxgv | windrvr1260.sys in Jungo DriverWizard WinDriver 12.6.0 allows attackers to cause a denial of service (BSOD) via a 0x953826DB DeviceIoControl call. | [] |
|
GHSA-rqf2-v8fp-54vf | PHPFusion 9.03.110 is affected by a remote code execution vulnerability. The theme function will extract a file to "webroot/themes/{Theme Folder], where an attacker can access and execute arbitrary code. | [] |
|
CVE-2015-5471 | Absolute path traversal vulnerability in include/user/download.php in the Swim Team plugin 1.44.10777 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter. | [
"cpe:2.3:a:swim_team_project:swim_team:1.44.10777:*:*:*:*:wordpress:*:*"
] |
|
CVE-2024-45880 | A command injection vulnerability exists in Motorola CX2L router v1.0.2 and below. The vulnerability is present in the SetStationSettings function. The system directly invokes the system function to execute commands for setting parameters such as MAC address without proper input filtering. This allows malicious users to inject and execute arbitrary commands. | [
"cpe:2.3:o:motorola:cx2l_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-5xj4-2499-67mw | The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing. | [] |
|
GHSA-j4x4-m535-6jrw | Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system via a crafted HTTP POST request. | [] |
|
CVE-2023-42687 | In wifi service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed | [
"cpe:2.3:o:google:android:10.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-1416 | Cisco Prime Collaboration Provisioning 10.6 SP2 (aka 10.6.0.10602) mishandles LDAP authentication, which allows remote attackers to obtain administrator privileges via a crafted login attempt, aka Bug ID CSCuv37513. | [
"cpe:2.3:a:cisco:prime_collaboration_provisioning:10.6.2:*:*:*:*:*:*:*"
] |
|
GHSA-j5rg-hrw2-2gf7 | A file path traversal vulnerability was identified in the DelimitedFileConnector Cloud Connector that allowed an authenticated administrator to set arbitrary connector attributes, including the “file“ attribute, which in turn allowed the user to access files uploaded for other sources. | [] |
|
CVE-2024-56296 | WordPress Mang Board WP plugin <= 1.8.4 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hometory Mang Board WP allows Reflected XSS.This issue affects Mang Board WP: from n/a through 1.8.4. | [] |
CVE-2016-4407 | The DSA algorithm implementation in SAP SAPCRYPTOLIB 5.555.38 does not properly check signatures, which allows remote authenticated users to impersonate arbitrary users via unspecified vectors, aka SAP Security Note 2223008. | [
"cpe:2.3:a:sap:sapcryptolib:5.555.38:*:*:*:*:*:*:*"
] |
|
CVE-2020-21514 | An issue was discovered in Fluent Fluentd v.1.8.0 and Fluent-ui v.1.2.2 allows attackers to gain escalated privileges and execute arbitrary code due to a default password. | [
"cpe:2.3:a:fluentd:fluentd:1.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:fluentd:fluentd-ui:1.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2018-7996 | Eramba e1.0.6.033 has Stored XSS on the tooltip box via the /programScopes description parameter. | [
"cpe:2.3:a:eramba:eramba:e1.0.6.033:*:*:*:*:*:*:*"
] |
|
CVE-2022-1346 | Multiple Stored XSS in causefx/organizr | Multiple Stored XSS in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse. | [
"cpe:2.3:a:organizr:organizr:*:*:*:*:*:*:*:*"
] |
CVE-2013-1115 | Buffer overflow in Cisco WebEx Advanced Recording Format (ARF) player T27 LD before SP32 EP16, T27 L10N before SP32_ORION111, and T28 before T28.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted ARF file, aka Bug IDs CSCue74118, CSCub28371, CSCud23401, and CSCud31109. | [
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.11.26:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.21.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.25.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.32.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:28.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-13718 | The mintToken function of a smart contract implementation for FuturXe, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [
"cpe:2.3:a:futurxe:futurxe:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-0947 | Arctic Wireless Gateway Firewall vulnerability | A vulnerability in ABB ARG600 Wireless Gateway series that could allow an attacker to exploit the vulnerability by remotely connecting to the serial port gateway, and/or protocol converter, depending on the configuration. | [
"cpe:2.3:o:abb:arg600a1220na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arg600a1220na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arg600a1230na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arg600a1230na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arg600a1240na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arg600a1240na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arg600a1260na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arg600a1260na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arg600a2622na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arg600a2622na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arg600a2625na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arg600a2625na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arp600a2200na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arp600a2200na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arp600a2220na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arp600a2220na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arp600a2250na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arp600a2250na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arp600a2260na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arp600a2260na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arp600a2651na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arp600a2651na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arp600a2560na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arp600a2560na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arr600a3201na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arr600a3201na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arr600a3202na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arr600a3202na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arr600a3221na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arr600a3221na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arr600a3222na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arr600a3222na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arr600a3251na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arr600a3251na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arr600a3252na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arr600a3252na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arr600a3261na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arr600a3261na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arr600a3262na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arr600a3262na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arc600a2325na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arc600a2325na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arc600a2323na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arc600a2323na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:arc600a2324na_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:arc600a2324na:-:*:*:*:*:*:*:*",
"cpe:2.3:o:abb:viola_systems_arctic_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:abb:viola_systems_arctic:-:*:*:*:*:*:*:*"
] |
CVE-2016-10133 | Heap-based buffer overflow in the js_stackoverflow function in jsrun.c in Artifex Software, Inc. MuJS allows attackers to have unspecified impact by leveraging an error when dropping extra arguments to lightweight functions. | [
"cpe:2.3:a:artifex:mujs:*:*:*:*:*:*:*:*"
] |
|
GHSA-m252-xx2j-c8p8 | US Zip Codes Database Script 1.0 allows SQL Injection via the state parameter. | [] |
|
GHSA-r4j8-j63p-24j8 | Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] |
|
CVE-2017-6342 | An issue was discovered on Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19. When SmartPSS Software is launched, while on the login screen, the software in the background automatically logs in as admin. This allows sniffing sensitive information identified in CVE-2017-6341 without prior knowledge of the password. This is a different vulnerability than CVE-2013-6117. | [
"cpe:2.3:o:dahuasecurity:camera_firmware:2.400.0000.28.r:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:nvr_firmware:3.210.0001.10:*:*:*:*:*:*:*",
"cpe:2.3:o:dahuasecurity:smartpss_firmware:1.16.1:*:*:*:*:*:*:*",
"cpe:2.3:h:dahuasecurity:dhi-hcvr7216a-s3:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-41057 | Windows HTTP.sys Elevation of Privilege Vulnerability | Windows HTTP.sys Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
GHSA-pg7c-4mvg-5fmj | The SolarWinds Platform was susceptible to the Incorrect Comparison Vulnerability. This vulnerability allows users with administrative access to SolarWinds Web Console to execute arbitrary commands with NETWORK SERVICE privileges. | [] |
|
CVE-2014-7797 | The Thai food (aka com.foods.thaifood) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:gotobestofprice:thai_food:1:*:*:*:*:android:*:*"
] |
|
CVE-2025-24243 | The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, macOS Ventura 13.7.5, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5. Processing a maliciously crafted file may lead to arbitrary code execution. | [] |
|
GHSA-3mhx-4cwj-8prc | The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document. | [] |
|
GHSA-5499-prx8-c26x | novel-plus V3.6.1 allows unrestricted file uploads. Unrestricted file suffixes and contents can lead to server attacks and arbitrary code execution. | [] |
|
CVE-2018-7271 | An issue was discovered in MetInfo 6.0.0. In install/install.php in the installation process, the config/config_db.php configuration file filtering is not rigorous: one can insert malicious code in the installation process to execute arbitrary commands or obtain a web shell. | [
"cpe:2.3:a:metinfo:metinfo:6.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-jqrr-cj4q-x8m4 | The controller responsible for setting the logging level does not include any authorization
checks to ensure the user is authenticated. This can be seen by noting that it extends
Controller rather than AuthenticatedController and includes no further checks. This issue affects YugabyteDB Anywhere: from 2.0.0 through 2.17.3 | [] |
|
CVE-2023-51330 | PHPJabbers Cinema Booking System v1.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Now Showing menu "date" parameter. | [] |
|
GHSA-rh2h-jqxg-h9f7 | An issue found in Ego Studio SuperClean v.1.1.9 and v.1.1.5 allows an attacker to gain privileges cause a denial of service via the update_info field of the _default_.xml file. | [] |
|
GHSA-jjcp-rrm8-4vx5 | A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been rated as critical. This issue affects some unknown processing of the file /goform/AdvSetWrlGstset of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2024-43634 | Windows USB Video Class System Driver Elevation of Privilege Vulnerability | Windows USB Video Class System Driver Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*"
] |
GHSA-rfrf-3h83-9qr2 | The SMTP ALG in Clavister CorePlus before 8.80.04, and 8.81.00, does not properly parse SMTP commands in certain circumstances, which allows remote attackers to bypass address blacklists. | [] |
|
CVE-2022-0145 | Cross-site Scripting (XSS) - Stored in forkcms/forkcms | Cross-site Scripting (XSS) - Stored in GitHub repository forkcms/forkcms prior to 5.11.1. | [
"cpe:2.3:a:fork-cms:fork_cms:*:*:*:*:*:*:*:*"
] |
GHSA-9cmg-www5-3gxx | Buffer overflow on the Linksys WRT54GL wireless router allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by a certain module in VulnDisco Pack Professional 8.10 through 8.11. NOTE: as of 20090917, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. | [] |
|
GHSA-f2vc-g638-2wm6 | Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability | [] |
|
CVE-2023-48444 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] |
CVE-2015-3201 | Thermostat before 2.0.0 uses world-readable permissions for the web.xml configuration file, which allows local users to obtain user credentials by reading the file. | [
"cpe:2.3:a:redhat:thermostat:*:*:*:*:*:*:*:*"
] |
|
GHSA-w27q-xjw8-g94c | 74CMS v6.0.4 was discovered to contain a cross-site scripting (XSS) vulnerability via /index.php?m=&c=help&a=help_list&key. | [] |
|
CVE-2018-5519 | On F5 BIG-IP 13.0.0-13.1.0.5, 12.1.0-12.1.3.3, or 11.2.1-11.6.3.1, administrative users by way of undisclosed methods can exploit the ssldump utility to write to arbitrary file paths. For users who do not have Advanced Shell access (for example, any user when licensed for Appliance Mode), this allows more permissive file access than intended. | [
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-20345 | Incorrect access control in StackStorm API (st2api) in StackStorm before 2.9.2 and 2.10.x before 2.10.1 allows an attacker (who has a StackStorm account and is authenticated against the StackStorm API) to retrieve datastore items for other users by utilizing the /v1/keys "?scope=all" and "?user=<username>" query filter parameters. Enterprise editions with RBAC enabled are not affected. | [
"cpe:2.3:a:stackstorm:stackstorm:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-6489 | Inefficient Regular Expression Complexity in GitLab | A denial of service vulnerability was identified in GitLab CE/EE, versions 16.7.7 prior to 16.8.6, 16.9 prior to 16.9.4 and 16.10 prior to 16.10.2 which allows an attacker to spike the GitLab instance resources usage resulting in service degradation via chat integration feature. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
CVE-2001-1475 | SSH before 2.0, when using RC4 and password authentication, allows remote attackers to replay messages until a new server key (VK) is generated. | [
"cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*"
] |
|
GHSA-mvr4-323r-rh68 | Cross-site request forgery (CSRF) vulnerability in HP Insight Control for Linux before 6.2 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. | [] |
|
GHSA-xf8w-x8cp-hcc5 | Unrestricted Upload of File with Dangerous Type vulnerability in Kognetiks Kognetiks Chatbot for WordPress chatbot-chatgpt.This issue affects Kognetiks Chatbot for WordPress: from n/a through 2.0.0. | [] |
|
GHSA-m3rg-cpqq-v3gm | Cross-site scripting (XSS) vulnerability in Open Source Security Information Management (OSSIM) before 2.1.2 allows remote attackers to inject arbitrary web script or HTML via the option parameter to the default URI (aka the main menu). | [] |
|
CVE-2024-24695 | Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows - Improper Input Validation | Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access.
| [
"cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:vdi_windows_meeting_clients:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*"
] |
CVE-2024-54031 | netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext | In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext
Access to genmask field in struct nft_set_ext results in unaligned
atomic read:
[ 72.130109] Unable to handle kernel paging request at virtual address ffff0000c2bb708c
[ 72.131036] Mem abort info:
[ 72.131213] ESR = 0x0000000096000021
[ 72.131446] EC = 0x25: DABT (current EL), IL = 32 bits
[ 72.132209] SET = 0, FnV = 0
[ 72.133216] EA = 0, S1PTW = 0
[ 72.134080] FSC = 0x21: alignment fault
[ 72.135593] Data abort info:
[ 72.137194] ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000
[ 72.142351] CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[ 72.145989] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[ 72.150115] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000237d27000
[ 72.154893] [ffff0000c2bb708c] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f84b403, pmd=180000023f835403,
+pte=0068000102bb7707
[ 72.163021] Internal error: Oops: 0000000096000021 [#1] SMP
[...]
[ 72.170041] CPU: 7 UID: 0 PID: 54 Comm: kworker/7:0 Tainted: G E 6.13.0-rc3+ #2
[ 72.170509] Tainted: [E]=UNSIGNED_MODULE
[ 72.170720] Hardware name: QEMU QEMU Virtual Machine, BIOS edk2-stable202302-for-qemu 03/01/2023
[ 72.171192] Workqueue: events_power_efficient nft_rhash_gc [nf_tables]
[ 72.171552] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[ 72.171915] pc : nft_rhash_gc+0x200/0x2d8 [nf_tables]
[ 72.172166] lr : nft_rhash_gc+0x128/0x2d8 [nf_tables]
[ 72.172546] sp : ffff800081f2bce0
[ 72.172724] x29: ffff800081f2bd40 x28: ffff0000c2bb708c x27: 0000000000000038
[ 72.173078] x26: ffff0000c6780ef0 x25: ffff0000c643df00 x24: ffff0000c6778f78
[ 72.173431] x23: 000000000000001a x22: ffff0000c4b1f000 x21: ffff0000c6780f78
[ 72.173782] x20: ffff0000c2bb70dc x19: ffff0000c2bb7080 x18: 0000000000000000
[ 72.174135] x17: ffff0000c0a4e1c0 x16: 0000000000003000 x15: 0000ac26d173b978
[ 72.174485] x14: ffffffffffffffff x13: 0000000000000030 x12: ffff0000c6780ef0
[ 72.174841] x11: 0000000000000000 x10: ffff800081f2bcf8 x9 : ffff0000c3000000
[ 72.175193] x8 : 00000000000004be x7 : 0000000000000000 x6 : 0000000000000000
[ 72.175544] x5 : 0000000000000040 x4 : ffff0000c3000010 x3 : 0000000000000000
[ 72.175871] x2 : 0000000000003a98 x1 : ffff0000c2bb708c x0 : 0000000000000004
[ 72.176207] Call trace:
[ 72.176316] nft_rhash_gc+0x200/0x2d8 [nf_tables] (P)
[ 72.176653] process_one_work+0x178/0x3d0
[ 72.176831] worker_thread+0x200/0x3f0
[ 72.176995] kthread+0xe8/0xf8
[ 72.177130] ret_from_fork+0x10/0x20
[ 72.177289] Code: 54fff984 d503201f d2800080 91003261 (f820303f)
[ 72.177557] ---[ end trace 0000000000000000 ]---
Align struct nft_set_ext to word size to address this and
documentation it.
pahole reports that this increases the size of elements for rhash and
pipapo in 8 bytes on x86_64. | [] |
CVE-2022-26943 | Weak PRNG entropy source used for authentication challenge generation in Motorola MTM5000 | The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the entropy pool to predict authentication challenges. As such, the unit is vulnerable to CVE-2022-24400. | [
"cpe:2.3:h:motorola:mtm5000_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:motorola:mtm5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:mtm5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:motorola:mtm5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:motorola:mtm5400:-:*:*:*:*:*:*:*"
] |
GHSA-c475-923p-gg3c | Windows Graphics Component Elevation of Privilege Vulnerability | [] |
|
CVE-2021-38882 | IBM Spectrum Scale 5.1.0 through 5.1.1.1 could allow a privileged admin to destroy filesystem audit logging records before expiration time. IBM X-Force ID: 209164. | [
"cpe:2.3:a:ibm:spectrum_scale:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-12725 | Havoc Research discovered an authenticated Server-Side Request Forgery (SSRF) via the "JSON" data source of Redash open-source 8.0.0 and prior. Possibly, other connectors are affected. The SSRF is potent and provides a lot of flexibility in terms of being able to craft HTTP requests e.g., by adding headers, selecting any HTTP verb, etc. | [
"cpe:2.3:a:redash:redash:*:*:*:*:*:*:*:*"
] |
|
GHSA-353j-5q9x-xhrh | Multiple cross-site scripting vulnerabilities (XSS) in Bugzilla 2.16.x before 2.16.3 and 2.17.x before 2.17.4 allow remote attackers to insert arbitrary HTML or web script via (1) multiple default German and Russian HTML templates or (2) ALT and NAME attributes in AREA tags as used by the GraphViz graph generation feature for local dependency graphs. | [] |
|
GHSA-w5p3-vhf8-9h55 | McAfee Email and Web Security (EWS) 5.5 through Patch 6 and 5.6 through Patch 3, and McAfee Email Gateway (MEG) 7.0.0 and 7.0.1, allows remote attackers to bypass authentication and obtain an admin session ID via unspecified vectors. | [] |
|
GHSA-4j87-mfhw-m2v7 | Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). | [] |
|
CVE-2024-58020 | HID: multitouch: Add NULL check in mt_input_configured | In the Linux kernel, the following vulnerability has been resolved:
HID: multitouch: Add NULL check in mt_input_configured
devm_kasprintf() can return a NULL pointer on failure,but this
returned value in mt_input_configured() is not checked.
Add NULL check in mt_input_configured(), to handle kernel NULL
pointer dereference error. | [] |
GHSA-75fr-frc7-xq46 | All versions of the NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler where a NULL pointer dereference may lead to denial of service or potential escalation of privileges. | [] |
|
GHSA-hwq5-qgrj-v3f6 | Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0022, CVE-2015-0026, CVE-2015-0030, CVE-2015-0031, CVE-2015-0036, and CVE-2015-0041. | [] |
|
CVE-2023-26986 | An issue in China Mobile OA Mailbox PC v2.9.23 allows remote attackers to execute arbitrary commands on a victim host via user interaction with a crafted EML file sent to their OA mailbox. | [
"cpe:2.3:a:chinamobileltd:oa_mailbox_pc:2.9.23:*:*:*:*:*:*:*"
] |
|
CVE-2012-2423 | The intu-help-qb (aka Intuit Help System Async Pluggable Protocol) handlers in HelpAsyncPluggableProtocol.dll in Intuit QuickBooks 2009 through 2012, when Internet Explorer is used, provide different responses to remote requests depending on whether a ZIP pathname is valid, which allows remote attackers to obtain potentially sensitive information about the installation path and product version via a series of requests involving the Msxml2.XMLHTTP object. | [
"cpe:2.3:a:intuit:quickbooks:2009:*:*:*:*:*:*:*",
"cpe:2.3:a:intuit:quickbooks:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:intuit:quickbooks:2011:*:*:*:*:*:*:*",
"cpe:2.3:a:intuit:quickbooks:2012:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*"
] |
|
GHSA-9882-476q-39vf | A buffer overflow vulnerability in CDataMoji of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document. | [] |
|
GHSA-rj3q-3h4q-28hh | An information disclosure vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft SharePoint Server Information Disclosure Vulnerability'. | [] |
|
GHSA-5xmj-hp6w-j5r5 | An issue was discovered in API/api/Version in Damstra Smart Asset 2020.7. Cross-origin resource sharing trusts random origins by accepting the arbitrary 'Origin: example.com' header and responding with 200 OK and a wildcard 'Access-Control-Allow-Origin: *' header. | [] |
|
GHSA-g4rm-rq29-vh3m | DLP 15.5 MP1 and all prior versions may be susceptible to a cross-site scripting (XSS) vulnerability, a type of issue that can enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. | [] |
|
CVE-2023-45723 | Path Traversal which allows file upload capability affects DRYiCE MyXalytics | HCL DRYiCE MyXalytics is impacted by path traversal vulnerability which allows file upload capability. Certain endpoints permit users to manipulate the path (including the file name) where these files are stored on the server.
| [
"cpe:2.3:a:hcltech:dryice_myxalytics:5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:dryice_myxalytics:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:dryice_myxalytics:6.1:*:*:*:*:*:*:*"
] |
CVE-2024-5449 | WP Dark Mode – WordPress Dark Mode Plugin for Improved Accessibility, Dark Theme, Night Mode, and Social Sharing <= 5.0.4 - Missing Authorization | The WP Dark Mode – WordPress Dark Mode Plugin for Improved Accessibility, Dark Theme, Night Mode, and Social Sharing plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpdm_social_share_save_options function in all versions up to, and including, 5.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings. | [
"cpe:2.3:a:wppool:wp_dark_mode:*:*:*:*:*:wordpress:*:*"
] |
GHSA-7273-hmfq-x6vx | The affected product is vulnerable to an out-of-bounds write via uninitialized pointer, which may allow an attacker to execute arbitrary code. | [] |
|
CVE-2015-6680 | Adobe Shockwave Player before 12.2.0.162 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-6681. | [
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*"
] |
|
GHSA-mrj6-xqg4-cg96 | ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets. | [] |
|
CVE-2007-3897 | Heap-based buffer overflow in Microsoft Outlook Express 6 and earlier, and Windows Mail for Vista, allows remote Network News Transfer Protocol (NNTP) servers to execute arbitrary code via long NNTP responses that trigger memory corruption. | [
"cpe:2.3:a:microsoft:outlook_express:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook_express:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:windows_mail:-:*:*:*:*:vista:*:*"
] |
|
GHSA-4xgg-phxv-52xc | FlashFXP 1.4 uses a weak encryption algorithm for user passwords, which allows attackers to decrypt the passwords and gain access. | [] |
|
GHSA-q4wh-ggfg-f2hj | Inductive Automation Ignition Base64Element Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability.The specific flaw exists within the Base64Element class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-21801. | [] |
|
CVE-2019-14697 | musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code. | [
"cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:x86:*"
] |
|
GHSA-x2j8-43mr-3q57 | IBM Spectrum Scale 5.1.5.0 through 5.1.5.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 239080. | [] |
|
CVE-2014-3999 | The Horde_Ldap library before 2.0.6 for Horde allows remote attackers to bypass authentication by leveraging knowledge of the LDAP bind user DN. | [
"cpe:2.3:a:horde:horde_ldap:*:*:*:*:*:horde:*:*"
] |
|
CVE-2017-7175 | NfSen before 1.3.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the customfmt parameter (aka the "Custom output format" field). | [
"cpe:2.3:a:nfsen:nfsen:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-8326 | s2Member – Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions <= 241114 - Authenticated (Contributor+) Sensitive Information Exposure | The s2Member – Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 241114 via the 'sc_get_details' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including user data and database configuration information, which can lead to reading, updating, or dropping database tables. The vulnerability was partially patched in version 241114. | [] |
GHSA-hxgx-584x-vwm8 | Appwrite Server-Side Request Forgery vulnerability | Appwrite up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component `/v1/avatars/favicon`. This vulnerability allows attackers to access network resources and sensitive information via a crafted GET request. | [] |
GHSA-hjjw-r3wm-fv67 | An issue was discovered in the client side of Zoho ManageEngine Desktop Central 10.0.0.SP-534. An attacker-controlled server can trigger an integer overflow in InternetSendRequestEx and InternetSendRequestByBitrate that leads to a heap-based buffer overflow and Remote Code Execution with SYSTEM privileges. | [] |
|
CVE-2001-1111 | EFTP 2.0.7.337 stores user passwords in plaintext in the eftp2users.dat file. | [
"cpe:2.3:a:khamil_landross_and_zack_jones:eftp:2.0.7.337:*:*:*:*:*:*:*"
] |
|
GHSA-r82h-wc4x-gcp9 | The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue. | [] |
|
GHSA-v778-gjxx-9mjp | A heap buffer overflow occurs in the dfs_v2 romfs filesystem RT-Thread through 5.0.2. | [] |
|
CVE-2024-41657 | GHSL-2024-035: Casdoor CORS misconfiguration | Casdoor is a UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform. In Casdoor 1.577.0 and earlier, a logic vulnerability exists in the beego filter CorsFilter that allows any website to make cross domain requests to Casdoor as the logged in user. Due to the a logic error in checking only for a prefix when authenticating the Origin header, any domain can create a valid subdomain with a valid subdomain prefix (Ex: localhost.example.com), allowing the website to make requests to Casdoor as the current signed-in user. | [
"cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*"
] |
CVE-2021-36003 | Adobe Audition MP4 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe Audition version 14.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:audition:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-57xx-rxxv-4566 | Format string vulnerability in XM Easy Personal FTP Server 5.2.1 allows remote attackers to cause a denial of service (application crash) via format string specifiers in the USER command or certain other available or nonexistent commands. NOTE: It was later reported that 5.3.0 is also vulnerable. | [] |
|
GHSA-f8x6-9fxr-43mm | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GloriaFood Restaurant Menu – Food Ordering System – Table Reservation allows Stored XSS.This issue affects Restaurant Menu – Food Ordering System – Table Reservation: from n/a through 2.4.1. | [] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.