id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2017-5706
|
Multiple buffer overflows in kernel in Intel Server Platform Services Firmware 4.0 allow attacker with local access to the system to execute arbitrary code.
|
[
"cpe:2.3:o:intel:server_platform_services_firmware:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-g2qq-c5j9-5w5w
|
XWiki Platform vulnerable to privilege escalation and remote code execution via the edit action
|
ImpactIn XWiki Platform, it's possible for a user to execute any content with the right of an existing document's content author, provided the user have edit right on it. The reason for this is that the edit action sets the content without modifying the content author.To reproduce:Log in as a user without programming or script right.Open the URL `<xwiki-host>/xwiki/bin/edit/<document>/?content=%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+Groovy%21%22%29%7B%7B%2Fgroovy%7D%7D&xpage=view`, where `<xwiki-host>` is the URL of your XWiki installation and `<document>` is the path to a document whose content author has programming right (or script right) and on which the current user has edit right.The text "Hello from Groovy!" is displayed in the page content, showing that the Groovy macro has been executed, which should not be the case for a user without programming right.PatchesThis has been patched in XWiki 14.10.6 and 15.2RC1.WorkaroundsThere are no known workarounds for it.Referenceshttps://jira.xwiki.org/browse/XWIKI-20385https://github.com/xwiki/xwiki-platform/commit/a0e6ca083b36be6f183b9af33ae735c1e02010f4For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])
|
[] |
CVE-2023-38844
|
SQL injection vulnerability in PMB v.7.4.7 and earlier allows a remote attacker to execute arbitrary code via the thesaurus parameter in export_skos.php.
|
[
"cpe:2.3:a:pmb_project:pmb:7.4.7:*:*:*:*:*:*:*"
] |
|
GHSA-vpgf-fgm8-gxr2
|
Apache DolphinScheduler vulnerable to Path Traversal
|
Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher.
|
[] |
CVE-2020-14847
|
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*"
] |
|
GHSA-m7cg-2494-2qjg
|
Cross-site scripting (XSS) vulnerability in index.php in Beehive Forum allows remote attackers to inject arbitrary web script or HTML via the webtag parameter.
|
[] |
|
CVE-2011-3701
|
AlegroCart 1.2.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by common.php and certain other files.
|
[
"cpe:2.3:a:alegrocart:alegrocart:1.2.3:*:*:*:*:*:*:*"
] |
|
CVE-2022-36067
|
vm2 vulnerable to Sandbox Escape before v3.9.11
|
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
|
[
"cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*"
] |
GHSA-v84j-vh7x-g7j6
|
Joomla! XSS in Default Templates
|
In Joomla! 3.x before 3.9.12, inadequate escaping allowed XSS attacks using the logo parameter of the default templates.
|
[] |
CVE-2019-16571
|
A missing permission check in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.
|
[
"cpe:2.3:a:jenkins:rapiddeploy:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-w37j-mvh3-43m8
|
Zip Slip vulnerability in Pluck-CMS Pluck 4.7.15 allows an attacker to upload specially crafted zip files, resulting in directory traversal and potentially arbitrary code execution.
|
[] |
|
GHSA-j3r2-6983-xh2v
|
A link following vulnerability in the scanning function of Trend Micro Apex One and Worry-Free Business Security agents could allow a local attacker to escalate privileges on affected installations. The resolution for this issue has been deployed automatically via ActiveUpdate to customers in an updated Spyware pattern. Customers who are up-to-date on detection patterns are not required to take any additional steps to mitigate this issue.
|
[] |
|
CVE-2022-32781
|
This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5, Security Update 2022-005 Catalina, macOS Big Sur 11.6.8. An app with root privileges may be able to access private information.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*"
] |
|
CVE-2002-0348
|
service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long service argument.
|
[
"cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:cobalt_raq_4:*:*:*:*:*:*:*:*"
] |
|
GHSA-ppvj-8723-v728
|
Cross-site scripting (XSS) vulnerability in index.php in Moodle 1.7.1 allows remote attackers to inject arbitrary web script or HTML via a style expression in the search parameter, a different vulnerability than CVE-2004-1424.
|
[] |
|
GHSA-m5x8-5g7c-7x6p
|
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in hardy-barth cph2_echarge_firmware allows OS Command Injection.This issue affects cph2_echarge_firmware: through 2.0.4.
|
[] |
|
GHSA-8vv6-g3hv-82xh
|
Missing Authorization vulnerability in Iqonic Design Graphina allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Graphina: from n/a through 3.0.4.
|
[] |
|
CVE-2024-32286
|
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability located via the page parameter in the fromVirtualSer function.
|
[
"cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*"
] |
|
CVE-2021-26891
|
Windows Container Execution Agent Elevation of Privilege Vulnerability
|
Windows Container Execution Agent Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] |
CVE-2024-35931
|
drm/amdgpu: Skip do PCI error slot reset during RAS recovery
|
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Skip do PCI error slot reset during RAS recovery
Why:
The PCI error slot reset maybe triggered after inject ue to UMC multi times, this
caused system hang.
[ 557.371857] amdgpu 0000:af:00.0: amdgpu: GPU reset succeeded, trying to resume
[ 557.373718] [drm] PCIE GART of 512M enabled.
[ 557.373722] [drm] PTB located at 0x0000031FED700000
[ 557.373788] [drm] VRAM is lost due to GPU reset!
[ 557.373789] [drm] PSP is resuming...
[ 557.547012] mlx5_core 0000:55:00.0: mlx5_pci_err_detected Device state = 1 pci_status: 0. Exit, result = 3, need reset
[ 557.547067] [drm] PCI error: detected callback, state(1)!!
[ 557.547069] [drm] No support for XGMI hive yet...
[ 557.548125] mlx5_core 0000:55:00.0: mlx5_pci_slot_reset Device state = 1 pci_status: 0. Enter
[ 557.607763] mlx5_core 0000:55:00.0: wait vital counter value 0x16b5b after 1 iterations
[ 557.607777] mlx5_core 0000:55:00.0: mlx5_pci_slot_reset Device state = 1 pci_status: 1. Exit, err = 0, result = 5, recovered
[ 557.610492] [drm] PCI error: slot reset callback!!
...
[ 560.689382] amdgpu 0000:3f:00.0: amdgpu: GPU reset(2) succeeded!
[ 560.689546] amdgpu 0000:5a:00.0: amdgpu: GPU reset(2) succeeded!
[ 560.689562] general protection fault, probably for non-canonical address 0x5f080b54534f611f: 0000 [#1] SMP NOPTI
[ 560.701008] CPU: 16 PID: 2361 Comm: kworker/u448:9 Tainted: G OE 5.15.0-91-generic #101-Ubuntu
[ 560.712057] Hardware name: Microsoft C278A/C278A, BIOS C2789.5.BS.1C11.AG.1 11/08/2023
[ 560.720959] Workqueue: amdgpu-reset-hive amdgpu_ras_do_recovery [amdgpu]
[ 560.728887] RIP: 0010:amdgpu_device_gpu_recover.cold+0xbf1/0xcf5 [amdgpu]
[ 560.736891] Code: ff 41 89 c6 e9 1b ff ff ff 44 0f b6 45 b0 e9 4f ff ff ff be 01 00 00 00 4c 89 e7 e8 76 c9 8b ff 44 0f b6 45 b0 e9 3c fd ff ff <48> 83 ba 18 02 00 00 00 0f 84 6a f8 ff ff 48 8d 7a 78 be 01 00 00
[ 560.757967] RSP: 0018:ffa0000032e53d80 EFLAGS: 00010202
[ 560.763848] RAX: ffa00000001dfd10 RBX: ffa0000000197090 RCX: ffa0000032e53db0
[ 560.771856] RDX: 5f080b54534f5f07 RSI: 0000000000000000 RDI: ff11000128100010
[ 560.779867] RBP: ffa0000032e53df0 R08: 0000000000000000 R09: ffffffffffe77f08
[ 560.787879] R10: 0000000000ffff0a R11: 0000000000000001 R12: 0000000000000000
[ 560.795889] R13: ffa0000032e53e00 R14: 0000000000000000 R15: 0000000000000000
[ 560.803889] FS: 0000000000000000(0000) GS:ff11007e7e800000(0000) knlGS:0000000000000000
[ 560.812973] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 560.819422] CR2: 000055a04c118e68 CR3: 0000000007410005 CR4: 0000000000771ee0
[ 560.827433] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 560.835433] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 560.843444] PKRU: 55555554
[ 560.846480] Call Trace:
[ 560.849225] <TASK>
[ 560.851580] ? show_trace_log_lvl+0x1d6/0x2ea
[ 560.856488] ? show_trace_log_lvl+0x1d6/0x2ea
[ 560.861379] ? amdgpu_ras_do_recovery+0x1b2/0x210 [amdgpu]
[ 560.867778] ? show_regs.part.0+0x23/0x29
[ 560.872293] ? __die_body.cold+0x8/0xd
[ 560.876502] ? die_addr+0x3e/0x60
[ 560.880238] ? exc_general_protection+0x1c5/0x410
[ 560.885532] ? asm_exc_general_protection+0x27/0x30
[ 560.891025] ? amdgpu_device_gpu_recover.cold+0xbf1/0xcf5 [amdgpu]
[ 560.898323] amdgpu_ras_do_recovery+0x1b2/0x210 [amdgpu]
[ 560.904520] process_one_work+0x228/0x3d0
How:
In RAS recovery, mode-1 reset is issued from RAS fatal error handling and expected
all the nodes in a hive to be reset. no need to issue another mode-1 during this procedure.
|
[] |
CVE-2024-4297
|
HGiga iSherlock - Arbitrary File Download
|
The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherlock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability to download arbitrary system files.
|
[
"cpe:2.3:a:hgiga:isherlock:4.5:*:*:*:*:*:*:*"
] |
GHSA-93h5-jmg6-mmph
|
The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges.
|
[] |
|
GHSA-6f8f-rchr-mhp3
|
In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.
|
[] |
|
CVE-2022-49385
|
driver: base: fix UAF when driver_attach failed
|
In the Linux kernel, the following vulnerability has been resolved:
driver: base: fix UAF when driver_attach failed
When driver_attach(drv); failed, the driver_private will be freed.
But it has been added to the bus, which caused a UAF.
To fix it, we need to delete it from the bus when failed.
|
[] |
CVE-2021-29454
|
Sandbox Escape by math function in smarty
|
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.
|
[
"cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] |
GHSA-hgj4-h2x3-rfx4
|
Sentry vulnerable to incorrect credential validation on OAuth token requests
|
ImpactAn attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account.Remediation**Sentry SaaS** customers do not need to take any action. Those with the highest risk will be contacted directly by Sentry.**Self-hosted installations** should upgrade to version 23.7.2 or higher.WorkaroundsThere are no direct workarounds, but users should review applications authorized on their account (_User Settings > Authorized Applications_) and remove any that are no longer needed.
|
[] |
CVE-2025-30945
|
WordPress Taskbuilder <= 4.0.3 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in taskbuilder Taskbuilder allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Taskbuilder: from n/a through 4.0.3.
|
[] |
GHSA-7vw4-jppr-mcc9
|
Walter Beschmout PhpQuiz allows remote attackers to obtain sensitive information via a direct request to cfgphpquiz/install.php and other unspecified vectors.
|
[] |
|
CVE-2013-7459
|
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
|
[
"cpe:2.3:a:dlitz:pycrypto:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*"
] |
|
GHSA-h3gm-j47f-vqgx
|
A server-side request forgery vulnerability exists in multiple firmware versions of AVTECH DVR devices that exposes the /cgi-bin/nobody/Search.cgi?action=cgi_query endpoint without authentication. An attacker can manipulate the ip, port, and queryb64str parameters to make arbitrary HTTP requests from the DVR to internal or external systems, potentially exposing sensitive data or interacting with internal services.
|
[] |
|
GHSA-7pxw-57qc-2vjm
|
A session hijacking vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters. Unauthenticated attackers can access exposed log files (/logs/debug/xteLog*), potentially revealing sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). Exploiting this flaw could allow attackers to hijack active sessions, gain unauthorized access, and escalate privileges on affected devices.
|
[] |
|
CVE-2020-9119
|
There is a privilege escalation vulnerability on some Huawei smart phones due to design defects. The attacker needs to physically contact the mobile phone and obtain higher privileges, and execute relevant commands, resulting in the user's privilege promotion.
|
[
"cpe:2.3:o:huawei:mate_10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_30_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_30_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:p40_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p40_pro:-:*:*:*:*:*:*:*"
] |
|
GHSA-wc7v-37g9-8hvc
|
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an outdated and unused component allowing for malicious user input of active code.
|
[] |
|
GHSA-wp68-67c6-87fh
|
Hyperledger Fabric 2.3 allows attackers to cause a denial of service (orderer crash) by repeatedly sending a crafted channel tx with the same Channel name. NOTE: the official Fabric with Raft prevents exploitation via a locking mechanism and a check for names that already exist.
|
[] |
|
GHSA-wpw7-wxjm-cw8r
|
actionpack allows bypass of database-query restrictions
|
`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.
|
[] |
CVE-2023-7141
|
code-projects Client Details System update-clients.php sql injection
|
A vulnerability was found in code-projects Client Details System 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/update-clients.php. The manipulation of the argument uid leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249144.
|
[
"cpe:2.3:a:code-projects:client_details_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-53r8-v6vr-f62f
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
|
[] |
|
GHSA-mv8m-8gw4-6jh3
|
Missing Authorization vulnerability in SolidWP iThemes Sync allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iThemes Sync: from n/a through 2.1.13.
|
[] |
|
CVE-2017-18764
|
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D6100 before 1.0.0.55, D7000 before 1.0.1.50, D7800 before 1.0.1.28, JNR1010v2 before 1.1.0.44, JR6150 before 1.0.1.10, JWNR2010v5 before 1.1.0.44, PR2000 before 1.0.0.18, R6050 before 1.0.1.10, R6100 before 1.0.1.14, R6120 before 1.0.0.30, R6220 before 1.1.0.50, R6700v2 before 1.2.0.4, R6800 before 1.2.0.4, R6900v2 before 1.2.0.4, R7500 before 1.0.0.110, R7500v2 before 1.0.3.20, R7800 before 1.0.2.36, R9000 before 1.0.2.52, WN3000RPv3 before 1.0.2.50, WNDR3700v4 before 1.0.2.88, WNDR3700v5 before 1.1.0.48, WNDR4300v1 before 1.0.2.90, WNDR4300v2 before 1.0.0.48, WNDR4500v3 before 1.0.0.48, WNR1000v4 before 1.1.0.44, WNR2000v5 before 1.0.0.58, WNR2020 before 1.1.0.44, and WNR2050 before 1.1.0.44.
|
[
"cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jwnr2010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jwnr2010:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:pr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:pr2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn3000rp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn3000rp:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v1:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2050:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-5143
|
SonicOS SSLVPN login page allows a remote unauthenticated attacker to perform firewall management administrator username enumeration based on the server responses. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
|
[
"cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sonicos:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sonicwall:sonicosv:*:*:*:*:*:*:*:*"
] |
|
GHSA-fc5g-gpmc-9m95
|
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of Abstract Syntax Notation One (ASN.1)-encoded variables in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the SNMP daemon on the affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition.
|
[] |
|
GHSA-fpj9-xrvv-p65j
|
Heap-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via an invalid color table size when parsing the color table atom (CTAB) in a movie file, related to the CTAB RGB values.
|
[] |
|
CVE-2025-0585
|
aEnrich Technology a+HRD - SQL Injection
|
The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
|
[] |
CVE-2017-18451
|
cPanel before 64.0.21 allows attackers to read a user's crontab file during a short time interval upon a cPAddon upgrade (SEC-257).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-28373
|
Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 does not properly sanitize user-controlled parameters within the crtcreadpartition function of the crtcrpc JSON listener in /usr/lib/lua/luci/crtc.lua. A remote attacker on the local network can inject shell metacharacters to achieve remote code execution as root.
|
[
"cpe:2.3:o:verizon:lvskihp_indoorunit_firmware:3.4.66.162:*:*:*:*:*:*:*",
"cpe:2.3:h:verizon:lvskihp_indoorunit:-:*:*:*:*:*:*:*"
] |
|
GHSA-h2w6-mvpr-jj72
|
A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified as critical. This issue affects the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-xjrg-6fv9-6rjg
|
Stored XSS vulnerability in Jenkins Build With Parameters Plugin
|
Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.Jenkins Build With Parameters Plugin 1.5.1 escapes parameter names and descriptions.
|
[] |
CVE-2021-39325
|
OptinMonster <= 2.6.0 Reflected Cross-Site Scripting
|
The OptinMonster WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient input validation in the load_previews function found in the ~/OMAPI/Output.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.6.0.
|
[
"cpe:2.3:a:optinmonster:optinmonster:*:*:*:*:*:wordpress:*:*"
] |
CVE-2025-6862
|
SourceCodester Best Salon Management System edit_plan.php sql injection
|
A vulnerability classified as critical has been found in SourceCodester Best Salon Management System 1.0. Affected is an unknown function of the file /panel/edit_plan.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] |
CVE-2021-1510
|
Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities
|
Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
|
[
"cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_100_firmware:19.2.99:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_1000_firmware:19.2.99:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_100b_firmware:19.2.99:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_100m_firmware:19.2.99:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_100wm_firmware:19.2.99:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_2000_firmware:19.2.99:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_5000_firmware:19.2.99:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_cloud_firmware:19.2.99:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:*"
] |
CVE-2011-2285
|
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Installer.
|
[
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*"
] |
|
CVE-2006-6472
|
The httpd.conf file in Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 configures port 443 to be always active, which has unknown impact and remote attack vectors.
|
[
"cpe:2.3:h:xerox:workcentre:*:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre:*:*:pro:*:*:*:*:*"
] |
|
CVE-2025-1419
|
XSS in Proget MDM
|
Input provided in comment section of Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack.
This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).
|
[] |
CVE-2017-11437
|
GitLab Enterprise Edition (EE) before 8.17.7, 9.0.11, 9.1.8, 9.2.8, and 9.3.8 allows an authenticated user with the ability to create a project to use the mirroring feature to potentially read repositories belonging to other users.
|
[
"cpe:2.3:a:gitlab:gitlab:8.5.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.12:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.13:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.8.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.9.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.12:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.10.13:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.11.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.12.12:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.13.11:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.14.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.15.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.16.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.17.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.9:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.0.10:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.1.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.2.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.3:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.4:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.6:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:9.3.7:*:*:*:enterprise:*:*:*"
] |
|
GHSA-84hm-26hq-gff5
|
Plesk CMS 18.0.37 is affected by an insecure permissions vulnerability that allows privilege Escalation from user to admin rights.
|
[] |
|
GHSA-r3rg-38gc-7x9q
|
VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register.
|
[] |
|
CVE-2024-39530
|
Junos OS: Attempting to access specific sensors on platforms not supporting these will lead to a chassisd crash
|
An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis management daemon (chassisd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a
Denial-of-Service (DoS).
If an attempt is made to access specific sensors on platforms not supporting these sensors, either via GRPC or netconf, chassisd will crash and restart leading to a restart of all FPCs and thereby a complete outage.
This issue affects Junos OS:
* 21.4 versions from 21.4R3 before 21.4R3-S5,
* 22.1 versions from 22.1R3 before 22.1R3-S4,
* 22.2 versions from 22.2R2 before 22.2R3,
* 22.3 versions from 22.3R1 before 22.3R2-S2, 22.3R3,
* 22.4 versions from 22.4R1 before 22.4R2.
This issue does not affect Junos OS versions earlier than 21.4.
|
[
"cpe:2.3:o:juniper:junos_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*"
] |
GHSA-2g6v-2xh6-p5mw
|
Cross-site scripting (XSS) vulnerability in index.php in Dreamlevels DreamPoll 3.1 allows remote attackers to inject arbitrary web script or HTML via the recordsPerPage parameter in a poll_default login action.
|
[] |
|
GHSA-7559-8jwg-355g
|
An issue was discovered in CIRCONTROL CirCarLife before 4.3. There is PLC status disclosure due to lack of authentication for /html/devstat.html.
|
[] |
|
CVE-2019-5519
|
VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host.
|
[
"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*"
] |
|
CVE-2021-3655
|
A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-qpw6-gmmf-vxhp
|
ACCEL-PPP 1.12.0 has an out-of-bounds read in post_msg when processing a call_clear_request.
|
[] |
|
GHSA-m847-cc8r-22w3
|
Cross-site scripting vulnerability in phpBB 2.0.0 (phpBB2) allows remote attackers to execute Javascript as other phpBB users by including a http:// and a double-quote (") in the [IMG] tag, which bypasses phpBB's security check, terminates the src parameter of the resulting HTML IMG tag, and injects the script.
|
[] |
|
CVE-2022-0233
|
ProfileGrid – User Profiles, Memberships, Groups and Communities <= 4.7.4 Authenticated Stored Cross-Site Scripting
|
The ProfileGrid – User Profiles, Memberships, Groups and Communities WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the pm_user_avatar and pm_cover_image parameters found in the ~/admin/class-profile-magic-admin.php file which allows attackers with authenticated user access, such as subscribers, to inject arbitrary web scripts into their profile, in versions up to and including 1.2.7.
|
[
"cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*"
] |
GHSA-mw4w-465g-gm7q
|
PHP remote file inclusion vulnerability in includes/functions_nomoketos_rules.php in the NoMoKeTos Rules 0.0.1 module for phpBB allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
|
[] |
|
GHSA-3673-4qjp-285p
|
Unrestricted file upload vulnerability in admin/uploadimage.php in eLitius 1.0 allows remote attackers to bypass intended access restrictions and upload and execute arbitrary files via an avatar file with an accepted Content-Type such as image/gif, then requesting the file in admin/banners/.
|
[] |
|
GHSA-8mvv-3xxr-4jvf
|
Certain NETGEAR devices are affected by command injection by an authenticated user . This affects RAX200 before 1.0.3.106, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
|
[] |
|
CVE-2025-4945
|
Libsoup: integer overflow in cookie expiration date handling in libsoup
|
A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in undefined behavior, allowing an attacker to bypass cookie expiration logic, causing persistent or unintended cookie behavior. The issue stems from improper validation of large integer inputs during date arithmetic operations within the cookie parsing routines.
|
[
"cpe:/o:redhat:enterprise_linux:10",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9"
] |
CVE-2009-4576
|
SQL injection vulnerability in the BeeHeard (com_beeheard) component 1.x for Joomla! allows remote attackers to execute arbitrary SQL commands via the category_id parameter in a suggestions action to index.php.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cmstactics:com_beeheard:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cmstactics:com_beeheard:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cmstactics:com_beeheard:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cmstactics:com_beeheard:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cmstactics:com_beeheard:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cmstactics:com_beeheard:1.4.2:*:*:*:*:*:*:*"
] |
|
CVE-2015-0569
|
Heap-based buffer overflow in the private wireless extensions IOCTL implementation in wlan_hdd_wext.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that establishes a packet filter.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-93qr-q6xr-pp2m
|
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 federated server is vulnerable to a denial of service as the server may crash when using a specially crafted wrapper using certain options. IBM X-Force ID: 253202.
|
[] |
|
GHSA-qr5v-8q9r-729f
|
The Candy Girl Party Makeover (aka com.bearhugmedia.android_candygirlparty) application 1.0.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] |
|
GHSA-h6h4-9666-mq74
|
A vulnerability was found in rails-cv-app. It has been rated as problematic. Affected by this issue is some unknown functionality of the file app/controllers/uploaded_files_controller.rb. The manipulation with the input ../../../etc/passwd leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The name of the patch is 0d20362af0a5f8a126f67c77833868908484a863. It is recommended to apply a patch to fix this issue. VDB-217178 is the identifier assigned to this vulnerability.
|
[] |
|
GHSA-r7qg-49m3-m675
|
Cross-site scripting (XSS) vulnerability in return_dynamic_filters.php in Mantis before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the filter_target parameter.
|
[] |
|
CVE-2022-25915
|
Improper access control vulnerability in ELECOM LAN routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attacker to bypass access restriction and to access the management screen of the product via unspecified vectors.
|
[
"cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1167gst2a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1167gst2a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1167gst2h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1167gst2h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1750gs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1750gs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1750gsv_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1750gsv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1900gst_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1900gst:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-2533gst_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-2533gst:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-2533gsta_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-2533gsta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-2533gst2sp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-2533gst2sp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-2533gst2-g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-2533gst2-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:edwrc-2533gst2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:edwrc-2533gst2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1167gs2-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1167gs2-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1167gs2h-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1167gs2h-b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wmc-dlgst2-w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wmc-dlgst2-w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wmc-m1267gst2-w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wmc-m1267gst2-w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wmc-2hc-w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wmc-2hc-w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wmc-c2533gst-w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wmc-c2533gst-w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1900gst2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1900gst2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1900gst2sp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1900gst2sp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:wrc-1750gst2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:wrc-1750gst2:-:*:*:*:*:*:*:*"
] |
|
CVE-2007-1805
|
SQL injection vulnerability in genre.php in the debaser 0.92 and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the genreid parameter.
|
[
"cpe:2.3:a:myxoops:debaser:*:*:*:*:*:*:*:*"
] |
|
GHSA-6jxx-vp42-6rcv
|
Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of "behavior and state of certain JDK classes" and "mutable static."
|
[] |
|
CVE-2018-14037
|
Cross-site scripting (XSS) vulnerability in Progress Kendo UI Editor v2018.1.221 allows remote attackers to inject arbitrary JavaScript into the DOM of the WYSIWYG editor because of the editorNS.Serializer toEditableHtml function in kendo.all.min.js. If the victim accesses the editor, the payload gets executed. Furthermore, if the payload is reflected at any other resource that does rely on the sanitisation of the editor itself, the JavaScript payload will be executed in the context of the application. This allows attackers (in the worst case) to take over user sessions.
|
[
"cpe:2.3:a:progress:kendo_ui:2018.1.221:*:*:*:*:*:*:*"
] |
|
CVE-2015-0880
|
Buffer overflow in CREAR AL-Mail32 before 1.13d allows remote attackers to execute arbitrary code via a long filename of an attachment.
|
[
"cpe:2.3:a:crear.ne.jp:al-mail32:*:c:*:*:*:*:*:*"
] |
|
GHSA-4frh-rw8g-vq9h
|
There is a Cross-Site Scripting(XSS) vulnerability in HUAWEI WS318n product when processing network settings. Due to insufficient validation of user input, a local authenticated attacker could exploit this vulnerability by injecting special characters. Successful exploit could cause certain information disclosure. Affected product versions include: WS318n-21 10.0.2.2, 10.0.2.5 and 10.0.2.6.
|
[] |
|
GHSA-m59w-q74p-9vg2
|
Cross-site scripting vulnerability in Welcart e-Commerce versions prior to 2.2.4 allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
|
[] |
|
GHSA-34qx-f7ff-w7xc
|
Artica Proxy 3.06.200056 allows remote attackers to execute arbitrary commands as root by reading the ressources/settings.inc ldap_admin and ldap_password fields, using these credentials at logon.php, and then entering the commands in the admin.index.php command-line field.
|
[] |
|
GHSA-ph9v-cr87-52c5
|
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] |
|
CVE-2021-32935
|
Cognex In-Sight OPC Server - Deserialization of Untrusted Data
|
The affected Cognex product, the In-Sight OPC Server versions v5.7.4 (96) and prior, deserializes untrusted data, which could allow a remote attacker access to system level permission commands and local privilege escalation.
|
[
"cpe:2.3:a:cognex:in-sight_opc_server:*:*:*:*:*:*:*:*"
] |
CVE-2020-28091
|
cxuucms v3 has a SQL injection vulnerability, which can lead to the leakage of all database data via the keywords parameter via search.php.
|
[
"cpe:2.3:a:cxuu:cxuucms:3.0:*:*:*:*:*:*:*"
] |
|
GHSA-8q4r-xrj3-2q8p
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[] |
|
GHSA-9wxm-jr2x-h7pp
|
An information disclosure vulnerability exists when Remote Procedure Call runtime improperly initializes objects in memory, aka "Remote Procedure Call runtime Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
|
[] |
|
GHSA-73jw-rhhg-3hg6
|
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6078.
|
[] |
|
CVE-2016-3002
|
IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 allows physically proximate attackers to obtain sensitive information by reading cached data on a client device.
|
[
"cpe:2.3:a:ibm:connections:4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:connections:4.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:connections:5.0.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-457x-v5jv-rvr7
|
In the __multadd function of the newlib libc library, prior to versions 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. This will trigger a null pointer dereference bug in case of a memory allocation failure.
|
[] |
|
GHSA-mrqh-rf5r-9qqw
|
Multiple unspecified vulnerabilities in Oracle E-Business Suite and Applications 11.5.10 have unspecified impact and attack vectors, as identified by Oracle Vuln# (1) APPS01 in the (a) Application Install component; (2) APPS07 in the (b) Oracle Applications Framework component; (3) APPS08, (4) APPS09, (5) APPS10, and (6) APPS11 in the (c) Oracle Applications Technology Stack component; (7) APPS12 in the (d) Oracle Human Resources component; (8) APPS15 and (9) APPS16 in the (e) Oracle Marketing component; (10) APPS17 in the (f) Marketing Encyclopedia System component; (11) APPS18 in the (g) Oracle Trade Management component; and (12) APPS19 in the (h) Oracle Web Applications Desktop Integration component.
|
[] |
|
GHSA-6f44-88r9-jjfp
|
In ppmp_protect_buf of drm_fw.c, there is a possible information disclosure due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] |
|
CVE-2012-3697
|
WebKit in Apple Safari before 6.0 does not properly handle file: URLs, which allows remote attackers to bypass intended sandbox restrictions and read arbitrary files by leveraging a WebProcess compromise.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:5.1.6:*:*:*:*:*:*:*"
] |
|
GHSA-w7jq-m96j-xq9g
|
SQL injection vulnerability in comment.php in BlueCMS 1.6 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For HTTP header in a send action.
|
[] |
|
GHSA-rrmp-c5xv-q7fj
|
Unspecified vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API.
|
[] |
|
GHSA-467h-6pw9-97gq
|
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34486, CVE-2021-34487.
|
[] |
|
GHSA-h9ww-wjg4-jvvg
|
Liferay Portal and Liferay DXP Fails to Check Permissions in Translation Module
|
The Translation module before v2.0.58 from Liferay Portal (v7.4.3.12 through v7.4.3.36), and Liferay DXP 7.4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation, allowing attackers to download a web content page's XLIFF translation file via crafted URL.
|
[] |
CVE-2023-21109
|
In multiple places of AccessibilityService, there is a possible way to hide the app from the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261589597
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-2712
|
Unspecified vulnerability in MH Software Connect Daily before 3.3.3 has unknown impact and attack vectors.
|
[
"cpe:2.3:a:mh_software:connect_daily:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mh_software:connect_daily:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mh_software:connect_daily:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mh_software:connect_daily:3.3.2:*:*:*:*:*:*:*"
] |
|
GHSA-2vgm-wxr3-6w2j
|
Authentication bypass in Apache Shiro
|
Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.