id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-83v8-g5cj-f4m7
|
Huawei Quidway switches with firmware before V200R005C00SPC300 allows remote attackers to gain privileges via a crafted packet.
|
[] |
|
GHSA-v8f5-c8jx-hv8g
|
A vulnerability has been found in Codezips E-Commerce Site 1.0 and classified as critical. This vulnerability affects unknown code of the file admin/addproduct.php. The manipulation of the argument profilepic leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264460.
|
[] |
|
GHSA-h2rg-p9qr-pqcr
|
course/loginas.php in Moodle through 2.2.11, 2.3.x before 2.3.11, 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1 does not enforce the moodle/site:accessallgroups capability requirement for outside-group users in a SEPARATEGROUPS configuration, which allows remote authenticated users to perform "login as" actions via a direct request.
|
[] |
|
GHSA-3p72-rmv7-7jc9
|
The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
|
[] |
|
CVE-2024-7040
|
Improper Access Control in open-webui/open-webui
|
In version v0.3.8 of open-webui/open-webui, there is an improper access control vulnerability. On the frontend admin page, administrators are intended to view only the chats of non-admin members. However, by modifying the user_id parameter, it is possible to view the chats of any administrator, including those of other admin (owner) accounts.
|
[] |
CVE-2023-31447
|
user_login.cgi on Draytek Vigor2620 devices before 3.9.8.4 (and on all versions of Vigor2925 devices) allows attackers to send a crafted payload to modify the content of the code segment, insert shellcode, and execute arbitrary code.
|
[
"cpe:2.3:h:draytek:vigor2620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:draytek:vigor2620_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:draytek:vigor2625_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:draytek:vigor2625:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-15960
|
Cisco Webex Network Recording Admin Page Privilege Escalation Vulnerability
|
A vulnerability in the Webex Network Recording Admin page of Cisco Webex Meetings could allow an authenticated, remote attacker to elevate privileges in the context of the affected page. To exploit this vulnerability, the attacker must be logged in as a low-level administrator. The vulnerability is due to insufficient access control validation. An attacker could exploit this vulnerability by submitting a crafted URL request to gain privileged access in the context of the affected page. A successful exploit could allow the attacker to elevate privileges in the Webex Recording Admin page, which could allow them to view or delete recordings that they would not normally be able to access.
|
[
"cpe:2.3:a:cisco:webex_meetings:*:*:*:*:*:*:*:*"
] |
CVE-2023-6173
|
SQLi in TeoSOFT Software TeoBASE
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TeoSOFT Software TeoBASE allows SQL Injection.This issue affects TeoBASE: through 27032024. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
GHSA-gfhg-7w8w-j26f
|
The TrendMicro Activity Monitor Module (tmactmon.sys) 2.52.0.1002 in Trend Micro Internet Pro 2008 and 2009, and Security Pro 2008 and 2009, allows local users to gain privileges via a crafted IRP in a METHOD_NEITHER IOCTL request to \Device\tmactmon that overwrites memory.
|
[] |
|
CVE-2025-1044
|
Logsign Unified SecOps Platform Authentication Bypass Vulnerability
|
Logsign Unified SecOps Platform Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the web service, which listens on TCP port 443 by default. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25336.
|
[] |
CVE-2014-2884
|
The ProcessVolumeDeviceControlIrp function in Ntdriver.c in TrueCrypt 7.1a allows local users to bypass access restrictions and obtain sensitive information about arbitrary files via a (1) TC_IOCTL_OPEN_TEST or (2) TC_IOCTL_GET_SYSTEM_DRIVE_CONFIG IOCTL call.
|
[
"cpe:2.3:a:truecrypt_project:truecrypt:7.1:a:*:*:*:*:*:*"
] |
|
GHSA-h2jg-46xv-c74w
|
SSRF in URL file upload in Baserow <1.1.0 allows remote authenticated users to retrieve files from the internal server network exposed over HTTP by inserting an internal address.
|
[] |
|
GHSA-8rpf-vwv9-2wfm
|
Bootloader contains a vulnerability in NVIDIA MB2, which may cause free-the-wrong-heap, which may lead to limited denial of service.
|
[] |
|
CVE-2023-7002
|
The Backup Migration plugin for WordPress is vulnerable to OS Command Injection in all versions up to, and including, 1.3.9 via the 'url' parameter. This vulnerability allows authenticated attackers, with administrator-level permissions and above, to execute arbitrary commands on the host operating system.
|
[
"cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-5p3x-h55j-m7f2
|
BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20936.
|
[] |
|
GHSA-p85p-4ghw-9wfv
|
In audio service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
|
[] |
|
CVE-2004-2203
|
Ansel 1.2 through 2.0 uses insecure default permissions, which allows remote attackers to gain access to web readable directories.
|
[
"cpe:2.3:a:ansel:ansel:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ansel:ansel:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ansel:ansel:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ansel:ansel:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-65q9-fq96-wqpj
|
Moxa TN-5900 v3.1 series routers, MGate 5109 v2.2 series protocol gateways, and MGate 5101-PBM-MN v2.1 series protocol gateways were discovered to contain a memory leak which allows attackers to cause a Denial of Service (DoS) via crafted packets.
|
[] |
|
CVE-1999-0301
|
Buffer overflow in SunOS/Solaris ps command.
|
[
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] |
|
CVE-2025-2324
|
A MOVEit Transfer user configured as a Shared Account can gain unintended List permissions on a folder
|
Improper Privilege Management vulnerability for users configured as Shared Accounts in Progress MOVEit Transfer (SFTP module) allows Privilege Escalation.This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.12, from 2024.0.0 before 2024.0.8, from 2024.1.0 before 2024.1.2.
|
[] |
GHSA-6cxj-8mc8-27h3
|
Patterson Application Service in Patterson Eaglesoft 18 through 21 accepts the same certificate authentication across different customers' installations (that have the same software version). This provides remote access to SQL database credentials. (In the normal use of the product, retrieving those credentials only occurs after a username/password authentication step; however, this authentication step is on the client side, and an attacker can develop their own client that skips this step.)
|
[] |
|
CVE-2014-1299
|
WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-9qg7-g9pc-vr4c
|
A vulnerability was found in code-projects Job Diary 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /view-cad.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
GHSA-vhmm-vh3j-5vww
|
An issue in Horizon Business Services Inc. Caterease 16.0.1.1663 through 24.0.1.2405 and possibly later versions, allows a remote attacker to perform a Traffic Injection attack due to improper verification of the source of a communication channel.
|
[] |
|
CVE-2011-1033
|
Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement.
|
[
"cpe:2.3:a:ibm:informix_dynamic_server:11.50:*:*:*:*:*:*:*"
] |
|
CVE-2019-11595
|
In uBlock before 0.9.5.15, the $rewrite filter option allows filter-list maintainers to run arbitrary code in a client-side session when a web service loads a script for execution using XMLHttpRequest or Fetch, and the script origin has an open redirect.
|
[
"cpe:2.3:a:ublockorigin:ublock_origin:*:*:*:*:*:*:*:*"
] |
|
GHSA-hg52-c72h-rv36
|
Unspecified vulnerability in the Advanced Queuing component in Oracle Database 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote authenticated users to affect confidentiality and integrity, related to DBMS_AQIN. NOTE: the previous information was obtained from the April 2009 CPU. Oracle has not commented on reliable researcher claims that this issue is SQL injection in the DEQ_EXEJOB procedure.
|
[] |
|
GHSA-8jvq-cj68-w363
|
Incorrect Privilege Assignment vulnerability in Wouter Dijkstra DD Roles allows Privilege Escalation.This issue affects DD Roles: from n/a through 4.1.
|
[] |
|
CVE-2024-35359
|
A vulnerability has been discovered in Diño Physics School Assistant version 2.3. The vulnerability impacts an unidentified code within the file /classes/Master.php?f=view_item. Manipulating the argument id can result in SQL injection.
|
[
"cpe:2.3:a:dino_physics_school_assistant_project:dino_physics_school_assistant:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dino_physics_school_assistant_project:dino_physics_school_assistant:2.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-22670
|
An uninitialized pointer may be exploited in Fatek FvDesigner Version 1.5.76 and prior while the application is processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.
|
[
"cpe:2.3:a:fatek:fvdesigner:*:*:*:*:*:*:*:*"
] |
|
GHSA-vrvw-x9cv-3j76
|
Nextcloud Desktop Client prior to 3.1.3 is vulnerable to resource injection by way of missing validation of URLs, allowing a malicious server to execute remote commands. User interaction is needed for exploitation.
|
[] |
|
CVE-2014-6421
|
Use-after-free vulnerability in the SDP dissector in Wireshark 1.10.x before 1.10.10 allows remote attackers to cause a denial of service (application crash) via a crafted packet that leverages split memory ownership between the SDP and RTP dissectors.
|
[
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.9:*:*:*:*:*:*:*"
] |
|
CVE-2018-4218
|
An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] |
|
GHSA-wpc7-m8p2-2c5w
|
A vulnerability was found in SourceCodester Simple Student Information System and classified as critical. This issue affects some unknown processing of the file manage_course.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205835.
|
[] |
|
GHSA-jph8-qvmw-2p95
|
dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
|
[] |
|
GHSA-xx9f-xg2j-c647
|
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 IRC (All versions >= V2.0), SIMATIC CP 1543-1 (All versions < V3.0.22), SIMATIC CP 1543SP-1 (All versions >= V2.0), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions >= V2.0), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions >= V2.0), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions >= V2.0), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 1543-1 (All versions < V3.0.22), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions). By injecting code to specific configuration options for OpenVPN, an attacker could execute arbitrary code with elevated privileges.
|
[] |
|
CVE-2017-15725
|
An XML External Entity Injection vulnerability exists in Dzone AnswerHub.
|
[
"cpe:2.3:a:devada:dzone_answerhub:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-32512
|
WordPress Revamp CRM for WooCommerce plugin <= 1.1.2 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in revampcrm Revamp CRM for WooCommerce allows Reflected XSS. This issue affects Revamp CRM for WooCommerce: from n/a through 1.1.2.
|
[] |
CVE-2023-4141
|
The WP Ultimate CSV Importer plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 7.9.8 via the '->cus2' parameter. This allows authenticated attackers with author-level permissions or above, if the administrator previously grants access in the plugin settings, to create a PHP file and execute code on the server. The author resolved this vulnerability by removing the ability for authors and editors to import files, please note that this means php file creation is still allowed for site administrators, use the plugin with caution.
|
[
"cpe:2.3:a:smackcoders:wp_ultimate_csv_importer:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-8ggj-j64g-w9r2
|
A vulnerability classified as critical was found in Home Clean Services Management System 1.0. This vulnerability affects the file login.php. The manipulation of the argument email with the input admin%'/**/AND/**/(SELECT/**/5383/**/FROM/**/(SELECT(SLEEP(2)))JPeh)/**/AND/**/'frfq%'='frfq leads to sql injection. The attack can be initiated remotely but it requires authentication. Exploit details have been disclosed to the public.
|
[] |
|
GHSA-q285-4wh7-3xwx
|
qtparted has insecure library loading which may allow arbitrary code execution
|
[] |
|
CVE-2018-12065
|
A Local File Inclusion vulnerability in /system/WCore/WHelper.php in Creatiwity wityCMS 0.6.2 allows remote attackers to include local PHP files (execute PHP code) or read non-PHP files by replacing a helper.json file.
|
[
"cpe:2.3:a:creatiwity:witycms:0.6.2:*:*:*:*:*:*:*"
] |
|
GHSA-6fx8-hgj7-vwjv
|
Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2016 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Exchange Spoofing Vulnerability," a different vulnerability than CVE-2016-0029.
|
[] |
|
GHSA-pq2f-3fg3-rw99
|
SQL Injection in WordPress Zero Spam WordPress plugin
|
The WordPress Zero Spam WordPress plugin before 5.2.13 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection
|
[] |
GHSA-757p-vx43-fp9r
|
KubePi Privilege Escalation vulnerability
|
SummaryA normal user has permission to create/update users, they can become admin by editing the `isadmin` value in the requestPoCChange the value of the `isadmin` field in the request to true:
https://drive.google.com/file/d/1e8XJbIFIDXaFiL-dqn0a0b6u7o3CwqSG/previewImpactElevate user privileges
|
[] |
CVE-2018-10052
|
iScripts SupportDesk v4.3 has XSS via the admin/inteligentsearchresult.php txtinteligentsearch parameter.
|
[
"cpe:2.3:a:iscripts:supportdesk:4.3:*:*:*:*:*:*:*"
] |
|
CVE-2020-4791
|
IBM Security Identity Governance and Intelligence 5.2.6 could allow an attacker to obtain sensitive information using main in the middle attacks due to improper certificate validation. IBM X-Force ID: 189379.
|
[
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.6:*:*:*:*:*:*:*"
] |
|
GHSA-jvw7-x6m4-v729
|
Maxtricity Tagger 0.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing passwords via a direct request for tagger.mdb.
|
[] |
|
CVE-2022-41283
|
A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains an out of bounds write vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process.
|
[
"cpe:2.3:a:siemens:jt2go:-:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*"
] |
|
GHSA-7xgj-vh96-453m
|
Missing Authorization vulnerability in IDX IMPress Listings allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects IMPress Listings: from n/a through 2.6.2.
|
[] |
|
CVE-2024-51496
|
LibreNMS has a Reflected XSS ('Cross-site Scripting') in librenms/includes/html/pages/wireless.inc.php
|
LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Reflected Cross-Site Scripting (XSS) vulnerability in the "metric" parameter of the "/wireless" and "/health" endpoints allows attackers to inject arbitrary JavaScript. This vulnerability results in the execution of malicious code when a user accesses the page with a malicious "metric" parameter, potentially compromising their session and allowing unauthorized actions. This vulnerability is fixed in 24.10.0.
|
[
"cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*"
] |
GHSA-ghh6-jcf7-xpx9
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in techmix Direct Checkout Button for WooCommerce allows Stored XSS. This issue affects Direct Checkout Button for WooCommerce: from n/a through 1.0.
|
[] |
|
CVE-2024-31714
|
Buffer Overflow vulnerability in Waxlab wax v.0.9-3 and before allows an attacker to cause a denial of service via the Lua library component.
|
[
"cpe:2.3:a:waxlab:wax:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-28348
|
HashiCorp Nomad and Nomad Enterprise 0.9.0 up to 0.12.7 client Docker file sandbox feature may be subverted when not explicitly disabled or when using a volume mount type. Fixed in 0.12.8, 0.11.7, and 0.10.8.
|
[
"cpe:2.3:a:hashicorp:nomad:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:hashicorp:nomad:*:*:*:*:-:*:*:*"
] |
|
CVE-2022-22712
|
Windows Hyper-V Denial of Service Vulnerability
|
Windows Hyper-V Denial of Service Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:azure:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
CVE-2018-8874
|
In 2345 Security Guard 3.6, the driver file (2345Wrath.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x00222054.
|
[
"cpe:2.3:a:2345_security_guard_project:2345_security_guard:3.6:*:*:*:*:*:*:*"
] |
|
GHSA-7537-qjq2-jjg9
|
Directory traversal vulnerability in the GetData method in the Dell DellSystemLite.Scanner ActiveX control in DellSystemLite.ocx 1.0.0.0 allows remote attackers to read arbitrary files via directory traversal sequences in the fileID parameter.
|
[] |
|
GHSA-7f28-jf4j-j4rc
|
Untrusted search path vulnerability in RealPlayer SP 1.1.5 12.0.0.879 allows local users to gain privileges via a Trojan horse rio500.dll file in the current working directory, as demonstrated by a directory that contains a .avi file. NOTE: some of these details are obtained from third party information.
|
[] |
|
CVE-2022-42301
|
An issue was discovered in Veritas NetBackup through 10.0.0.1 and related Veritas products. The NetBackup Primary server is vulnerable to an XML External Entity (XXE) injection attack through the nbars process.
|
[
"cpe:2.3:a:veritas:netbackup:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-38164
|
SAP ERP Financial Accounting (RFOPENPOSTING_FR) versions - SAP_APPL - 600, 602, 603, 604, 605, 606, 616, SAP_FIN - 617, 618, 700, 720, 730, SAPSCORE - 125, S4CORE, 100, 101, 102, 103, 104, 105, allows a registered attacker to invoke certain functions that would otherwise be restricted to specific users. These functions are normally exposed over the network and once exploited the attacker may be able to view and modify financial accounting data that only a specific user should have access to.
|
[
"cpe:2.3:a:sap:erp_financial_accounting:100:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:101:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:102:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:103:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:104:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:105:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:602:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:603:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:604:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:605:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:606:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:616:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:618:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:720:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:730:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:s4core:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:sap_appl_-_600:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:sap_fin_-_617:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_financial_accounting:sapscore_-_125:*:*:*:*:*:*:*"
] |
|
GHSA-3vwp-294x-6v9c
|
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
|
[] |
|
CVE-2024-47812
|
Cross-site Scripting (XSS) on Special:RequestImportQueue when displaying request date in ImportDump
|
ImportDump is an extension for mediawiki designed to automate user import requests. Anyone who can edit the interface strings of a wiki (typically administrators and interface admins) can embed XSS payloads in the messages for dates, and thus XSS anyone who views Special:RequestImportQueue. This issue has been patched in commit `d054b95` and all users are advised to apply this commit to their branch. Users unable to upgrade may either Prevent access to Special:RequestImportQueue on all wikis, except for the global wiki; and If an interface administrator (or equivalent) level protection is available (which is not provided by default) on the global wiki, protect the affected messages up to that level. This causes the XSS to be virtually useless as users with those rights can already edit Javascript pages. Or Prevent access to Special:RequestImportQueue altogether.
|
[] |
CVE-2017-9969
|
An information disclosure vulnerability exists in Schneider Electric's IGSS Mobile application version 3.01 and prior. Passwords are stored in clear text in the configuration which can result in exposure of sensitive information.
|
[
"cpe:2.3:a:schneider-electric:igss_mobile:*:*:*:*:*:android:*:*",
"cpe:2.3:a:schneider-electric:igss_mobile:*:*:*:*:*:iphone_os:*:*"
] |
|
CVE-2020-1985
|
Secdo: Incorrect Default Permissions
|
Incorrect Default Permissions on C:\Programdata\Secdo\Logs folder in Secdo allows local authenticated users to overwrite system files and gain escalated privileges. This issue affects all versions Secdo for Windows.
|
[
"cpe:2.3:a:paloaltonetworks:secdo:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2022-22836
|
CoreFTP Server before 727 allows directory traversal (for file creation) by an authenticated attacker via ../ in an HTTP PUT request.
|
[
"cpe:2.3:a:coreftp:core_ftp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_639:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_640:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_641:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_642:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_645:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_647:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_649:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_651:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_653:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_655:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_656:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_657:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_658:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_659:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_665:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_667:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_668:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_671:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_673:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_674:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_676:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_677:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_679:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_682:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_687:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_689:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_691:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_694:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_695:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_697:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_699:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_702:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_704:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_705:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_711:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_713:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_715:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_719:*:*:*:*:*:*",
"cpe:2.3:a:coreftp:core_ftp:2.0:build_725:*:*:*:*:*:*"
] |
|
CVE-2021-23039
|
On version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3, 14.1.x before 14.1.2.8, and all versions of 13.1.x and 12.1.x, when IPSec is configured on a BIG-IP system, undisclosed requests from an authorized remote (IPSec) peer, which already has a negotiated Security Association, can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-pxgw-4h4r-v72f
|
Vulnerability in the Oracle Email Center component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
|
[] |
|
GHSA-rpqp-56j6-6mjp
|
A vulnerability classified as problematic was found in CalendarXP up to 10.0.1. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 10.0.2 is able to address this issue. The name of the patch is e3715b2228ddefe00113296069969f9e184836da. It is recommended to upgrade the affected component. VDB-215902 is the identifier assigned to this vulnerability.
|
[] |
|
CVE-2019-1389
|
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1397, CVE-2019-1398.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*"
] |
|
CVE-2021-21029
|
Magento Commerce Reflected Cross-site Scripting Vulnerability Could Lead To Arbitrary JavaScript Execution
|
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a Reflected Cross-site Scripting vulnerability via 'file' parameter. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Access to the admin console is required for successful exploitation.
|
[
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.6:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.6:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:p1:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.1:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.1:-:*:*:open_source:*:*:*"
] |
CVE-2023-24686
|
An issue in the CSV Import function of ChurchCRM v4.5.3 and below allows attackers to execute arbitrary code via importing a crafted CSV file.
|
[
"cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*"
] |
|
GHSA-fh45-c3g8-q944
|
SQL injection vulnerability in list_list.php in Realty Webware Technologies Web-Base 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] |
|
CVE-2024-45615
|
Libopensc: pkcs15init: usage of uninitialized values in libopensc and pkcs15init
|
A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK.
The problem is missing initialization of variables expected to be initialized (as arguments to other functions, etc.).
|
[
"cpe:/o:redhat:enterprise_linux:10",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*"
] |
CVE-2021-39020
|
IBM Guardium Data Encryption (GDE) 4.0.0.7 and lower stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 213855.
|
[
"cpe:2.3:a:ibm:guardium_data_encryption:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-52698
|
calipso: fix memory leak in netlbl_calipso_add_pass()
|
In the Linux kernel, the following vulnerability has been resolved:
calipso: fix memory leak in netlbl_calipso_add_pass()
If IPv6 support is disabled at boot (ipv6.disable=1),
the calipso_init() -> netlbl_calipso_ops_register() function isn't called,
and the netlbl_calipso_ops_get() function always returns NULL.
In this case, the netlbl_calipso_add_pass() function allocates memory
for the doi_def variable but doesn't free it with the calipso_doi_free().
BUG: memory leak
unreferenced object 0xffff888011d68180 (size 64):
comm "syz-executor.1", pid 10746, jiffies 4295410986 (age 17.928s)
hex dump (first 32 bytes):
00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<...>] kmalloc include/linux/slab.h:552 [inline]
[<...>] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]
[<...>] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111
[<...>] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739
[<...>] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]
[<...>] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800
[<...>] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515
[<...>] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811
[<...>] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
[<...>] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339
[<...>] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934
[<...>] sock_sendmsg_nosec net/socket.c:651 [inline]
[<...>] sock_sendmsg+0x157/0x190 net/socket.c:671
[<...>] ____sys_sendmsg+0x712/0x870 net/socket.c:2342
[<...>] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396
[<...>] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429
[<...>] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46
[<...>] entry_SYSCALL_64_after_hwframe+0x61/0xc6
Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with Syzkaller
[PM: merged via the LSM tree at Jakub Kicinski request]
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2024-54401
|
WordPress Advanced Fancybox plugin <= 1.1.1 - CSRF to Stored XSS vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Turcu Ciprian Advanced Fancybox allows Stored XSS.This issue affects Advanced Fancybox: from n/a through 1.1.1.
|
[] |
CVE-2010-3964
|
Unrestricted file upload vulnerability in the Document Conversions Launcher Service in Microsoft Office SharePoint Server 2007 SP2, when the Document Conversions Load Balancer Service is enabled, allows remote attackers to execute arbitrary code via a crafted SOAP request to TCP port 8082, aka "Malformed Request Code Execution Vulnerability."
|
[
"cpe:2.3:a:microsoft:sharepoint_server:2007:sp2:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2007:sp2:x64:*:*:*:*:*"
] |
|
GHSA-r3f9-fq9r-q5h8
|
Buffer overflow in the sh_hash_compdata function for Samhain 1.8.9 through 2.0.1, when running in update mode ("-t update"), might allow attackers to execute arbitrary code.
|
[] |
|
GHSA-j95v-2qpj-v897
|
A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session.
|
[] |
|
CVE-1999-0593
|
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
|
[
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-2815
|
SQL injection vulnerability in shopping/index.php in MyMarket 1.72 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:mymarket:mymarket:1.72:*:*:*:*:*:*:*"
] |
|
CVE-2017-15824
|
In Android releases from CAF using the linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-06-05, the function UpdateDeviceStatus() writes a local stack buffer without initialization to flash memory using WriteToPartition() which may potentially leak memory.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-qg73-g3cf-vhhh
|
NocoDB Allows Preview of Files with Dangerous Content
|
SummaryAttacker can upload a html file with malicious content. If user tries to open that file in browser malicious scripts can be executed leading Stored XSS(Cross-Site Script) attack.PoCNocoDB was configured using the Release Binary `Noco-macos-arm64`, and nocodb version 0.202.9 (currently the latest version) was used.
binary hash infos: md5(164b727f287af56168bc16fba622d0b4) / sha256(43e8e97f4c5f5330613abe071a359f84e4514b7186f92954b678087c37b7832e)
<img width="665" alt="image" src="https://user-images.githubusercontent.com/86613161/287472673-aeb60a02-2080-429f-8583-9f130ab62779.png">1. Run the binary to start the server and access the arbitrary table dashboard.Here, used the default `Features` table.2. Click `+` in the table `field header` to add an `attachment` field.3. Click the `Add File(s)` button to select and upload files.Here, `test.html` containing `<script>alert(document.domain)</script>` was uploaded.4. Check the uploaded file path.<img width="1163" alt="image" src="https://user-images.githubusercontent.com/86613161/287473337-b1c7c781-2fb5-4bd0-b464-dbd3d4158f04.png"5. Access the uploaded file path.When the file path is accessed, the `<script>alert(document.domain)</script>` script statement contained in the file is executed and the server host appears in the alert message.ImpactThis allows remote attacker to execute JavaScript code in the context of the user accessing the vector. An attacker could have used this vulnerability to execute requests in the name of a logged-in user or potentially collect information about the attacked user by displaying a malicious form.
|
[] |
CVE-2005-3729
|
Idetix Software Systems Revize CMS allows remote attackers to obtain sensitive information via direct requests to files in the revize/debug directory, such as (1) apptables.html and (2) main.html.
|
[
"cpe:2.3:a:revize_cms:revize_cms:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-6582
|
SQL Injection exists in the Zh GoogleMap 8.4.0.0 component for Joomla! via the id parameter in a getPlacemarkDetails, getPlacemarkHoverText, getPathHoverText, or getPathDetails request.
|
[
"cpe:2.3:a:zh_googlemap_project:zh_googlemap:8.4.0.0:*:*:*:*:joomla\\!:*:*"
] |
|
CVE-2025-31218
|
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.5. An app may be able to observe the hostnames of new network connections.
|
[] |
|
CVE-2020-27428
|
A DOM-based cross-site scripting (XSS) vulnerability in Scratch-Svg-Renderer v0.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted sb3 file.
|
[
"cpe:2.3:a:mit:scratch-svg-renderer:0.2.0:*:*:*:*:node.js:*:*"
] |
|
GHSA-hvfc-r626-888m
|
PCRE before 8.36 mishandles the /(((a\2)|(a*)\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
|
[] |
|
CVE-2020-36171
|
The Elementor Website Builder plugin before 3.0.14 for WordPress does not properly restrict SVG uploads.
|
[
"cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-68gv-xmgv-xhwv
|
Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to write files or disclose sensitive information on an affected device.
For more information about these vulnerabilities, see the Details section of this advisory.
|
[] |
|
CVE-2018-12255
|
An XSS issue was discovered in InvoicePlane 1.5.10 via the "Quote PDF Password(Optional)" field.
|
[
"cpe:2.3:a:invoiceplane:invoiceplane:1.5.10:*:*:*:*:*:*:*"
] |
|
GHSA-wgjp-92pm-j728
|
SAP Mobile Platform SDK allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service (i.e. denial of service). Fixed in versions 3.1 SP03 PL02, SDK 3.1 SP04, or later.
|
[] |
|
GHSA-4rrx-m76x-mwvv
|
Tenda W20E router V15.11.0.6 (US_W20EV4.0br_V15.11.0.6(1068_1546_841)_CN_TDC) contains a stack overflow vulnerability in the function formDelDhcpRule with the request /goform/delDhcpRules/
|
[] |
|
CVE-2024-23486
|
Plaintext storage of a password issue exists in BUFFALO wireless LAN routers, which may allow a network-adjacent unauthenticated attacker with access to the product's login page may obtain configured credentials.
|
[
"cpe:2.3:a:buffalo_inc:wsr-2533dhp2:1.06:*:*:*:*:*:*:*",
"cpe:2.3:a:buffalo_inc:a2533dhp2:1.06:*:*:*:*:*:*:*",
"cpe:2.3:a:buffalo:a2533dhp2:1.06:*:*:*:*:*:*:*",
"cpe:2.3:a:buffalo:wsr-2533dhpl:1.06:*:*:*:*:*:*:*"
] |
|
CVE-2024-56006
|
WordPress Jetpack Debug Tools plugin < 2.0.1 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Automattic Jetpack Debug Tools.This issue affects Jetpack Debug Tools: from n/a before 2.0.1.
|
[] |
GHSA-w4wp-hvcq-c5fc
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in sahumedia SAHU TikTok Pixel for E-Commerce plugin <= 1.2.2 versions.
|
[] |
|
GHSA-277p-ffm3-r4h5
|
** DISPUTED ** CMS Made Simple (CMSMS) 2.1.6 allows remote authenticated administrators to execute arbitrary PHP code via the code parameter to admin/editusertag.php, related to the CreateTagFunction and CallUserTag functions. NOTE: the vendor reportedly has stated this is "a feature, not a bug."
|
[] |
|
CVE-2020-10221
|
lib/ajaxHandlers/ajaxAddTemplate.php in rConfig through 3.94 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the fileName POST parameter.
|
[
"cpe:2.3:a:rconfig:rconfig:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-32601
|
WordPress Twispay Credit Card Payments Plugin <= 2.1.2 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in twispay Twispay Credit Card Payments allows Reflected XSS. This issue affects Twispay Credit Card Payments: from n/a through 2.1.2.
|
[] |
CVE-2006-1481
|
SQL injection vulnerability in search.php in PHP Ticket 0.71 allows remote authenticated users to execute arbitrary SQL commands and obtain usernames and passwords via the frm_search_in parameter.
|
[
"cpe:2.3:a:php_ticket:php_ticket:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php_ticket:php_ticket:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php_ticket:php_ticket:0.6:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.