id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
CVE-2017-5706
Multiple buffer overflows in kernel in Intel Server Platform Services Firmware 4.0 allow attacker with local access to the system to execute arbitrary code.
[ "cpe:2.3:o:intel:server_platform_services_firmware:4.0:*:*:*:*:*:*:*" ]
GHSA-g2qq-c5j9-5w5w
XWiki Platform vulnerable to privilege escalation and remote code execution via the edit action
ImpactIn XWiki Platform, it's possible for a user to execute any content with the right of an existing document's content author, provided the user have edit right on it. The reason for this is that the edit action sets the content without modifying the content author.To reproduce:Log in as a user without programming or script right.Open the URL `<xwiki-host>/xwiki/bin/edit/<document>/?content=%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+Groovy%21%22%29%7B%7B%2Fgroovy%7D%7D&xpage=view`, where `<xwiki-host>` is the URL of your XWiki installation and `<document>` is the path to a document whose content author has programming right (or script right) and on which the current user has edit right.The text "Hello from Groovy!" is displayed in the page content, showing that the Groovy macro has been executed, which should not be the case for a user without programming right.PatchesThis has been patched in XWiki 14.10.6 and 15.2RC1.WorkaroundsThere are no known workarounds for it.Referenceshttps://jira.xwiki.org/browse/XWIKI-20385https://github.com/xwiki/xwiki-platform/commit/a0e6ca083b36be6f183b9af33ae735c1e02010f4For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])
[]
CVE-2023-38844
SQL injection vulnerability in PMB v.7.4.7 and earlier allows a remote attacker to execute arbitrary code via the thesaurus parameter in export_skos.php.
[ "cpe:2.3:a:pmb_project:pmb:7.4.7:*:*:*:*:*:*:*" ]
GHSA-vpgf-fgm8-gxr2
Apache DolphinScheduler vulnerable to Path Traversal
Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher.
[]
CVE-2020-14847
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Query). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*" ]
GHSA-m7cg-2494-2qjg
Cross-site scripting (XSS) vulnerability in index.php in Beehive Forum allows remote attackers to inject arbitrary web script or HTML via the webtag parameter.
[]
CVE-2011-3701
AlegroCart 1.2.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by common.php and certain other files.
[ "cpe:2.3:a:alegrocart:alegrocart:1.2.3:*:*:*:*:*:*:*" ]
CVE-2022-36067
vm2 vulnerable to Sandbox Escape before v3.9.11
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.
[ "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*" ]
GHSA-v84j-vh7x-g7j6
Joomla! XSS in Default Templates
In Joomla! 3.x before 3.9.12, inadequate escaping allowed XSS attacks using the logo parameter of the default templates.
[]
CVE-2019-16571
A missing permission check in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.
[ "cpe:2.3:a:jenkins:rapiddeploy:*:*:*:*:*:jenkins:*:*" ]
GHSA-w37j-mvh3-43m8
Zip Slip vulnerability in Pluck-CMS Pluck 4.7.15 allows an attacker to upload specially crafted zip files, resulting in directory traversal and potentially arbitrary code execution.
[]
GHSA-j3r2-6983-xh2v
A link following vulnerability in the scanning function of Trend Micro Apex One and Worry-Free Business Security agents could allow a local attacker to escalate privileges on affected installations. The resolution for this issue has been deployed automatically via ActiveUpdate to customers in an updated Spyware pattern. Customers who are up-to-date on detection patterns are not required to take any additional steps to mitigate this issue.
[]
CVE-2022-32781
This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5, Security Update 2022-005 Catalina, macOS Big Sur 11.6.8. An app with root privileges may be able to access private information.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*" ]
CVE-2002-0348
service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long service argument.
[ "cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:cobalt_raq_4:*:*:*:*:*:*:*:*" ]
GHSA-ppvj-8723-v728
Cross-site scripting (XSS) vulnerability in index.php in Moodle 1.7.1 allows remote attackers to inject arbitrary web script or HTML via a style expression in the search parameter, a different vulnerability than CVE-2004-1424.
[]
GHSA-m5x8-5g7c-7x6p
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in hardy-barth cph2_echarge_firmware allows OS Command Injection.This issue affects cph2_echarge_firmware: through 2.0.4.
[]
GHSA-8vv6-g3hv-82xh
Missing Authorization vulnerability in Iqonic Design Graphina allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Graphina: from n/a through 3.0.4.
[]
CVE-2024-32286
Tenda W30E v1.0 V1.0.1.25(633) firmware has a stack overflow vulnerability located via the page parameter in the fromVirtualSer function.
[ "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*" ]
CVE-2021-26891
Windows Container Execution Agent Elevation of Privilege Vulnerability
Windows Container Execution Agent Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
CVE-2024-35931
drm/amdgpu: Skip do PCI error slot reset during RAS recovery
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Skip do PCI error slot reset during RAS recovery Why: The PCI error slot reset maybe triggered after inject ue to UMC multi times, this caused system hang. [ 557.371857] amdgpu 0000:af:00.0: amdgpu: GPU reset succeeded, trying to resume [ 557.373718] [drm] PCIE GART of 512M enabled. [ 557.373722] [drm] PTB located at 0x0000031FED700000 [ 557.373788] [drm] VRAM is lost due to GPU reset! [ 557.373789] [drm] PSP is resuming... [ 557.547012] mlx5_core 0000:55:00.0: mlx5_pci_err_detected Device state = 1 pci_status: 0. Exit, result = 3, need reset [ 557.547067] [drm] PCI error: detected callback, state(1)!! [ 557.547069] [drm] No support for XGMI hive yet... [ 557.548125] mlx5_core 0000:55:00.0: mlx5_pci_slot_reset Device state = 1 pci_status: 0. Enter [ 557.607763] mlx5_core 0000:55:00.0: wait vital counter value 0x16b5b after 1 iterations [ 557.607777] mlx5_core 0000:55:00.0: mlx5_pci_slot_reset Device state = 1 pci_status: 1. Exit, err = 0, result = 5, recovered [ 557.610492] [drm] PCI error: slot reset callback!! ... [ 560.689382] amdgpu 0000:3f:00.0: amdgpu: GPU reset(2) succeeded! [ 560.689546] amdgpu 0000:5a:00.0: amdgpu: GPU reset(2) succeeded! [ 560.689562] general protection fault, probably for non-canonical address 0x5f080b54534f611f: 0000 [#1] SMP NOPTI [ 560.701008] CPU: 16 PID: 2361 Comm: kworker/u448:9 Tainted: G OE 5.15.0-91-generic #101-Ubuntu [ 560.712057] Hardware name: Microsoft C278A/C278A, BIOS C2789.5.BS.1C11.AG.1 11/08/2023 [ 560.720959] Workqueue: amdgpu-reset-hive amdgpu_ras_do_recovery [amdgpu] [ 560.728887] RIP: 0010:amdgpu_device_gpu_recover.cold+0xbf1/0xcf5 [amdgpu] [ 560.736891] Code: ff 41 89 c6 e9 1b ff ff ff 44 0f b6 45 b0 e9 4f ff ff ff be 01 00 00 00 4c 89 e7 e8 76 c9 8b ff 44 0f b6 45 b0 e9 3c fd ff ff <48> 83 ba 18 02 00 00 00 0f 84 6a f8 ff ff 48 8d 7a 78 be 01 00 00 [ 560.757967] RSP: 0018:ffa0000032e53d80 EFLAGS: 00010202 [ 560.763848] RAX: ffa00000001dfd10 RBX: ffa0000000197090 RCX: ffa0000032e53db0 [ 560.771856] RDX: 5f080b54534f5f07 RSI: 0000000000000000 RDI: ff11000128100010 [ 560.779867] RBP: ffa0000032e53df0 R08: 0000000000000000 R09: ffffffffffe77f08 [ 560.787879] R10: 0000000000ffff0a R11: 0000000000000001 R12: 0000000000000000 [ 560.795889] R13: ffa0000032e53e00 R14: 0000000000000000 R15: 0000000000000000 [ 560.803889] FS: 0000000000000000(0000) GS:ff11007e7e800000(0000) knlGS:0000000000000000 [ 560.812973] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 560.819422] CR2: 000055a04c118e68 CR3: 0000000007410005 CR4: 0000000000771ee0 [ 560.827433] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 560.835433] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400 [ 560.843444] PKRU: 55555554 [ 560.846480] Call Trace: [ 560.849225] <TASK> [ 560.851580] ? show_trace_log_lvl+0x1d6/0x2ea [ 560.856488] ? show_trace_log_lvl+0x1d6/0x2ea [ 560.861379] ? amdgpu_ras_do_recovery+0x1b2/0x210 [amdgpu] [ 560.867778] ? show_regs.part.0+0x23/0x29 [ 560.872293] ? __die_body.cold+0x8/0xd [ 560.876502] ? die_addr+0x3e/0x60 [ 560.880238] ? exc_general_protection+0x1c5/0x410 [ 560.885532] ? asm_exc_general_protection+0x27/0x30 [ 560.891025] ? amdgpu_device_gpu_recover.cold+0xbf1/0xcf5 [amdgpu] [ 560.898323] amdgpu_ras_do_recovery+0x1b2/0x210 [amdgpu] [ 560.904520] process_one_work+0x228/0x3d0 How: In RAS recovery, mode-1 reset is issued from RAS fatal error handling and expected all the nodes in a hive to be reset. no need to issue another mode-1 during this procedure.
[]
CVE-2024-4297
HGiga iSherlock - Arbitrary File Download
The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherlock, AuditSherlock) fails to filter special characters in certain function parameters, allowing remote attackers with administrative privileges to exploit this vulnerability to download arbitrary system files.
[ "cpe:2.3:a:hgiga:isherlock:4.5:*:*:*:*:*:*:*" ]
GHSA-93h5-jmg6-mmph
The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges.
[]
GHSA-6f8f-rchr-mhp3
In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.
[]
CVE-2022-49385
driver: base: fix UAF when driver_attach failed
In the Linux kernel, the following vulnerability has been resolved: driver: base: fix UAF when driver_attach failed When driver_attach(drv); failed, the driver_private will be freed. But it has been added to the bus, which caused a UAF. To fix it, we need to delete it from the bus when failed.
[]
CVE-2021-29454
Sandbox Escape by math function in smarty
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.
[ "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
GHSA-hgj4-h2x3-rfx4
Sentry vulnerable to incorrect credential validation on OAuth token requests
ImpactAn attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credential validation. The client ID must be known and the API application must have already been authorized on the targeted user account.Remediation**Sentry SaaS** customers do not need to take any action. Those with the highest risk will be contacted directly by Sentry.**Self-hosted installations** should upgrade to version 23.7.2 or higher.WorkaroundsThere are no direct workarounds, but users should review applications authorized on their account (_User Settings > Authorized Applications_) and remove any that are no longer needed.
[]
CVE-2025-30945
WordPress Taskbuilder <= 4.0.3 - Broken Access Control Vulnerability
Missing Authorization vulnerability in taskbuilder Taskbuilder allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Taskbuilder: from n/a through 4.0.3.
[]
GHSA-7vw4-jppr-mcc9
Walter Beschmout PhpQuiz allows remote attackers to obtain sensitive information via a direct request to cfgphpquiz/install.php and other unspecified vectors.
[]
CVE-2013-7459
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
[ "cpe:2.3:a:dlitz:pycrypto:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*" ]
GHSA-h3gm-j47f-vqgx
A server-side request forgery vulnerability exists in multiple firmware versions of AVTECH DVR devices that exposes the /cgi-bin/nobody/Search.cgi?action=cgi_query endpoint without authentication. An attacker can manipulate the ip, port, and queryb64str parameters to make arbitrary HTTP requests from the DVR to internal or external systems, potentially exposing sensitive data or interacting with internal services.
[]
GHSA-7pxw-57qc-2vjm
A session hijacking vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters. Unauthenticated attackers can access exposed log files (/logs/debug/xteLog*), potentially revealing sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). Exploiting this flaw could allow attackers to hijack active sessions, gain unauthorized access, and escalate privileges on affected devices.
[]
CVE-2020-9119
There is a privilege escalation vulnerability on some Huawei smart phones due to design defects. The attacker needs to physically contact the mobile phone and obtain higher privileges, and execute relevant commands, resulting in the user's privilege promotion.
[ "cpe:2.3:o:huawei:mate_10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:mate_30_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_30:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:mate_30_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_30_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p40_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p40:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p40_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p40_pro:-:*:*:*:*:*:*:*" ]
GHSA-wc7v-37g9-8hvc
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. There is an outdated and unused component allowing for malicious user input of active code.
[]
GHSA-wp68-67c6-87fh
Hyperledger Fabric 2.3 allows attackers to cause a denial of service (orderer crash) by repeatedly sending a crafted channel tx with the same Channel name. NOTE: the official Fabric with Raft prevents exploitation via a locking mechanism and a check for names that already exist.
[]
GHSA-wpw7-wxjm-cw8r
actionpack allows bypass of database-query restrictions
`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.
[]
CVE-2023-7141
code-projects Client Details System update-clients.php sql injection
A vulnerability was found in code-projects Client Details System 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/update-clients.php. The manipulation of the argument uid leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249144.
[ "cpe:2.3:a:code-projects:client_details_system:1.0:*:*:*:*:*:*:*" ]
GHSA-53r8-v6vr-f62f
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
[]
GHSA-mv8m-8gw4-6jh3
Missing Authorization vulnerability in SolidWP iThemes Sync allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iThemes Sync: from n/a through 2.1.13.
[]
CVE-2017-18764
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D6100 before 1.0.0.55, D7000 before 1.0.1.50, D7800 before 1.0.1.28, JNR1010v2 before 1.1.0.44, JR6150 before 1.0.1.10, JWNR2010v5 before 1.1.0.44, PR2000 before 1.0.0.18, R6050 before 1.0.1.10, R6100 before 1.0.1.14, R6120 before 1.0.0.30, R6220 before 1.1.0.50, R6700v2 before 1.2.0.4, R6800 before 1.2.0.4, R6900v2 before 1.2.0.4, R7500 before 1.0.0.110, R7500v2 before 1.0.3.20, R7800 before 1.0.2.36, R9000 before 1.0.2.52, WN3000RPv3 before 1.0.2.50, WNDR3700v4 before 1.0.2.88, WNDR3700v5 before 1.1.0.48, WNDR4300v1 before 1.0.2.90, WNDR4300v2 before 1.0.0.48, WNDR4500v3 before 1.0.0.48, WNR1000v4 before 1.1.0.44, WNR2000v5 before 1.0.0.58, WNR2020 before 1.1.0.44, and WNR2050 before 1.1.0.44.
[ "cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jwnr2010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jwnr2010:v5:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:pr2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:pr2000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wn3000rp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wn3000rp:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3700:v5:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:v1:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2050:-:*:*:*:*:*:*:*" ]
CVE-2020-5143
SonicOS SSLVPN login page allows a remote unauthenticated attacker to perform firewall management administrator username enumeration based on the server responses. This vulnerability affected SonicOS Gen 5 version 5.9.1.7, 5.9.1.13, Gen 6 version 6.5.4.7, 6.5.1.12, 6.0.5.3, SonicOSv 6.5.4.v and Gen 7 version SonicOS 7.0.0.0.
[ "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sonicos:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:sonicwall:sonicosv:*:*:*:*:*:*:*:*" ]
GHSA-fc5g-gpmc-9m95
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of Abstract Syntax Notation One (ASN.1)-encoded variables in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the SNMP daemon on the affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition.
[]
GHSA-fpj9-xrvv-p65j
Heap-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via an invalid color table size when parsing the color table atom (CTAB) in a movie file, related to the CTAB RGB values.
[]
CVE-2025-0585
aEnrich Technology a+HRD - SQL Injection
The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
[]
CVE-2017-18451
cPanel before 64.0.21 allows attackers to read a user's crontab file during a short time interval upon a cPAddon upgrade (SEC-257).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
CVE-2022-28373
Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 does not properly sanitize user-controlled parameters within the crtcreadpartition function of the crtcrpc JSON listener in /usr/lib/lua/luci/crtc.lua. A remote attacker on the local network can inject shell metacharacters to achieve remote code execution as root.
[ "cpe:2.3:o:verizon:lvskihp_indoorunit_firmware:3.4.66.162:*:*:*:*:*:*:*", "cpe:2.3:h:verizon:lvskihp_indoorunit:-:*:*:*:*:*:*:*" ]
GHSA-h2w6-mvpr-jj72
A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified as critical. This issue affects the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-xjrg-6fv9-6rjg
Stored XSS vulnerability in Jenkins Build With Parameters Plugin
Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.Jenkins Build With Parameters Plugin 1.5.1 escapes parameter names and descriptions.
[]
CVE-2021-39325
OptinMonster <= 2.6.0 Reflected Cross-Site Scripting
The OptinMonster WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient input validation in the load_previews function found in the ~/OMAPI/Output.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.6.0.
[ "cpe:2.3:a:optinmonster:optinmonster:*:*:*:*:*:wordpress:*:*" ]
CVE-2025-6862
SourceCodester Best Salon Management System edit_plan.php sql injection
A vulnerability classified as critical has been found in SourceCodester Best Salon Management System 1.0. Affected is an unknown function of the file /panel/edit_plan.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2021-1510
Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities
Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_100_firmware:19.2.99:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_1000_firmware:19.2.99:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_100b_firmware:19.2.99:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_100m_firmware:19.2.99:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_100wm_firmware:19.2.99:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_2000_firmware:19.2.99:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_5000_firmware:19.2.99:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vedge_cloud_firmware:19.2.99:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:*" ]
CVE-2011-2285
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Installer.
[ "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*" ]
CVE-2006-6472
The httpd.conf file in Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 configures port 443 to be always active, which has unknown impact and remote attack vectors.
[ "cpe:2.3:h:xerox:workcentre:*:*:*:*:*:*:*:*", "cpe:2.3:h:xerox:workcentre:*:*:pro:*:*:*:*:*" ]
CVE-2025-1419
XSS in Proget MDM
Input provided in comment section of Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack. This issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite).
[]
CVE-2017-11437
GitLab Enterprise Edition (EE) before 8.17.7, 9.0.11, 9.1.8, 9.2.8, and 9.3.8 allows an authenticated user with the ability to create a project to use the mirroring feature to potentially read repositories belonging to other users.
[ "cpe:2.3:a:gitlab:gitlab:8.5.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.11:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.12:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.13:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.8.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.8.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.8.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.8.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.8.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.8.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.8.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.8.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.8.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.8.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.9.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.9.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.9.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.9.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.9.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.9.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.9.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.9.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.9.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.9.11:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.11:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.12:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.10.13:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.11.11:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.11:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.12.12:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.13.11:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.14.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.14.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.14.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.14.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.14.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.14.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.14.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.14.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.14.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.14.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.15.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.15.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.15.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.15.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.15.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.15.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.15.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.15.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.16.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.16.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.16.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.16.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.16.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.16.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.16.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.16.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.16.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.16.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.17.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.17.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.17.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.17.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.17.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.17.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.17.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.0.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.1.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.1.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.1.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.1.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.1.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.1.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.1.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.1.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.2.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.2.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.2.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.2.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.2.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.2.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.2.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.2.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.3.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.3.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.3.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.3.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.3.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.3.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.3.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:9.3.7:*:*:*:enterprise:*:*:*" ]
GHSA-84hm-26hq-gff5
Plesk CMS 18.0.37 is affected by an insecure permissions vulnerability that allows privilege Escalation from user to admin rights.
[]
GHSA-r3rg-38gc-7x9q
VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register.
[]
CVE-2024-39530
Junos OS: Attempting to access specific sensors on platforms not supporting these will lead to a chassisd crash
An Improper Check for Unusual or Exceptional Conditions vulnerability in the chassis management daemon (chassisd) of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). If an attempt is made to access specific sensors on platforms not supporting these sensors, either via GRPC or netconf, chassisd will crash and restart leading to a restart of all FPCs and thereby a complete outage. This issue affects Junos OS: * 21.4 versions from 21.4R3 before 21.4R3-S5, * 22.1 versions from 22.1R3 before 22.1R3-S4, * 22.2 versions from 22.2R2 before 22.2R3, * 22.3 versions from 22.3R1 before 22.3R2-S2, 22.3R3, * 22.4 versions from 22.4R1 before 22.4R2. This issue does not affect Junos OS versions earlier than 21.4.
[ "cpe:2.3:o:juniper:junos_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*" ]
GHSA-2g6v-2xh6-p5mw
Cross-site scripting (XSS) vulnerability in index.php in Dreamlevels DreamPoll 3.1 allows remote attackers to inject arbitrary web script or HTML via the recordsPerPage parameter in a poll_default login action.
[]
GHSA-7559-8jwg-355g
An issue was discovered in CIRCONTROL CirCarLife before 4.3. There is PLC status disclosure due to lack of authentication for /html/devstat.html.
[]
CVE-2019-5519
VMware ESXi (6.7 before ESXi670-201903001, 6.5 before ESXi650-201903001, 6.0 before ESXi600-201903001), Workstation (15.x before 15.0.4, 14.x before 14.1.7), Fusion (11.x before 11.0.3, 10.x before 10.1.6) contain a Time-of-check Time-of-use (TOCTOU) vulnerability in the virtual USB 1.1 UHCI (Universal Host Controller Interface). Exploitation of this issue requires an attacker to have access to a virtual machine with a virtual USB controller present. This issue may allow a guest to execute code on the host.
[ "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201811001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201811401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*" ]
CVE-2021-3655
A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
GHSA-qpw6-gmmf-vxhp
ACCEL-PPP 1.12.0 has an out-of-bounds read in post_msg when processing a call_clear_request.
[]
GHSA-m847-cc8r-22w3
Cross-site scripting vulnerability in phpBB 2.0.0 (phpBB2) allows remote attackers to execute Javascript as other phpBB users by including a http:// and a double-quote (") in the [IMG] tag, which bypasses phpBB's security check, terminates the src parameter of the resulting HTML IMG tag, and injects the script.
[]
CVE-2022-0233
ProfileGrid – User Profiles, Memberships, Groups and Communities <= 4.7.4 Authenticated Stored Cross-Site Scripting
The ProfileGrid – User Profiles, Memberships, Groups and Communities WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the pm_user_avatar and pm_cover_image parameters found in the ~/admin/class-profile-magic-admin.php file which allows attackers with authenticated user access, such as subscribers, to inject arbitrary web scripts into their profile, in versions up to and including 1.2.7.
[ "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*" ]
GHSA-mw4w-465g-gm7q
PHP remote file inclusion vulnerability in includes/functions_nomoketos_rules.php in the NoMoKeTos Rules 0.0.1 module for phpBB allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
[]
GHSA-3673-4qjp-285p
Unrestricted file upload vulnerability in admin/uploadimage.php in eLitius 1.0 allows remote attackers to bypass intended access restrictions and upload and execute arbitrary files via an avatar file with an accepted Content-Type such as image/gif, then requesting the file in admin/banners/.
[]
GHSA-8mvv-3xxr-4jvf
Certain NETGEAR devices are affected by command injection by an authenticated user . This affects RAX200 before 1.0.3.106, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
[]
CVE-2025-4945
Libsoup: integer overflow in cookie expiration date handling in libsoup
A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in undefined behavior, allowing an attacker to bypass cookie expiration logic, causing persistent or unintended cookie behavior. The issue stems from improper validation of large integer inputs during date arithmetic operations within the cookie parsing routines.
[ "cpe:/o:redhat:enterprise_linux:10", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9" ]
CVE-2009-4576
SQL injection vulnerability in the BeeHeard (com_beeheard) component 1.x for Joomla! allows remote attackers to execute arbitrary SQL commands via the category_id parameter in a suggestions action to index.php.
[ "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*", "cpe:2.3:a:cmstactics:com_beeheard:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cmstactics:com_beeheard:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cmstactics:com_beeheard:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cmstactics:com_beeheard:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cmstactics:com_beeheard:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:cmstactics:com_beeheard:1.4.2:*:*:*:*:*:*:*" ]
CVE-2015-0569
Heap-based buffer overflow in the private wireless extensions IOCTL implementation in wlan_hdd_wext.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that establishes a packet filter.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-93qr-q6xr-pp2m
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 federated server is vulnerable to a denial of service as the server may crash when using a specially crafted wrapper using certain options. IBM X-Force ID: 253202.
[]
GHSA-qr5v-8q9r-729f
The Candy Girl Party Makeover (aka com.bearhugmedia.android_candygirlparty) application 1.0.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-h6h4-9666-mq74
A vulnerability was found in rails-cv-app. It has been rated as problematic. Affected by this issue is some unknown functionality of the file app/controllers/uploaded_files_controller.rb. The manipulation with the input ../../../etc/passwd leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The name of the patch is 0d20362af0a5f8a126f67c77833868908484a863. It is recommended to apply a patch to fix this issue. VDB-217178 is the identifier assigned to this vulnerability.
[]
GHSA-r7qg-49m3-m675
Cross-site scripting (XSS) vulnerability in return_dynamic_filters.php in Mantis before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the filter_target parameter.
[]
CVE-2022-25915
Improper access control vulnerability in ELECOM LAN routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attacker to bypass access restriction and to access the management screen of the product via unspecified vectors.
[ "cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1167gst2a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1167gst2a:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1167gst2h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1167gst2h:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1750gs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1750gs:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1750gsv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1750gsv:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1900gst_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1900gst:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-2533gst_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-2533gst:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-2533gsta_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-2533gsta:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-2533gst2sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-2533gst2sp:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-2533gst2-g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-2533gst2-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:edwrc-2533gst2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:edwrc-2533gst2:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1167gs2-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1167gs2-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1167gs2h-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1167gs2h-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wmc-dlgst2-w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wmc-dlgst2-w:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wmc-m1267gst2-w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wmc-m1267gst2-w:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wmc-2hc-w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wmc-2hc-w:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wmc-c2533gst-w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wmc-c2533gst-w:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1900gst2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1900gst2:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1900gst2sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1900gst2sp:-:*:*:*:*:*:*:*", "cpe:2.3:o:elecom:wrc-1750gst2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:elecom:wrc-1750gst2:-:*:*:*:*:*:*:*" ]
CVE-2007-1805
SQL injection vulnerability in genre.php in the debaser 0.92 and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the genreid parameter.
[ "cpe:2.3:a:myxoops:debaser:*:*:*:*:*:*:*:*" ]
GHSA-6jxx-vp42-6rcv
Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of "behavior and state of certain JDK classes" and "mutable static."
[]
CVE-2018-14037
Cross-site scripting (XSS) vulnerability in Progress Kendo UI Editor v2018.1.221 allows remote attackers to inject arbitrary JavaScript into the DOM of the WYSIWYG editor because of the editorNS.Serializer toEditableHtml function in kendo.all.min.js. If the victim accesses the editor, the payload gets executed. Furthermore, if the payload is reflected at any other resource that does rely on the sanitisation of the editor itself, the JavaScript payload will be executed in the context of the application. This allows attackers (in the worst case) to take over user sessions.
[ "cpe:2.3:a:progress:kendo_ui:2018.1.221:*:*:*:*:*:*:*" ]
CVE-2015-0880
Buffer overflow in CREAR AL-Mail32 before 1.13d allows remote attackers to execute arbitrary code via a long filename of an attachment.
[ "cpe:2.3:a:crear.ne.jp:al-mail32:*:c:*:*:*:*:*:*" ]
GHSA-4frh-rw8g-vq9h
There is a Cross-Site Scripting(XSS) vulnerability in HUAWEI WS318n product when processing network settings. Due to insufficient validation of user input, a local authenticated attacker could exploit this vulnerability by injecting special characters. Successful exploit could cause certain information disclosure. Affected product versions include: WS318n-21 10.0.2.2, 10.0.2.5 and 10.0.2.6.
[]
GHSA-m59w-q74p-9vg2
Cross-site scripting vulnerability in Welcart e-Commerce versions prior to 2.2.4 allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
[]
GHSA-34qx-f7ff-w7xc
Artica Proxy 3.06.200056 allows remote attackers to execute arbitrary commands as root by reading the ressources/settings.inc ldap_admin and ldap_password fields, using these credentials at logon.php, and then entering the commands in the admin.index.php command-line field.
[]
GHSA-ph9v-cr87-52c5
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
CVE-2021-32935
Cognex In-Sight OPC Server - Deserialization of Untrusted Data
The affected Cognex product, the In-Sight OPC Server versions v5.7.4 (96) and prior, deserializes untrusted data, which could allow a remote attacker access to system level permission commands and local privilege escalation.
[ "cpe:2.3:a:cognex:in-sight_opc_server:*:*:*:*:*:*:*:*" ]
CVE-2020-28091
cxuucms v3 has a SQL injection vulnerability, which can lead to the leakage of all database data via the keywords parameter via search.php.
[ "cpe:2.3:a:cxuu:cxuucms:3.0:*:*:*:*:*:*:*" ]
GHSA-8q4r-xrj3-2q8p
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
GHSA-9wxm-jr2x-h7pp
An information disclosure vulnerability exists when Remote Procedure Call runtime improperly initializes objects in memory, aka "Remote Procedure Call runtime Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
[]
GHSA-73jw-rhhg-3hg6
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6078.
[]
CVE-2016-3002
IBM Connections 4.0 through CR4, 4.5 through CR5, and 5.0 before CR4 allows physically proximate attackers to obtain sensitive information by reading cached data on a client device.
[ "cpe:2.3:a:ibm:connections:4.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:connections:4.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:connections:5.0.0.0:*:*:*:*:*:*:*" ]
GHSA-457x-v5jv-rvr7
In the __multadd function of the newlib libc library, prior to versions 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. This will trigger a null pointer dereference bug in case of a memory allocation failure.
[]
GHSA-mrqh-rf5r-9qqw
Multiple unspecified vulnerabilities in Oracle E-Business Suite and Applications 11.5.10 have unspecified impact and attack vectors, as identified by Oracle Vuln# (1) APPS01 in the (a) Application Install component; (2) APPS07 in the (b) Oracle Applications Framework component; (3) APPS08, (4) APPS09, (5) APPS10, and (6) APPS11 in the (c) Oracle Applications Technology Stack component; (7) APPS12 in the (d) Oracle Human Resources component; (8) APPS15 and (9) APPS16 in the (e) Oracle Marketing component; (10) APPS17 in the (f) Marketing Encyclopedia System component; (11) APPS18 in the (g) Oracle Trade Management component; and (12) APPS19 in the (h) Oracle Web Applications Desktop Integration component.
[]
GHSA-6f44-88r9-jjfp
In ppmp_protect_buf of drm_fw.c, there is a possible information disclosure due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
CVE-2012-3697
WebKit in Apple Safari before 6.0 does not properly handle file: URLs, which allows remote attackers to bypass intended sandbox restrictions and read arbitrary files by leveraging a WebProcess compromise.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:5.1.6:*:*:*:*:*:*:*" ]
GHSA-w7jq-m96j-xq9g
SQL injection vulnerability in comment.php in BlueCMS 1.6 allows remote attackers to execute arbitrary SQL commands via the X-Forwarded-For HTTP header in a send action.
[]
GHSA-rrmp-c5xv-q7fj
Unspecified vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API.
[]
GHSA-467h-6pw9-97gq
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34486, CVE-2021-34487.
[]
GHSA-h9ww-wjg4-jvvg
Liferay Portal and Liferay DXP Fails to Check Permissions in Translation Module
The Translation module before v2.0.58 from Liferay Portal (v7.4.3.12 through v7.4.3.36), and Liferay DXP 7.4 update 8 through 36 does not check permissions before allowing a user to export a web content for translation, allowing attackers to download a web content page's XLIFF translation file via crafted URL.
[]
CVE-2023-21109
In multiple places of AccessibilityService, there is a possible way to hide the app from the user due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261589597
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
CVE-2007-2712
Unspecified vulnerability in MH Software Connect Daily before 3.3.3 has unknown impact and attack vectors.
[ "cpe:2.3:a:mh_software:connect_daily:3.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mh_software:connect_daily:3.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:mh_software:connect_daily:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mh_software:connect_daily:3.3.2:*:*:*:*:*:*:*" ]
GHSA-2vgm-wxr3-6w2j
Authentication bypass in Apache Shiro
Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass.
[]