id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
GHSA-8gw9-w9jh-ghwc
The EmbedPress WordPress plugin before 3.9.2 does not sanitise and escape user input before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
[]
CVE-2008-5810
WBPublish (aka WBPublish.exe) in Fujitsu-Siemens WebTransactions 7.0, 7.1, and possibly other versions allows remote attackers to execute arbitrary commands via shell metacharacters in input that is sent through HTTP and improperly used during temporary session data cleanup, possibly related to (1) directory names, (2) template names, and (3) session IDs.
[ "cpe:2.3:a:fujitsu-siemens:webtransactions:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:fujitsu-siemens:webtransactions:7.1:*:*:*:*:*:*:*" ]
CVE-2015-2095
Heap-based buffer overflow in the SetConnectInfo function in the WESPPTZ.WESPPTZCtrl.1 ActiveX control in WebGate eDVR Manager allows remote attackers to execute arbitrary code via crafted arguments.
[ "cpe:2.3:a:webgateinc:edvr_manager:2.6.4:*:*:*:*:*:*:*" ]
CVE-2006-0533
Cross-site scripting (XSS) vulnerability in webmailaging.cgi in cPanel allows remote attackers to inject arbitrary web script or HTML via the numdays parameter.
[ "cpe:2.3:a:cpanel:cpanel:-:*:*:*:*:*:*:*" ]
GHSA-6rpr-qxfh-rg9p
Unspecified vulnerability in the client in Symantec Veritas Backup Exec for Windows Servers 11d has unknown impact and remote attack vectors. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine.
[]
GHSA-ggpj-5v2h-5jrp
An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.
[]
GHSA-g7fp-c8p5-c8h7
The Inventory Plugin for Symantec Management Agent prior to 7.6 POST HF7, 8.0 POST HF6, or 8.1 RU7 may be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels.
[]
GHSA-pm7m-qqmg-jh65
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. The vulnerability is caused by a computation that writes data past the end of the intended buffer; the computation is part of the image conversion module that handles Enhanced Metafile Format Plus (EMF+) data. The vulnerability is a result of an out of range pointer offset that is used to access sub-elements of an internal data structure. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
[]
CVE-2024-20469
Cisco Identity Services Engine Command Injection Vulnerability
A vulnerability in specific CLI commands in Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have valid Administrator privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.
[ "cpe:2.3:a:cisco:identity_services_engine_software:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.2:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.2:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.2:patch3:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.2:patch4:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.2:patch5:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.2:patch6:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.3:-:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.3:patch1:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.3:patch2:*:*:*:*:*:*", "cpe:2.3:a:cisco:identity_services_engine:3.3:patch3:*:*:*:*:*:*" ]
CVE-2023-35731
D-Link DAP-2622 DDP Reset Factory Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability
D-Link DAP-2622 DDP Reset Factory Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DDP service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-20058.
[ "cpe:2.3:a:d-link:dap-2622:*:*:*:*:*:*:*:*" ]
CVE-2006-3793
PHP remote file inclusion vulnerability in constants.php in SiteDepth CMS 3.01 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the SD_DIR parameter.
[ "cpe:2.3:a:sitedepth:sitedepth_cms:*:*:*:*:*:*:*:*" ]
GHSA-g44j-f8wm-6622
Stored cross-site scripting (XSS) vulnerability in the manage vocabulary page in Liferay Portal 7.4.2 through 7.4.3.87, and Liferay DXP 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a Vocabulary's 'description' text field.
[]
CVE-2025-29978
Microsoft PowerPoint Remote Code Execution Vulnerability
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
[]
CVE-2021-25168
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webupdatecomponent function.
[ "cpe:2.3:o:hpe:baseboard_management_controller:*:*:*:*:*:*:*:*", "cpe:2.3:h:hpe:apollo_70_system:-:*:*:*:*:*:*:*" ]
CVE-2004-2155
Online-bookmarks before 0.4.6 allows remote attackers to bypass its authentication mechanism via a direct request to (1) config/*, (2) bookmarks.php, (3) footer.php, (4) main.php, (5) tree.php, or (6) functions.php.
[ "cpe:2.3:a:online-bookmarks:web_based_bookmark_application:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:online-bookmarks:web_based_bookmark_application:0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:online-bookmarks:web_based_bookmark_application:0.4.4:*:*:*:*:*:*:*" ]
CVE-2025-37958
mm/huge_memory: fix dereferencing invalid pmd migration entry
In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: fix dereferencing invalid pmd migration entry When migrating a THP, concurrent access to the PMD migration entry during a deferred split scan can lead to an invalid address access, as illustrated below. To prevent this invalid access, it is necessary to check the PMD migration entry and return early. In this context, there is no need to use pmd_to_swp_entry and pfn_swap_entry_to_page to verify the equality of the target folio. Since the PMD migration entry is locked, it cannot be served as the target. Mailing list discussion and explanation from Hugh Dickins: "An anon_vma lookup points to a location which may contain the folio of interest, but might instead contain another folio: and weeding out those other folios is precisely what the "folio != pmd_folio((*pmd)" check (and the "risk of replacing the wrong folio" comment a few lines above it) is for." BUG: unable to handle page fault for address: ffffea60001db008 CPU: 0 UID: 0 PID: 2199114 Comm: tee Not tainted 6.14.0+ #4 NONE Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:split_huge_pmd_locked+0x3b5/0x2b60 Call Trace: <TASK> try_to_migrate_one+0x28c/0x3730 rmap_walk_anon+0x4f6/0x770 unmap_folio+0x196/0x1f0 split_huge_page_to_list_to_order+0x9f6/0x1560 deferred_split_scan+0xac5/0x12a0 shrinker_debugfs_scan_write+0x376/0x470 full_proxy_write+0x15c/0x220 vfs_write+0x2fc/0xcb0 ksys_write+0x146/0x250 do_syscall_64+0x6a/0x120 entry_SYSCALL_64_after_hwframe+0x76/0x7e The bug is found by syzkaller on an internal kernel, then confirmed on upstream.
[]
CVE-2006-3284
Cross-site scripting (XSS) vulnerability in Dating Agent PRO 4.7.1 allows remote attackers to inject arbitrary web script or HTML via the login parameter in (1) webmaster/index.php and (2) search.php.
[ "cpe:2.3:a:datetopia:dating_agent_pro:4.7.1:*:*:*:*:*:*:*" ]
GHSA-mf25-83qx-cpwh
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
GHSA-7hfx-h3j3-rwq4
D-Tale server-side request forgery through Web uploads
ImpactUsers hosting D-Tale publicly can be vulnerable to server-side request forgery (SSRF) allowing attackers to access files on the server.PatchesUsers should upgrade to version 3.9.0 where the "Load From the Web" input is turned off by default. You can find out more information on how to turn it back on [here](https://github.com/man-group/dtale?tab=readme-ov-file#load-data--sample-datasets)WorkaroundsThe only workaround for versions earlier than 3.9.0 is to only host D-Tale to trusted users.ReferencesSee "Load Data & Sample Datasets" [documentation](https://github.com/man-group/dtale?tab=readme-ov-file#load-data--sample-datasets)
[]
GHSA-c6qp-cg3c-4g5h
Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055.
[]
GHSA-2xf7-r7hp-r5qc
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
[]
GHSA-9xhq-55qx-pw5h
Software Update in Apple Mac OS X through 10.7.5 does not prevent plugin loading within the marketing-text WebView, which allows man-in-the-middle attackers to execute plugin code by modifying the client-server data stream.
[]
CVE-2024-26627
scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler Inside scsi_eh_wakeup(), scsi_host_busy() is called & checked with host lock every time for deciding if error handler kthread needs to be waken up. This can be too heavy in case of recovery, such as: - N hardware queues - queue depth is M for each hardware queue - each scsi_host_busy() iterates over (N * M) tag/requests If recovery is triggered in case that all requests are in-flight, each scsi_eh_wakeup() is strictly serialized, when scsi_eh_wakeup() is called for the last in-flight request, scsi_host_busy() has been run for (N * M - 1) times, and request has been iterated for (N*M - 1) * (N * M) times. If both N and M are big enough, hard lockup can be triggered on acquiring host lock, and it is observed on mpi3mr(128 hw queues, queue depth 8169). Fix the issue by calling scsi_host_busy() outside the host lock. We don't need the host lock for getting busy count because host the lock never covers that. [mkp: Drop unnecessary 'busy' variables pointed out by Bart]
[]
CVE-2024-11875
Add infos to the events calendar <= 1.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Add infos to the events calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fuss' shortcode in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2017-5662
In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server - including confidential or sensitive files - would be possible. XXE can also be used to attack the availability of the server via denial of service as the references within a xml document can trivially trigger an amplification attack.
[ "cpe:2.3:a:apache:batik:*:*:*:*:*:*:*:*" ]
GHSA-r3j4-2rg7-wq4c
Cross-site request forgery (CSRF) vulnerability in the web management interface in httpd/cgi-bin/shutdown.cgi in Smoothwall Express 3.1 and 3.0 SP3 and earlier allows remote attackers to hijack the authentication of administrators for requests that perform a reboot via a request to cgi-bin/shutdown.cgi.
[]
CVE-2021-20133
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them to read all or some of the contents of those files. Such sensitive information as hashed credentials, hardcoded plaintext passwords for other services, configuration files, and private keys can be disclosed in this fashion. Improper handling of filenames that identify virtual resources, such as "/dev/urandom" allows an attacker to effect a denial of service attack against the command line interfaces of the Quagga services (zebra and ripd).
[ "cpe:2.3:o:dlink:dir-2640-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-2640-us:-:*:*:*:*:*:*:*" ]
GHSA-7j36-gc4r-9x3r
Out of bounds access in compact_arena
Affected versions of this crate did not properly implement the generativity, because the invariant lifetimes were not necessarily dropped.This allows an attacker to mix up two arenas, using indices created from one arena with another one. This might lead to an out-of-bounds read or write access into the memory reserved for the arena.The flaw was corrected by implementing generativity correctly in version 0.4.0.
[]
CVE-2016-9703
IBM Security Identity Manager Virtual Appliance does not invalidate session tokens which could allow an unauthorized user with physical access to the work station to obtain sensitive information.
[ "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_manager_virtual_appliance:7.0.1.4:*:*:*:*:*:*:*" ]
GHSA-rg6w-grg6-5wqf
An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_send_with_data() and bgp_process_packet() in bgp_packet.c, there is a possible use-after-free due to a race condition. This could lead to Remote Code Execution or Information Disclosure by sending crafted BGP packets. User interaction is not needed for exploitation.
[]
GHSA-vghr-3w2c-h96p
A stack buffer overflow in webs in Ruckus Wireless Unleashed through 200.7.10.102.92 allows a remote attacker to execute code via an unauthenticated crafted HTTP request. This affects C110, E510, H320, H510, M510, R320, R310, R500, R510 R600, R610, R710, R720, R750, T300, T301n, T301s, T310c, T310d, T310n, T310s, T610, T710, and T710s devices.
[]
GHSA-x7ch-gpj4-9rhr
IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allow remote attackers to inject arbitrary FTP commands via unspecified vectors.
[]
CVE-2021-24855
Display Post Metadata < 1.5.0 - Contributor+ Stored Cross-Site Scripting
The Display Post Metadata WordPress plugin before 1.5.0 adds a shortcode to print out custom fields, however their content is not sanitised or escaped which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks
[ "cpe:2.3:a:display_post_metadata_project:display_post_metadata:*:*:*:*:*:wordpress:*:*" ]
GHSA-v473-h83f-x76x
It was discovered that rpm-ostree and rpm-ostree-client before 2017.3 fail to properly check GPG signatures on packages when doing layering. Packages with unsigned or badly signed content could fail to be rejected as expected. This issue is partially mitigated on RHEL Atomic Host, where certificate pinning is used by default.
[]
CVE-2018-7448
Remote code execution vulnerability in /cmsms-2.1.6-install.php/index.php in CMS Made Simple version 2.1.6 allows remote attackers to inject arbitrary PHP code via the "timezone" parameter in step 4 of a fresh installation procedure.
[ "cpe:2.3:a:cmsmadesimple:cms_made_simple:2.1.6:*:*:*:*:*:*:*" ]
GHSA-c7w7-cxp6-wph7
Electronic Arts Karotz Smart Rabbit 12.07.19.00 allows Python module hijacking
[]
GHSA-m483-27j2-x8qg
Possible address manipulation from APP-NS while APP-S is configuring an RG where it tries to merge the address ranges in Snapdragon Connectivity, Snapdragon Mobile
[]
GHSA-w3vr-r8ff-xgcf
cPanel before 60.0.25 does not use TLS for HTTP POSTs to listinput.cpanel.net (SEC-192).
[]
GHSA-mq4w-g4j3-x676
Unspecified vulnerability in bitcoind and Bitcoin-Qt before 0.4.6, 0.5.x before 0.5.5, 0.6.0.x before 0.6.0.7, and 0.6.x before 0.6.2 allows remote attackers to cause a denial of service (block-processing outage and incorrect block count) via unknown behavior on a Bitcoin network.
[]
CVE-2016-3609
Unspecified vulnerability in the OJVM component in Oracle Database Server 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
[ "cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database:12.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*" ]
CVE-2021-24272
Fitness Calculators < 1.9.6 - Cross-Site Request Forgery to Cross-Site Scripting (XSS)
The fitness calculators WordPress plugin before 1.9.6 add calculators for Water intake, BMI calculator, protein Intake, and Body Fat and was lacking CSRF check, allowing attackers to make logged in users perform unwanted actions, such as change the calculator headers. Due to the lack of sanitisation, this could also lead to a Stored Cross-Site Scripting issue
[ "cpe:2.3:a:codeinitiator:fitness_calculators:*:*:*:*:*:wordpress:*:*" ]
CVE-2006-6276
HTTP request smuggling vulnerability in Sun Java System Proxy Server before 20061130, when used with Sun Java System Application Server or Sun Java System Web Server, allows remote attackers to bypass HTTP request filtering, hijack web sessions, perform cross-site scripting (XSS), and poison web caches via unspecified attack vectors.
[ "cpe:2.3:a:sun:java_system_application_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_application_server:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_server:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:one_application_server:7.0:*:*:*:*:*:*:*" ]
CVE-2016-9264
Buffer overflow in the printMP3Headers function in listmp3.c in Libming 0.4.7 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mp3 file.
[ "cpe:2.3:a:libming:libming:0.4.7:*:*:*:*:*:*:*" ]
GHSA-99jc-8q77-587x
A vulnerability, which was classified as critical, has been found in SourceCodester PHP Task Management System 1.0. This issue affects some unknown processing of the file admin-password-change.php. The manipulation of the argument admin_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259067.
[]
GHSA-jx2c-g5jx-5fj7
The Meeting Server in IBM Sametime 8.5.2 through 8.5.2.1 and 9.x through 9.0.0.1 does not send the appropriate HTTP response headers to prevent unwanted caching by a web browser, which allows remote attackers to obtain sensitive information by leveraging an unattended workstation.
[]
CVE-2024-8275
The Events Calendar <= 6.6.4 - Unauthenticated SQL Injection
The The Events Calendar plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tribe_has_next_event' function in all versions up to, and including, 6.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Only sites that have manually added tribe_has_next_event() will be vulnerable to this SQL injection.
[ "cpe:2.3:a:theeventscalendar:the_events_calendar:*:*:*:*:*:*:*:*", "cpe:2.3:a:stellarwp:the_events_calendar:*:*:*:*:*:wordpress:*:*" ]
GHSA-8q5v-369h-cv24
HP Helion Eucalyptus 4.1.x before 4.1.2 and HPE Helion Eucalyptus 4.2.x before 4.2.1 allow remote authenticated users to bypass intended access restrictions and modify arbitrary (1) access key credentials by leveraging knowledge of a key ID or (2) signing certificates by leveraging knowledge of a certificate ID.
[]
GHSA-wqjf-8c78-h378
An information disclosure vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32074353. References: QC-CR#1104731.
[]
CVE-2019-6506
SuiteCRM before 7.8.28, 7.9.x and 7.10.x before 7.10.15, and 7.11.x before 7.11.3 allows SQL Injection.
[ "cpe:2.3:a:salesagility:suitecrm:7.11.0:*:*:*:*:*:*:*" ]
GHSA-xr5x-5g7f-mfvm
Possible memory corruption in perfservice due to improper validation array length taken from user application. in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8096AU, APQ8098, Kamorta, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, Saipan, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
[]
CVE-2024-28683
DedeCMS v5.7 was discovered to contain a cross-site scripting (XSS) vulnerability via create file.
[ "cpe:2.3:a:dedecms:dedecms:*:*:*:*:*:*:*:*" ]
CVE-2014-8002
Use-after-free vulnerability in decode_slice.cpp in Cisco OpenH264 1.2.0 and earlier allows remote attackers to execute arbitrary code via an encoded media file.
[ "cpe:2.3:a:cisco:openh264:*:*:*:*:*:*:*:*" ]
GHSA-xmcf-9g6p-h2w6
Cross-site scripting (XSS) vulnerability in Webster HTTP Server allows remote attackers to inject arbitrary web script or HTML via the URL.
[]
CVE-2006-4708
Multiple cross-site scripting (XSS) vulnerabilities in Vikingboard 0.1b allow remote attackers to inject arbitrary web script or HTML via the (1) act parameter in (a) help.php and (b) search.php, and the (2) p parameter in report.php.
[ "cpe:2.3:a:vikingboard:vikingboard:0.1b:*:*:*:*:*:*:*" ]
GHSA-74qp-233x-p5j8
Apache Livy Cross-site scripting (XSS) in session names
Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.
[]
GHSA-w773-x35x-fhrw
Online Piggery Management System 1.0 is vulnerable to File Upload. An unauthenticated user can upload a php file by sending a POST request to "add-pig.php."
[]
CVE-2022-21235
Command Injection
The package github.com/masterminds/vcs before 1.13.3 are vulnerable to Command Injection via argument injection. When hg is executed, argument strings are passed to hg in a way that additional flags can be set. The additional flags can be used to perform a command injection.
[ "cpe:2.3:a:vcs_project:vcs:*:*:*:*:*:go:*:*" ]
CVE-2015-9422
The PlugNedit Adaptive Editor plugin before 6.2.0 for WordPress has CSRF with resultant XSS via wp-admin/admin-ajax.php?action=simple_fields_field_type_post_dialog_load plugnedit_width, pnemedcount, PlugneditBGColor, PlugneditEditorMargin, or plugneditcontent parameters.
[ "cpe:2.3:a:simplysymphony:plugnedit:*:*:*:*:*:wordpress:*:*" ]
CVE-2016-9435
The HTMLtagproc1 function in file.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to <dd> tags.
[ "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:a:tats:w3m:*:*:*:*:*:*:*:*" ]
GHSA-cg6c-3fqg-36xh
In trim_device of f2fs_format_utils.c, it is possible that the data partition is not wiped during a factory reset. This could lead to local information disclosure after factory reset with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-112868088.
[]
CVE-2023-29454
Persistent XSS in the user form
Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.
[ "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*" ]
GHSA-jrm2-4226-5w55
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that improperly interacts with pageshow events.
[]
CVE-2017-8178
Huawei Email APP Vicky-AL00 smartphones with software of earlier than VKY-AL00C00B171 versions has a stored cross-site scripting vulnerability. A remote attacker could exploit this vulnerability to send email that storing malicious code to a smartphone and waiting for a user to access this email that triggers execution of the code. An exploit could allow the attacker to execute arbitrary script code on the affected device.
[ "cpe:2.3:o:huawei:vicky-al00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:vicky-al00:-:*:*:*:*:*:*:*" ]
CVE-2024-37006
Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software
A maliciously crafted CATPRODUCT file, when parsed in CC5Dll.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
[ "cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*" ]
CVE-2014-0115
Directory traversal vulnerability in the log viewer in Apache Storm 0.9.0.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter to log.
[ "cpe:2.3:a:apache:storm:0.9.0.1:*:*:*:*:*:*:*" ]
GHSA-j83g-jp4j-gx6g
A vulnerability classified as problematic was found in Campcodes Online Examination System 1.0. Affected by this vulnerability is an unknown functionality of the file /adminpanel/admin/facebox_modal/updateCourse.php. The manipulation of the argument id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258031.
[]
CVE-2023-40624
Code Injection vulnerability in SAP NetWeaver AS ABAP (applications based on Unified Rendering)
SAP NetWeaver AS ABAP (applications based on Unified Rendering) - versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, SAP_BASIS 702, SAP_BASIS 731, allows an attacker to inject JavaScript code that can be executed in the web-application. An attacker could thereby control the behavior of this web-application.
[ "cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:sap_basis:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:sap_basis:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:sap_ui:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:sap_ui:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:756:*:*:*:sap_ui:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:757:*:*:*:sap_ui:*:*:*", "cpe:2.3:a:sap:netweaver_application_server_abap:758:*:*:*:sap_ui:*:*:*" ]
CVE-2015-6770
The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6768.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-j85j-8r4r-vm4q
GNU Libextractor through 1.8 has a NULL Pointer Dereference vulnerability in the function process_metadata() in plugins/ole2_extractor.c.
[]
CVE-2008-2068
Cross-site scripting (XSS) vulnerability in WordPress 2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*" ]
GHSA-5jf8-vrfc-7fr9
In the Bluetooth Low Energy (BLE) specification, there is a provided example Long Term Key (LTK). If a BLE device were to use this as a hardcoded LTK, it is theoretically possible for a proximate attacker to remotely inject keystrokes on a paired Android host due to improperly used crypto. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-128843052.
[]
CVE-2017-13792
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:-:*:*:*:*:*:*:*" ]
GHSA-xrgr-fwmm-m4vx
Unspecified vulnerability in Oracle HTTP Server component in Oracle Application Server 10.1.2.0.1, 10.1.2.0.2, and 10.1.2.1.0 has unknown impact and remote attack vectors related to the PHP Module, aka Vuln# OHS03.
[]
GHSA-jv9p-xg7j-p65c
gifsicle-1.94 was found to have a floating point exception (FPE) vulnerability via resize_stream at src/xform.c.
[]
GHSA-7jr8-xq89-mwgm
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
[]
GHSA-f97x-f6x5-pmh9
LogiSphere 0.9.9j does not restrict the number of messages that can be sent, which allows remote attackers to cause a denial of service by sending a large number of messages via the msg command. NOTE: due to lack of appropriate details by the original researcher, it is unclear whether this description accurately reflects the discloser's claim and is distinct from the XSS issue.
[]
CVE-2014-6831
The Hippo Studio (aka com.appgreen.hippostudio) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:hippostudio:hippo_studio:1:*:*:*:*:android:*:*" ]
GHSA-4v5h-vp2v-p65r
SQL Server Native Client Remote Code Execution Vulnerability
[]
GHSA-h653-h7jh-76qg
af/util/xp/ut_go_file.cpp in AbiWord 3.0.2-2 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.
[]
CVE-2024-27660
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a Null-pointer dereferences in sub_41C488(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[ "cpe:2.3:o:dlink:dir-823g_firmware:1.02b05:*:*:*:*:*:*:*" ]
GHSA-w9x9-625v-x659
Stack-based buffer overflow in decoder/impeg2d_vld.c in mediaserver in Android 6.x before 2016-04-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 25812590.
[]
CVE-2016-3284
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, Office Compatibility Pack SP3, and Excel Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_for_mac:2011:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_for_mac:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_rt:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*" ]
CVE-2021-36225
Western Digital My Cloud devices before OS5 allow REST API access by low-privileged accounts, as demonstrated by API commands for firmware uploads and installation.
[ "cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*", "cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*" ]
CVE-2019-5856
Insufficient policy enforcement in storage in Google Chrome prior to 76.0.3809.87 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
CVE-2023-28455
An issue was discovered in Technitium through 11.0.2. The forwarding mode enables attackers to create a query loop using Technitium resolvers, launching amplification attacks and causing potential DoS.
[ "cpe:2.3:a:technitium:dns_server:*:*:*:*:*:*:*:*" ]
GHSA-45gw-fx24-h4pv
In the Linux kernel, the following vulnerability has been resolved:ksmbd: Fix dangling pointer in krb_authenticatekrb_authenticate frees sess->user and does not set the pointer to NULL. It calls ksmbd_krb5_authenticate to reinitialise sess->user but that function may return without doing so. If that happens then smb2_sess_setup, which calls krb_authenticate, will be accessing free'd memory when it later uses sess->user.
[]
CVE-2024-49570
drm/xe/tracing: Fix a potential TP_printk UAF
In the Linux kernel, the following vulnerability has been resolved: drm/xe/tracing: Fix a potential TP_printk UAF The commit afd2627f727b ("tracing: Check "%s" dereference via the field and not the TP_printk format") exposes potential UAFs in the xe_bo_move trace event. Fix those by avoiding dereferencing the xe_mem_type_to_name[] array at TP_printk time. Since some code refactoring has taken place, explicit backporting may be needed for kernels older than 6.10.
[]
CVE-2024-56169
A validation integrity issue was discovered in Fort through 1.6.4 before 2.0.0. RPKI Relying Parties (such as Fort) are supposed to maintain a backup cache of the remote RPKI data. This can be employed as a fallback in case a new fetch fails or yields incorrect files. However, the product currently uses its cache merely as a bandwidth saving tool (because fetching is performed through deltas). If a fetch fails midway or yields incorrect files, there is no viable fallback. This leads to incomplete route origin validation data.
[]
GHSA-958v-76xq-cvpv
Null pointer dereference can occur due to memory allocation failure in DIAG in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Wearables
[]
CVE-2024-33694
WordPress Meks ThemeForest Smart Widget plugin <= 1.5 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Meks Meks ThemeForest Smart Widget allows Stored XSS.This issue affects Meks ThemeForest Smart Widget: from n/a through 1.5.
[]
GHSA-7325-gcx9-7xh4
An incorrect permissions vulnerability was reported in the Lenovo App Store app that could allow an attacker to use system resources, resulting in a denial of service.
[]
GHSA-wrfc-pvp9-mr9g
Deserialization of Untrusted Data in Hugging Face Transformers
Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of model files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25191.
[]
GHSA-fj64-qprx-q7vq
genson vulnerable to stack exhaustion
An issue was discovered genson through 1.6 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.
[]
CVE-2024-36411
SuiteCRM authenticated SQL Injection in EmailUIAjax displayView controller
SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax displayView controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue.
[ "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*" ]
CVE-2023-20071
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection engine. An attacker could exploit this vulnerability by sending crafted FTP traffic through an affected device. A successful exploit could allow the attacker to bypass FTP inspection and deliver a malicious payload.
[ "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe:2.3:a:snort:snort:2.0:-:*:*:*:*:*:*", "cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cyber_vision:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_threat_defense:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:meraki_mx_security_appliance_firmware:-:*:*:*:*:*:*:*" ]
CVE-2012-2602
Multiple cross-site request forgery (CSRF) vulnerabilities in SolarWinds Orion Network Performance Monitor (NPM) before 10.3.1 allow remote attackers to hijack the authentication of administrators for requests that (1) create user accounts via CreateUserStepContainer actions to Admin/Accounts/Add/OrionAccount.aspx or (2) modify account privileges via a ynAdminRights action to Admin/Accounts/EditAccount.aspx.
[ "cpe:2.3:a:solarwinds:orion_network_performance_monitor:*:*:*:*:*:*:*:*", "cpe:2.3:a:solarwinds:orion_network_performance_monitor:10.1.13.0:*:*:*:*:*:*:*" ]
GHSA-m3v6-ff49-8q93
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending specifically crafted input to /tos/index.php?app/app_start_stop.
[]
CVE-2011-1541
Unspecified vulnerability in HP System Management Homepage (SMH) before 6.3 allows remote attackers to bypass intended access restrictions, and consequently execute arbitrary code, via unknown vectors.
[ "cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.0-103\\(a\\):*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.14.204:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.1-73:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.2-77:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.2.77:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:3.0.2.77:b:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.0.0-95:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.0.0.96:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.1.0-103:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.1.0.102:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.0-12:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.1-14:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.2-2:*:*:*:*:*:*:*", "cpe:2.3:a:hp:system_management_homepage:6.2.2.7:*:*:*:*:*:*:*" ]
GHSA-cqqf-7hc8-ww46
A vulnerability in the API of Cisco Meeting Server could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because requests that are sent to the API are not properly validated. An attacker could exploit this vulnerability by sending a malicious request to the API. A successful exploit could allow the attacker to cause all participants on a call to be disconnected, resulting in a DoS condition.
[]
CVE-2018-15697
ASUSTOR Data Master 3.1.5 and below allows authenticated remote non-administrative users to read any file on a share by providing the full path. For example, /home/admin/.ash_history.
[ "cpe:2.3:o:asustor:data_master:*:*:*:*:*:*:*:*" ]