id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-8gw9-w9jh-ghwc
|
The EmbedPress WordPress plugin before 3.9.2 does not sanitise and escape user input before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
[] |
|
CVE-2008-5810
|
WBPublish (aka WBPublish.exe) in Fujitsu-Siemens WebTransactions 7.0, 7.1, and possibly other versions allows remote attackers to execute arbitrary commands via shell metacharacters in input that is sent through HTTP and improperly used during temporary session data cleanup, possibly related to (1) directory names, (2) template names, and (3) session IDs.
|
[
"cpe:2.3:a:fujitsu-siemens:webtransactions:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fujitsu-siemens:webtransactions:7.1:*:*:*:*:*:*:*"
] |
|
CVE-2015-2095
|
Heap-based buffer overflow in the SetConnectInfo function in the WESPPTZ.WESPPTZCtrl.1 ActiveX control in WebGate eDVR Manager allows remote attackers to execute arbitrary code via crafted arguments.
|
[
"cpe:2.3:a:webgateinc:edvr_manager:2.6.4:*:*:*:*:*:*:*"
] |
|
CVE-2006-0533
|
Cross-site scripting (XSS) vulnerability in webmailaging.cgi in cPanel allows remote attackers to inject arbitrary web script or HTML via the numdays parameter.
|
[
"cpe:2.3:a:cpanel:cpanel:-:*:*:*:*:*:*:*"
] |
|
GHSA-6rpr-qxfh-rg9p
|
Unspecified vulnerability in the client in Symantec Veritas Backup Exec for Windows Servers 11d has unknown impact and remote attack vectors. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine.
|
[] |
|
GHSA-ggpj-5v2h-5jrp
|
An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.
|
[] |
|
GHSA-g7fp-c8p5-c8h7
|
The Inventory Plugin for Symantec Management Agent prior to 7.6 POST HF7, 8.0 POST HF6, or 8.1 RU7 may be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
|
[] |
|
GHSA-pm7m-qqmg-jh65
|
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. The vulnerability is caused by a computation that writes data past the end of the intended buffer; the computation is part of the image conversion module that handles Enhanced Metafile Format Plus (EMF+) data. The vulnerability is a result of an out of range pointer offset that is used to access sub-elements of an internal data structure. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
|
[] |
|
CVE-2024-20469
|
Cisco Identity Services Engine Command Injection Vulnerability
|
A vulnerability in specific CLI commands in Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have valid Administrator privileges on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.
|
[
"cpe:2.3:a:cisco:identity_services_engine_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3:patch3:*:*:*:*:*:*"
] |
CVE-2023-35731
|
D-Link DAP-2622 DDP Reset Factory Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability
|
D-Link DAP-2622 DDP Reset Factory Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20058.
|
[
"cpe:2.3:a:d-link:dap-2622:*:*:*:*:*:*:*:*"
] |
CVE-2006-3793
|
PHP remote file inclusion vulnerability in constants.php in SiteDepth CMS 3.01 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the SD_DIR parameter.
|
[
"cpe:2.3:a:sitedepth:sitedepth_cms:*:*:*:*:*:*:*:*"
] |
|
GHSA-g44j-f8wm-6622
|
Stored cross-site scripting (XSS) vulnerability in the manage vocabulary page in Liferay Portal 7.4.2 through 7.4.3.87, and Liferay DXP 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a Vocabulary's 'description' text field.
|
[] |
|
CVE-2025-29978
|
Microsoft PowerPoint Remote Code Execution Vulnerability
|
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
|
[] |
CVE-2021-25168
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webupdatecomponent function.
|
[
"cpe:2.3:o:hpe:baseboard_management_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_70_system:-:*:*:*:*:*:*:*"
] |
|
CVE-2004-2155
|
Online-bookmarks before 0.4.6 allows remote attackers to bypass its authentication mechanism via a direct request to (1) config/*, (2) bookmarks.php, (3) footer.php, (4) main.php, (5) tree.php, or (6) functions.php.
|
[
"cpe:2.3:a:online-bookmarks:web_based_bookmark_application:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:online-bookmarks:web_based_bookmark_application:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:online-bookmarks:web_based_bookmark_application:0.4.4:*:*:*:*:*:*:*"
] |
|
CVE-2025-37958
|
mm/huge_memory: fix dereferencing invalid pmd migration entry
|
In the Linux kernel, the following vulnerability has been resolved:
mm/huge_memory: fix dereferencing invalid pmd migration entry
When migrating a THP, concurrent access to the PMD migration entry during
a deferred split scan can lead to an invalid address access, as
illustrated below. To prevent this invalid access, it is necessary to
check the PMD migration entry and return early. In this context, there is
no need to use pmd_to_swp_entry and pfn_swap_entry_to_page to verify the
equality of the target folio. Since the PMD migration entry is locked, it
cannot be served as the target.
Mailing list discussion and explanation from Hugh Dickins: "An anon_vma
lookup points to a location which may contain the folio of interest, but
might instead contain another folio: and weeding out those other folios is
precisely what the "folio != pmd_folio((*pmd)" check (and the "risk of
replacing the wrong folio" comment a few lines above it) is for."
BUG: unable to handle page fault for address: ffffea60001db008
CPU: 0 UID: 0 PID: 2199114 Comm: tee Not tainted 6.14.0+ #4 NONE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:split_huge_pmd_locked+0x3b5/0x2b60
Call Trace:
<TASK>
try_to_migrate_one+0x28c/0x3730
rmap_walk_anon+0x4f6/0x770
unmap_folio+0x196/0x1f0
split_huge_page_to_list_to_order+0x9f6/0x1560
deferred_split_scan+0xac5/0x12a0
shrinker_debugfs_scan_write+0x376/0x470
full_proxy_write+0x15c/0x220
vfs_write+0x2fc/0xcb0
ksys_write+0x146/0x250
do_syscall_64+0x6a/0x120
entry_SYSCALL_64_after_hwframe+0x76/0x7e
The bug is found by syzkaller on an internal kernel, then confirmed on
upstream.
|
[] |
CVE-2006-3284
|
Cross-site scripting (XSS) vulnerability in Dating Agent PRO 4.7.1 allows remote attackers to inject arbitrary web script or HTML via the login parameter in (1) webmaster/index.php and (2) search.php.
|
[
"cpe:2.3:a:datetopia:dating_agent_pro:4.7.1:*:*:*:*:*:*:*"
] |
|
GHSA-mf25-83qx-cpwh
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] |
|
GHSA-7hfx-h3j3-rwq4
|
D-Tale server-side request forgery through Web uploads
|
ImpactUsers hosting D-Tale publicly can be vulnerable to server-side request forgery (SSRF) allowing attackers to access files on the server.PatchesUsers should upgrade to version 3.9.0 where the "Load From the Web" input is turned off by default. You can find out more information on how to turn it back on [here](https://github.com/man-group/dtale?tab=readme-ov-file#load-data--sample-datasets)WorkaroundsThe only workaround for versions earlier than 3.9.0 is to only host D-Tale to trusted users.ReferencesSee "Load Data & Sample Datasets" [documentation](https://github.com/man-group/dtale?tab=readme-ov-file#load-data--sample-datasets)
|
[] |
GHSA-c6qp-cg3c-4g5h
|
Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055.
|
[] |
|
GHSA-2xf7-r7hp-r5qc
|
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
|
[] |
|
GHSA-9xhq-55qx-pw5h
|
Software Update in Apple Mac OS X through 10.7.5 does not prevent plugin loading within the marketing-text WebView, which allows man-in-the-middle attackers to execute plugin code by modifying the client-server data stream.
|
[] |
|
CVE-2024-26627
|
scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler
|
In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler
Inside scsi_eh_wakeup(), scsi_host_busy() is called & checked with host
lock every time for deciding if error handler kthread needs to be waken up.
This can be too heavy in case of recovery, such as:
- N hardware queues
- queue depth is M for each hardware queue
- each scsi_host_busy() iterates over (N * M) tag/requests
If recovery is triggered in case that all requests are in-flight, each
scsi_eh_wakeup() is strictly serialized, when scsi_eh_wakeup() is called
for the last in-flight request, scsi_host_busy() has been run for (N * M -
1) times, and request has been iterated for (N*M - 1) * (N * M) times.
If both N and M are big enough, hard lockup can be triggered on acquiring
host lock, and it is observed on mpi3mr(128 hw queues, queue depth 8169).
Fix the issue by calling scsi_host_busy() outside the host lock. We don't
need the host lock for getting busy count because host the lock never
covers that.
[mkp: Drop unnecessary 'busy' variables pointed out by Bart]
|
[] |
CVE-2024-11875
|
Add infos to the events calendar <= 1.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The Add infos to the events calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fuss' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
CVE-2017-5662
|
In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.
|
[
"cpe:2.3:a:apache:batik:*:*:*:*:*:*:*:*"
] |
|
GHSA-r3j4-2rg7-wq4c
|
Cross-site request forgery (CSRF) vulnerability in the web management interface in httpd/cgi-bin/shutdown.cgi in Smoothwall Express 3.1 and 3.0 SP3 and earlier allows remote attackers to hijack the authentication of administrators for requests that perform a reboot via a request to cgi-bin/shutdown.cgi.
|
[] |
|
CVE-2021-20133
|
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them to read all or some of the contents of those files. Such sensitive information as hashed credentials, hardcoded plaintext passwords for other services, configuration files, and private keys can be disclosed in this fashion. Improper handling of filenames that identify virtual resources, such as "/dev/urandom" allows an attacker to effect a denial of service attack against the command line interfaces of the Quagga services (zebra and ripd).
|
[
"cpe:2.3:o:dlink:dir-2640-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-2640-us:-:*:*:*:*:*:*:*"
] |
|
GHSA-7j36-gc4r-9x3r
|
Out of bounds access in compact_arena
|
Affected versions of this crate did not properly implement the generativity, because the invariant lifetimes were not necessarily dropped.This allows an attacker to mix up two arenas, using indices created from one arena with another one. This might lead to an out-of-bounds read or write access into the memory reserved for the arena.The flaw was corrected by implementing generativity correctly in version 0.4.0.
|
[] |
CVE-2016-9703
|
IBM Security Identity Manager Virtual Appliance does not invalidate session tokens which could allow an unauthorized user with physical access to the work station to obtain sensitive information.
|
[
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.4:*:*:*:*:*:*:*"
] |
|
GHSA-rg6w-grg6-5wqf
|
An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.
|
[] |
|
GHSA-vghr-3w2c-h96p
|
A stack buffer overflow in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
|
[] |
|
GHSA-x7ch-gpj4-9rhr
|
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to inject arbitrary FTP commands via unspecified vectors.
|
[] |
|
CVE-2021-24855
|
Display Post Metadata < 1.5.0 - Contributor+ Stored Cross-Site Scripting
|
The Display Post Metadata WordPress plugin before 1.5.0 adds a shortcode to print out custom fields, however their content is not sanitised or escaped which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks
|
[
"cpe:2.3:a:display_post_metadata_project:display_post_metadata:*:*:*:*:*:wordpress:*:*"
] |
GHSA-v473-h83f-x76x
|
It was discovered that rpm-ostree and rpm-ostree-client before 2017.3 fail to properly check GPG signatures on packages when doing layering. Packages with unsigned or badly signed content could fail to be rejected as expected. This issue is partially mitigated on RHEL Atomic Host, where certificate pinning is used by default.
|
[] |
|
CVE-2018-7448
|
Remote code execution vulnerability in /cmsms-2.1.6-install.php/index.php in CMS Made Simple version 2.1.6 allows remote attackers to inject arbitrary PHP code via the "timezone" parameter in step 4 of a fresh installation procedure.
|
[
"cpe:2.3:a:cmsmadesimple:cms_made_simple:2.1.6:*:*:*:*:*:*:*"
] |
|
GHSA-c7w7-cxp6-wph7
|
Electronic Arts Karotz Smart Rabbit 12.07.19.00 allows Python module hijacking
|
[] |
|
GHSA-m483-27j2-x8qg
|
Possible address manipulation from APP-NS while APP-S is configuring an RG where it tries to merge the address ranges in Snapdragon Connectivity, Snapdragon Mobile
|
[] |
|
GHSA-w3vr-r8ff-xgcf
|
cPanel before 60.0.25 does not use TLS for HTTP POSTs to listinput.cpanel.net (SEC-192).
|
[] |
|
GHSA-mq4w-g4j3-x676
|
Unspecified vulnerability in bitcoind and Bitcoin-Qt before 0.4.6, 0.5.x before 0.5.5, 0.6.0.x before 0.6.0.7, and 0.6.x before 0.6.2 allows remote attackers to cause a denial of service (block-processing outage and incorrect block count) via unknown behavior on a Bitcoin network.
|
[] |
|
CVE-2016-3609
|
Unspecified vulnerability in the OJVM component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
|
[
"cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database:12.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*"
] |
|
CVE-2021-24272
|
Fitness Calculators < 1.9.6 - Cross-Site Request Forgery to Cross-Site Scripting (XSS)
|
The fitness calculators WordPress plugin before 1.9.6 add calculators for Water intake, BMI calculator, protein Intake, and Body Fat and was lacking CSRF check, allowing attackers to make logged in users perform unwanted actions, such as change the calculator headers. Due to the lack of sanitisation, this could also lead to a Stored Cross-Site Scripting issue
|
[
"cpe:2.3:a:codeinitiator:fitness_calculators:*:*:*:*:*:wordpress:*:*"
] |
CVE-2006-6276
|
HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors.
|
[
"cpe:2.3:a:sun:java_system_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2016-9264
|
Buffer overflow in the printMP3Headers function in listmp3.c in Libming 0.4.7 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mp3 file.
|
[
"cpe:2.3:a:libming:libming:0.4.7:*:*:*:*:*:*:*"
] |
|
GHSA-99jc-8q77-587x
|
A vulnerability, which was classified as critical, has been found in SourceCodester PHP Task Management System 1.0. This issue affects some unknown processing of the file admin-password-change.php. The manipulation of the argument admin_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259067.
|
[] |
|
GHSA-jx2c-g5jx-5fj7
|
The Meeting Server in IBM Sametime 8.5.2 through 8.5.2.1 and 9.x through 9.0.0.1 does not send the appropriate HTTP response headers to prevent unwanted caching by a web browser, which allows remote attackers to obtain sensitive information by leveraging an unattended workstation.
|
[] |
|
CVE-2024-8275
|
The Events Calendar <= 6.6.4 - Unauthenticated SQL Injection
|
The The Events Calendar plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tribe_has_next_event' function in all versions up to, and including, 6.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Only sites that have manually added tribe_has_next_event() will be vulnerable to this SQL injection.
|
[
"cpe:2.3:a:theeventscalendar:the_events_calendar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:stellarwp:the_events_calendar:*:*:*:*:*:wordpress:*:*"
] |
GHSA-8q5v-369h-cv24
|
HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID.
|
[] |
|
GHSA-wqjf-8c78-h378
|
An information disclosure vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32074353. References: QC-CR#1104731.
|
[] |
|
CVE-2019-6506
|
SuiteCRM before 7.8.28, 7.9.x and 7.10.x before 7.10.15, and 7.11.x before 7.11.3 allows SQL Injection.
|
[
"cpe:2.3:a:salesagility:suitecrm:7.11.0:*:*:*:*:*:*:*"
] |
|
GHSA-xr5x-5g7f-mfvm
|
Possible memory corruption in perfservice due to improper validation array length taken from user application. in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8096AU, APQ8098, Kamorta, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, Saipan, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
|
[] |
|
CVE-2024-28683
|
DedeCMS v5.7 was discovered to contain a cross-site scripting (XSS) vulnerability via create file.
|
[
"cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-8002
|
Use-after-free vulnerability in decode_slice.cpp in Cisco OpenH264 1.2.0 and earlier allows remote attackers to execute arbitrary code via an encoded media file.
|
[
"cpe:2.3:a:cisco:openh264:*:*:*:*:*:*:*:*"
] |
|
GHSA-xmcf-9g6p-h2w6
|
Cross-site scripting (XSS) vulnerability in Webster HTTP Server allows remote attackers to inject arbitrary web script or HTML via the URL.
|
[] |
|
CVE-2006-4708
|
Multiple cross-site scripting (XSS) vulnerabilities in Vikingboard 0.1b allow remote attackers to inject arbitrary web script or HTML via the (1) act parameter in (a) help.php and (b) search.php, and the (2) p parameter in report.php.
|
[
"cpe:2.3:a:vikingboard:vikingboard:0.1b:*:*:*:*:*:*:*"
] |
|
GHSA-74qp-233x-p5j8
|
Apache Livy Cross-site scripting (XSS) in session names
|
Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.
|
[] |
GHSA-w773-x35x-fhrw
|
Online Piggery Management System 1.0 is vulnerable to File Upload. An unauthenticated user can upload a php file by sending a POST request to "add-pig.php."
|
[] |
|
CVE-2022-21235
|
Command Injection
|
The package github.com/masterminds/vcs before 1.13.3 are vulnerable to Command Injection via argument injection. When hg is executed, argument strings are passed to hg in a way that additional flags can be set. The additional flags can be used to perform a command injection.
|
[
"cpe:2.3:a:vcs_project:vcs:*:*:*:*:*:go:*:*"
] |
CVE-2015-9422
|
The PlugNedit Adaptive Editor plugin before 6.2.0 for WordPress has CSRF with resultant XSS via wp-admin/admin-ajax.php?action=simple_fields_field_type_post_dialog_load plugnedit_width, pnemedcount, PlugneditBGColor, PlugneditEditorMargin, or plugneditcontent parameters.
|
[
"cpe:2.3:a:simplysymphony:plugnedit:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2016-9435
|
The HTMLtagproc1 function in file.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to <dd> tags.
|
[
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*"
] |
|
GHSA-cg6c-3fqg-36xh
|
In trim_device of f2fs_format_utils.c, it is possible that the data partition is not wiped during a factory reset. This could lead to local information disclosure after factory reset with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-112868088.
|
[] |
|
CVE-2023-29454
|
Persistent XSS in the user form
|
Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.
|
[
"cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*"
] |
GHSA-jrm2-4226-5w55
|
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that improperly interacts with pageshow events.
|
[] |
|
CVE-2017-8178
|
Huawei Email APP Vicky-AL00 smartphones with software of earlier than VKY-AL00C00B171 versions has a stored cross-site scripting vulnerability. A remote attacker could exploit this vulnerability to send email that storing malicious code to a smartphone and waiting for a user to access this email that triggers execution of the code. An exploit could allow the attacker to execute arbitrary script code on the affected device.
|
[
"cpe:2.3:o:huawei:vicky-al00_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:vicky-al00:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-37006
|
Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software
|
A maliciously crafted CATPRODUCT file, when parsed in CC5Dll.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
|
[
"cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*"
] |
CVE-2014-0115
|
Directory traversal vulnerability in the log viewer in Apache Storm 0.9.0.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter to log.
|
[
"cpe:2.3:a:apache:storm:0.9.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-j83g-jp4j-gx6g
|
A vulnerability classified as problematic was found in Campcodes Online Examination System 1.0. Affected by this vulnerability is an unknown functionality of the file /adminpanel/admin/facebox_modal/updateCourse.php. The manipulation of the argument id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258031.
|
[] |
|
CVE-2023-40624
|
Code Injection vulnerability in SAP NetWeaver AS ABAP (applications based on Unified Rendering)
|
SAP NetWeaver AS ABAP (applications based on Unified Rendering) - versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, SAP_BASIS 702, SAP_BASIS 731, allows an attacker to inject JavaScript code that can be executed in the web-application. An attacker could thereby control the behavior of this web-application.
|
[
"cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:sap_basis:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:sap_basis:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:sap_ui:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:sap_ui:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:756:*:*:*:sap_ui:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:757:*:*:*:sap_ui:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_abap:758:*:*:*:sap_ui:*:*:*"
] |
CVE-2015-6770
|
The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6768.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-j85j-8r4r-vm4q
|
GNU Libextractor through 1.8 has a NULL Pointer Dereference vulnerability in the function process_metadata() in plugins/ole2_extractor.c.
|
[] |
|
CVE-2008-2068
|
Cross-site scripting (XSS) vulnerability in WordPress 2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*"
] |
|
GHSA-5jf8-vrfc-7fr9
|
In the Bluetooth Low Energy (BLE) specification, there is a provided example Long Term Key (LTK). If a BLE device were to use this as a hardcoded LTK, it is theoretically possible for a proximate attacker to remotely inject keystrokes on a paired Android host due to improperly used crypto. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-128843052.
|
[] |
|
CVE-2017-13792
|
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:-:*:*:*:*:*:*:*"
] |
|
GHSA-xrgr-fwmm-m4vx
|
Unspecified vulnerability in Oracle HTTP Server component in Oracle Application Server 10.1.2.0.1, 10.1.2.0.2, and 10.1.2.1.0 has unknown impact and remote attack vectors related to the PHP Module, aka Vuln# OHS03.
|
[] |
|
GHSA-jv9p-xg7j-p65c
|
gifsicle-1.94 was found to have a floating point exception (FPE) vulnerability via resize_stream at src/xform.c.
|
[] |
|
GHSA-7jr8-xq89-mwgm
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] |
|
GHSA-f97x-f6x5-pmh9
|
LogiSphere 0.9.9j does not restrict the number of messages that can be sent, which allows remote attackers to cause a denial of service by sending a large number of messages via the msg command. NOTE: due to lack of appropriate details by the original researcher, it is unclear whether this description accurately reflects the discloser's claim and is distinct from the XSS issue.
|
[] |
|
CVE-2014-6831
|
The Hippo Studio (aka com.appgreen.hippostudio) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:hippostudio:hippo_studio:1:*:*:*:*:android:*:*"
] |
|
GHSA-4v5h-vp2v-p65r
|
SQL Server Native Client Remote Code Execution Vulnerability
|
[] |
|
GHSA-h653-h7jh-76qg
|
af/util/xp/ut_go_file.cpp in AbiWord 3.0.2-2 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.
|
[] |
|
CVE-2024-27660
|
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a Null-pointer dereferences in sub_41C488(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
|
[
"cpe:2.3:o:dlink:dir-823g_firmware:1.02b05:*:*:*:*:*:*:*"
] |
|
GHSA-w9x9-625v-x659
|
Stack-based buffer overflow in decoder/impeg2d_vld.c in mediaserver in Android 6.x before 2016-04-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 25812590.
|
[] |
|
CVE-2016-3284
|
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, Office Compatibility Pack SP3, and Excel Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_for_mac:2011:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_for_mac:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_rt:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*"
] |
|
CVE-2021-36225
|
Western Digital My Cloud devices before OS5 allow REST API access by low-privileged accounts, as demonstrated by API commands for firmware uploads and installation.
|
[
"cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-5856
|
Insufficient policy enforcement in storage in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-28455
|
An issue was discovered in Technitium through 11.0.2. The forwarding mode enables attackers to create a query loop using Technitium resolvers, launching amplification attacks and causing potential DoS.
|
[
"cpe:2.3:a:technitium:dns_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-45gw-fx24-h4pv
|
In the Linux kernel, the following vulnerability has been resolved:ksmbd: Fix dangling pointer in krb_authenticatekrb_authenticate frees sess->user and does not set the pointer
to NULL. It calls ksmbd_krb5_authenticate to reinitialise
sess->user but that function may return without doing so. If
that happens then smb2_sess_setup, which calls krb_authenticate,
will be accessing free'd memory when it later uses sess->user.
|
[] |
|
CVE-2024-49570
|
drm/xe/tracing: Fix a potential TP_printk UAF
|
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/tracing: Fix a potential TP_printk UAF
The commit
afd2627f727b ("tracing: Check "%s" dereference via the field and not the TP_printk format")
exposes potential UAFs in the xe_bo_move trace event.
Fix those by avoiding dereferencing the
xe_mem_type_to_name[] array at TP_printk time.
Since some code refactoring has taken place, explicit backporting may
be needed for kernels older than 6.10.
|
[] |
CVE-2024-56169
|
A validation integrity issue was discovered in Fort through 1.6.4 before 2.0.0. RPKI Relying Parties (such as Fort) are supposed to maintain a backup cache of the remote RPKI data. This can be employed as a fallback in case a new fetch fails or yields incorrect files. However, the product currently uses its cache merely as a bandwidth saving tool (because fetching is performed through deltas). If a fetch fails midway or yields incorrect files, there is no viable fallback. This leads to incomplete route origin validation data.
|
[] |
|
GHSA-958v-76xq-cvpv
|
Null pointer dereference can occur due to memory allocation failure in DIAG in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Wearables
|
[] |
|
CVE-2024-33694
|
WordPress Meks ThemeForest Smart Widget plugin <= 1.5 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Meks Meks ThemeForest Smart Widget allows Stored XSS.This issue affects Meks ThemeForest Smart Widget: from n/a through 1.5.
|
[] |
GHSA-7325-gcx9-7xh4
|
An incorrect permissions vulnerability was reported in the Lenovo App Store app that could allow an attacker to use system resources, resulting in a denial of service.
|
[] |
|
GHSA-wrfc-pvp9-mr9g
|
Deserialization of Untrusted Data in Hugging Face Transformers
|
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of model files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25191.
|
[] |
GHSA-fj64-qprx-q7vq
|
genson vulnerable to stack exhaustion
|
An issue was discovered genson through 1.6 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.
|
[] |
CVE-2024-36411
|
SuiteCRM authenticated SQL Injection in EmailUIAjax displayView controller
|
SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax displayView controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue.
|
[
"cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*"
] |
CVE-2023-20071
|
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload.
|
[
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:a:snort:snort:2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:cyber_vision:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:-:*:*:*:*:*:*:*"
] |
|
CVE-2012-2602
|
Multiple cross-site request forgery (CSRF) vulnerabilities in SolarWinds Orion Network Performance Monitor (NPM) before 10.3.1 allow remote attackers to hijack the authentication of administrators for requests that (1) create user accounts via CreateUserStepContainer actions to Admin/Accounts/Add/OrionAccount.aspx or (2) modify account privileges via a ynAdminRights action to Admin/Accounts/EditAccount.aspx.
|
[
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.1.13.0:*:*:*:*:*:*:*"
] |
|
GHSA-m3v6-ff49-8q93
|
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending specifically crafted input to /tos/index.php?app/app_start_stop.
|
[] |
|
CVE-2011-1541
|
Unspecified vulnerability in HP System Management Homepage (SMH) before 6.3 allows remote attackers to bypass intended access restrictions, and consequently execute arbitrary code, via unknown vectors.
|
[
"cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.14.204:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.1-73:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.2-77:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.2.77:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:3.0.2.77:b:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.0.0-95:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.0.0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.1.0-103:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.1.0.102:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.0-12:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.1-14:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.2-2:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:system_management_homepage:6.2.2.7:*:*:*:*:*:*:*"
] |
|
GHSA-cqqf-7hc8-ww46
|
A vulnerability in the API of Cisco Meeting Server could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because requests that are sent to the API are not properly validated. An attacker could exploit this vulnerability by sending a malicious request to the API. A successful exploit could allow the attacker to cause all participants on a call to be disconnected, resulting in a DoS condition.
|
[] |
|
CVE-2018-15697
|
ASUSTOR Data Master 3.1.5 and below allows authenticated remote non-administrative users to read any file on a share by providing the full path. For example, /home/admin/.ash_history.
|
[
"cpe:2.3:o:asustor:data_master:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.