id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
GHSA-72wq-j3f9-x5wf
Cross-site scripting (XSS) vulnerability in login.php in DeskPro 2.0.1 allows remote attackers to inject arbitrary web script or HTML via the username parameter.
[]
GHSA-h95j-w8vr-v949
A regression error in the Perl package for Red Hat Enterprise Linux 4 omits the patch for CVE-2005-0155, which allows local users to overwrite arbitrary files with debugging information.
[]
GHSA-99rf-fhqq-rj32
An issue was discovered in XiaoCms 20141229. admin/index.php?c=content&a=add&catid=3 has CSRF, as demonstrated by entering news via the data[content] parameter.
[]
CVE-2021-25014
Ibtana < 1.1.4.9 - Subscriber+ Settings Update to Stored XSS
The Ibtana WordPress plugin before 1.1.4.9 does not have authorisation and CSRF checks in the ive_save_general_settings AJAX action, allowing any authenticated users, such as subscriber to call it and change the plugin's settings which could lead to Stored Cross-Site Scripting issue.
[ "cpe:2.3:a:vowelweb:ibtana:*:*:*:*:*:wordpress:*:*" ]
CVE-2025-23625
WordPress Unique UX plugin <= 0.9.2 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AWcode, PDSonline Unique UX allows Reflected XSS. This issue affects Unique UX: from n/a through 0.9.2.
[]
CVE-2024-45067
Incorrect default permissions in some Intel(R) Gaudi(R) software installers before version 1.18 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
GHSA-hg9f-cr6x-3gxw
Insufficient input validation in system firmware for Intel NUC7i3BNK, NUC7i3BNH, NUC7i5BNK, NUC7i5BNH, NUC7i7BNH versions BN0049 and below allows local attackers to execute arbitrary code via manipulation of memory.
[]
CVE-2016-0273
Cross-site scripting (XSS) vulnerability in IBM Rational Collaborative Lifecycle Management 3.0.1.6 before iFix8, 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; Rational Quality Manager 3.0.1.6 before iFix8, 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; Rational Team Concert 3.0.1.6 before iFix8, 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; Rational DOORS Next Generation 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; Rational Engineering Lifecycle Manager 4.x before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; Rational Rhapsody Design Manager 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; and Rational Software Architect Design Manager 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_doors_next_generation:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_rhapsody_design_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*" ]
CVE-2016-9375
In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful.
[ "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
CVE-2023-46804
An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS).
[ "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-43hg-g44q-474q
Cross Site Scripting (XSS) in XWiki
XWiki 12.10.2 allows XSS via an SVG document to the upload feature of the comment section.
[]
GHSA-hj9q-mj9c-fcp4
An Improper Certificate Validation vulnerability exists in Tenable Security Center where an authenticated, privileged attacker could intercept email messages sent from Security Center via a rogue SMTP server.
[]
CVE-2020-8986
lib/NSSDropbox.php in ZendTo prior to 5.22-2 Beta failed to properly check for equality when validating the session cookie, allowing an attacker to gain administrative access with a large number of requests.
[ "cpe:2.3:a:zend:zendto:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.12:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.13:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.51:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.52:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.53:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.54:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.55:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.56-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.57:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.58:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.59:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.60:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.61:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.62:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.63:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.64:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.65:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.70-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.71:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.72:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.73:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.74:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.75:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.90:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.91:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.92:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.93:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.94:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.00:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.01:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.02:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.03-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.05-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.06-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.07-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.08-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.09-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.10-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.10-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-7:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-8:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-9:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-10:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-11:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-12:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-13:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-14:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.12-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.12-6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.13-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.20-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.20-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.20-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.20-6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.20-7:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.25-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-7:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.28-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.28-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.00-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.00-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.01-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.02-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.03-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.04-7:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.09-13:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.10-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.10-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.12-3:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.12-4:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.12-6:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.12-7:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.12-8:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.13-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.13-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.14-2:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.14-5:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.15-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16-1:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16-4:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16-5:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16-7:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16-8:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16.6:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-5:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.18-1:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.18-2:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.19-1:production:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-1:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-2:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-3:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-5:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-6:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-7:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-8:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-9:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.21-1:production:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.21-2:production:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.22-1:beta:*:*:*:*:*:*" ]
GHSA-mxmj-grq3-3f84
SQL injection vulnerability exists in the CoursePeriodModal.php page of OS4Ed openSIS 7.3. The id parameter in the page CoursePeriodModal.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[]
CVE-2020-27845
There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions prior to 2.4.0. If an attacker is able to provide untrusted input to openjpeg's conversion/encoding functionality, they could cause an out-of-bounds read. The highest impact of this flaw is to application availability.
[ "cpe:2.3:a:uclouvain:openjpeg:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*" ]
CVE-2024-37078
nilfs2: fix potential kernel bug due to lack of writeback flag waiting
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential kernel bug due to lack of writeback flag waiting Destructive writes to a block device on which nilfs2 is mounted can cause a kernel bug in the folio/page writeback start routine or writeback end routine (__folio_start_writeback in the log below): kernel BUG at mm/page-writeback.c:3070! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI ... RIP: 0010:__folio_start_writeback+0xbaa/0x10e0 Code: 25 ff 0f 00 00 0f 84 18 01 00 00 e8 40 ca c6 ff e9 17 f6 ff ff e8 36 ca c6 ff 4c 89 f7 48 c7 c6 80 c0 12 84 e8 e7 b3 0f 00 90 <0f> 0b e8 1f ca c6 ff 4c 89 f7 48 c7 c6 a0 c6 12 84 e8 d0 b3 0f 00 ... Call Trace: <TASK> nilfs_segctor_do_construct+0x4654/0x69d0 [nilfs2] nilfs_segctor_construct+0x181/0x6b0 [nilfs2] nilfs_segctor_thread+0x548/0x11c0 [nilfs2] kthread+0x2f0/0x390 ret_from_fork+0x4b/0x80 ret_from_fork_asm+0x1a/0x30 </TASK> This is because when the log writer starts a writeback for segment summary blocks or a super root block that use the backing device's page cache, it does not wait for the ongoing folio/page writeback, resulting in an inconsistent writeback state. Fix this issue by waiting for ongoing writebacks when putting folios/pages on the backing device into writeback state.
[]
GHSA-cjp9-8vv4-jm56
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PluginOps Landing Page Builder plugin <= 1.5.1.2 versions.
[]
GHSA-hw4w-fg64-2w9w
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy Filter allows Reflected XSS. This issue affects Easy Filter: from n/a through 1.10.
[]
GHSA-6296-7mqc-x427
SQL injection vulnerability in alltopics.php in the All Topics Hack 1.5.0 and earlier for phpBB 2.0.21 allows remote attackers to execute arbitrary SQL commands via the start parameter.
[]
GHSA-97v8-qwgf-963f
An issue was discovered in ONAP HOLMES before Dublin. By accessing port 9202 of dep-holmes-engine-mgmt pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. All ONAP Operations Manager (OOM) setups are affected.
[]
CVE-2009-4174
The editnews module in CutePHP CuteNews 1.4.6 and UTF-8 CuteNews before 8b, when magic_quotes_gpc is disabled, allows remote authenticated users with Journalist or Editor access to bypass administrative moderation and edit previously submitted articles via a modified id parameter in a doeditnews action.
[ "cpe:2.3:a:cutephp:cutenews:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:korn19:utf-8_cutenews:8:*:*:*:*:*:*:*" ]
GHSA-p76p-cppc-v4xr
A vulnerability has been found in TOTOLINK A702R 4.0.0-B20230721.1521 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formIpv6Setup of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-rj9r-c2qp-rvpc
The administration module in Sun Java web server allows remote attackers to execute arbitrary commands by uploading Java code to the module and invoke the com.sun.server.http.pagecompile.jsp92.JspServlet by requesting a URL that begins with a /servlet/ tag.
[]
GHSA-mmph-wp49-r48h
Malicious Package in experss
All versions of `experss` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.RecommendationRemove the package from your dependencies and always ensure package names are typed correctly upon installation.
[]
CVE-2019-12356
An issue was discovered in zzcms 2019. There is a SQL injection Vulnerability in /user/dls_download.php (when the attacker has dls_download authority) via the id parameter.
[ "cpe:2.3:a:zzcms:zzcms:2019:*:*:*:*:*:*:*" ]
GHSA-8j9x-qhpc-gcg8
The sso_util program in Single Sign-On in Apple Mac OS X before 10.5.3 places passwords on the command line, which allows local users to obtain sensitive information by listing the process.
[]
CVE-2017-16359
In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c.
[ "cpe:2.3:a:radare:radare2:2.0.1:*:*:*:*:*:*:*" ]
CVE-2006-5782
radexecd.exe in HP OpenView Client Configuraton Manager (CCM) does not require authentication before executing commands in the installation directory, which allows remote attackers to cause a denial of service (reboot) by calling radbootw.exe or create arbitrary files by calling radcrecv.
[ "cpe:2.3:a:hp:openview_client_configuraton_manager:*:*:*:*:*:*:*:*" ]
GHSA-fh6j-979r-9hxg
In ComposeActivityEmailExternal of ComposeActivityEmailExternal.java in Android 7.1.1, 7.1.2, 8.0, 8.1 and 9, there is a possible way to silently attach files to an email due to a confused deputy. This could lead to local information disclosure.
[]
GHSA-72w2-j52c-7682
Moodle SQL Injection vulnerability
Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).
[]
GHSA-f7fv-v9rh-prvc
Tornado CRLF injection vulnerability
CRLF injection vulnerability in the `tornado.web.RequestHandler.set_header` function in Tornado before 2.2.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input.
[]
CVE-2002-0960
Multiple cross-site scripting vulnerabilities in Voxel Dot Net CBMS 0.7 and earlier allows remote attackers to execute arbitrary script as other CBMS users.
[ "cpe:2.3:a:voxel:cbms:*:*:*:*:*:*:*:*" ]
GHSA-pcrj-v2mw-j945
Improper access control vulnerability in Samsung Account prior to version 13.1.0.1 allows attackers to access to the authcode for sign-in.
[]
GHSA-fmcr-2q62-c3m5
dnslookup.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the host_name field of an HTTP POST request, a different vulnerability than CVE-2017-6077.
[]
GHSA-qcm5-p56h-2gv8
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9640, MDM9650, QCA6174A, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9379, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 808, SD 810, SD 820, SD 835, SD 845, SDM630, SDM636, SDM660, Snapdragon_High_Med_2016, the original mac spoofing feature does not use the following in probe request frames: (a) randomized sequence numbers and (b) randomized source address for cfg80211 scan, vendor scan and pno scan which may affect user privacy.
[]
CVE-2023-25488
WordPress WP Default Feature Image Plugin <= 1.0.1.1 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Duc Bui Quang WP Default Feature Image plugin <= 1.0.1.1 versions.
[ "cpe:2.3:a:ducbuiquang:wp_default_feature_image:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-20489
Cisco Routed Passive Optical Network Cleartext Password Vulnerability
A vulnerability in the storage method of the PON Controller configuration file could allow an authenticated, local attacker with low privileges to obtain the MongoDB credentials. This vulnerability is due to improper storage of the unencrypted database credentials on the device that is running Cisco IOS XR Software. An attacker could exploit this vulnerability by accessing the configuration files on an affected system. A successful exploit could allow the attacker to view MongoDB credentials.
[ "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:24.2.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:24.3.1:*:*:*:*:*:*:*" ]
CVE-2012-5083
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
[ "cpe:2.3:a:oracle:javafx:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:javafx:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:*:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0.200:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0.210:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:*:update36:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:update36:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_5:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_7:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_8:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_9:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_17:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_18:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_19:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_22:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_23:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_25:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_26:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_27:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_28:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_29:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_30:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_31:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_32:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_33:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_34:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_35:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_36:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.4.2_37:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_29:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_30:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_31:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_32:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_33:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_34:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_35:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_36:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.4.2_37:*:*:*:*:*:*:*" ]
GHSA-vm94-m3xr-gvj8
The Awesome Contact Form7 for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'AEP Contact Form 7' widget in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-m5p9-xvxj-64c8
Flowise and Flowise Chat Embed vulnerable to Stored Cross-site Scripting
Flowise < 2.1.1 suffers from a Stored Cross-Site vulnerability due to a lack of input sanitization in Flowise Chat Embed < 2.0.0.
[]
CVE-2023-20112
Cisco Access Point Software Association Request Denial of Service Vulnerability
A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.
[ "cpe:2.3:o:cisco:business_150ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_150ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:business_151axm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:business_151axm:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9105ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9105ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9105axi_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9105axw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9105i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9105i:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9105w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9105w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9115_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9115ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9115ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9115axe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9115axi_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9117_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9117ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9117ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9117axi_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9120ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9120ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9120axe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9120axi_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9120axp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9124_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9124ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9124ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9124axd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9124axi_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9130ax_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9130ax:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9130axe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9130axi_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9136_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9136:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9162_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9162:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9164_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9164:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:catalyst_9166_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9166:-:*:*:*:*:*:*:*" ]
CVE-2020-1737
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.
[ "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:ansible_tower:*:*:*:*:*:*:*:*" ]
GHSA-fm4m-hvph-44cw
The POWER systems FSP is vulnerable to unauthenticated logins through the serial port/TTY interface. This vulnerability can be more critical if the serial port is connected to a serial-over-lan device. IBM X-Force ID: 217095.
[]
GHSA-pc8p-f8jw-v3vr
A vulnerability classified as problematic has been found in SourceCodester Guest Management System. This affects an unknown part of the file myform.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206397 was assigned to this vulnerability.
[]
GHSA-g9w3-x539-vrfv
Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
GHSA-gx98-wj3r-23h4
Multiple GET parameters in the vulnerability scan scheduler of AlienVault OSSIM and USM before 5.3.2 are vulnerable to reflected XSS.
[]
CVE-2016-4589
WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4622, CVE-2016-4623, and CVE-2016-4624.
[ "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
GHSA-p8c8-w89w-gvv5
IBM Spectrum Virtualize 8.2, 8.3, and 8.4 could allow an attacker to allow unauthorized access due to the reuse of support generated credentials. IBM X-Force ID: 212609.
[]
GHSA-6q7f-ccc4-pgmm
rrdedit in netmrg 0.20 allows local users to overwrite arbitrary files via a symlink attack on (1) /tmp/*.xml and (2) /tmp/*.backup temporary files.
[]
GHSA-43jv-rf9m-vfp4
Osprey Pump Controller version 1.01 contains an unauthenticated command injection vulnerability that could allow system access with www-data permissions.
[]
GHSA-jq42-hfch-42f3
Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint
ImpactDue to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint.An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container.Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint.PatchesAll users should upgrade to Singularity 3.7.4 or later.WorkaroundsUsers who only interact with the default remote endpoint or do not use the library:// url are not affected.Installations with an execution control list configured to restrict execution to containers signed with specific secure keys are not affected.AcknowledgementsThis issue was found by Mike Frisch and brought to our attention by Sylabs. Sylabs is making a [coordinated disclosure](https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394).For more informationGeneral questions about the impact of the advisory can be asked in the:[Singularity Slack Channel](https://join.slack.com/t/hpcng/shared_invite/zt-qda4h1ls-OP0Uouq6sSmVE6i_0NrWdw) [Singularity Mailing List](https://groups.google.com/a/lbl.gov/g/singularity) Any sensitive security concerns should be directed to: [[email protected]](mailto:[email protected])
[]
GHSA-32f2-chgf-rf94
Dell EMC Storage Monitoring and Reporting version 4.3.1 contains a Java RMI Deserialization of Untrusted Data vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by sending a crafted RMI request to execute arbitrary code on the target host.
[]
CVE-2015-1079
WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
[ "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" ]
CVE-2024-26955
nilfs2: prevent kernel bug at submit_bh_wbc()
In the Linux kernel, the following vulnerability has been resolved: nilfs2: prevent kernel bug at submit_bh_wbc() Fix a bug where nilfs_get_block() returns a successful status when searching and inserting the specified block both fail inconsistently. If this inconsistent behavior is not due to a previously fixed bug, then an unexpected race is occurring, so return a temporary error -EAGAIN instead. This prevents callers such as __block_write_begin_int() from requesting a read into a buffer that is not mapped, which would cause the BUG_ON check for the BH_Mapped flag in submit_bh_wbc() to fail.
[]
CVE-2024-5147
WPZOOM Addons for Elementor (Templates, Widgets) <= 1.1.37 - Unauthenticated Local File Inclusion
The WPZOOM Addons for Elementor (Templates, Widgets) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.37 via the 'grid_style' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
[ "cpe:2.3:a:wpzoom:wpzoom_addons_for_elementor:*:*:*:*:*:*:*:*" ]
CVE-2024-38355
Unhandled 'error' event in socket.io
Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit `15af22fc22` which has been included in `[email protected]` (released in May 2023). The fix was backported in the 2.x branch as well with commit `d30630ba10`. Users are advised to upgrade. Users unable to upgrade may attach a listener for the "error" event to catch these errors.
[ "cpe:2.3:a:socket:socket.io:*:*:*:*:*:node.js:*:*" ]
GHSA-2jr6-wr98-5h84
Hosting Controller 6.1 Hotfix 1.4, and possibly other versions, allows remote attackers to view arbitrary directories by specifying the target pathname in the FilePath parameter to (1) Statsbrowse.asp or (2) Generalbrowse.asp.
[]
CVE-2023-51441
Apache Axis 1.x (EOL) may allow SSRF when untrusted input is passed to the service admin HTTP API
** UNSUPPORTED WHEN ASSIGNED ** Improper Input Validation vulnerability in Apache Axis allowed users with access to the admin service to perform possible SSRF This issue affects Apache Axis: through 1.3. As Axis 1 has been EOL we recommend you migrate to a different SOAP engine, such as Apache Axis 2/Java. Alternatively you could use a build of Axis with the patch from https://github.com/apache/axis-axis1-java/commit/685c309febc64aa393b2d64a05f90e7eb9f73e06 applied. The Apache Axis project does not expect to create an Axis 1.x release fixing this problem, though contributors that would like to work towards this are welcome.
[ "cpe:2.3:a:apache:axis:*:*:*:*:*:*:*:*" ]
GHSA-h3x4-rhwr-ch52
SQL injection vulnerability in index.php in AlstraSoft Web Email Script Enterprise (ESE) allows remote attackers to execute arbitrary SQL commands via the id parameter in a directory action.
[]
CVE-2024-49678
WordPress js paper theme <= 2.5.7 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jinwen js allows Reflected XSS.This issue affects js paper: from n/a through 2.5.7.
[]
GHSA-pqh7-vp7f-6f29
Uncontrolled resource consumption for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access.
[]
CVE-2020-15699
An issue was discovered in Joomla! through 3.9.19. Missing validation checks on the usergroups table object can result in a broken site configuration.
[ "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
CVE-2015-7015
Heap-based buffer overflow in the DNS client library in configd in Apple iOS before 9.1, OS X before 10.11.1, and watchOS before 2.0.1 allows attackers to execute arbitrary code via a crafted app that sends a spoofed configd response to a client.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
GHSA-c35h-x7vf-692j
Multiple heap-based and stack-based buffer overflows in certain DCOM server components in VERITAS Storage Exec Storage Exec 5.3 before Hotfix 9 and StorageCentral 5.2 before Hot Fix 2 allow remote attackers to execute arbitrary code via certain ActiveX controls.
[]
CVE-2019-19906
cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.
[ "cpe:2.3:a:cyrusimap:cyrus-sasl:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:13.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:13.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:a:apache:bookkeeper:4.12.1:*:*:*:*:*:*:*", "cpe:2.3:o:centos:centos:7.0:*:*:*:*:*:*:*" ]
CVE-2019-7067
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-jhpx-hv8x-hgq4
In FreeBSD 12.1-STABLE before r356908, 12.1-RELEASE before p5, 11.3-STABLE before r356908, and 11.3-RELEASE before p9, a race condition in the cryptodev module permitted a data structure in the kernel to be used after it was freed, allowing an unprivileged process can overwrite arbitrary kernel memory.
[]
CVE-2025-23018
IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.
[]
GHSA-5qmh-c322-6w4x
Format string vulnerability in xv before 3.10a allows remote attackers to execute arbitrary code via format string specifiers in a filename.
[]
CVE-2024-10833
Arbitrary File Write in eosphoros-ai/db-gpt
eosphoros-ai/db-gpt version 0.6.0 is vulnerable to an arbitrary file write through the knowledge API. The endpoint for uploading files as 'knowledge' is susceptible to absolute path traversal, allowing attackers to write files to arbitrary locations on the target server. This vulnerability arises because the 'doc_file.filename' parameter is user-controllable, enabling the construction of absolute paths.
[]
GHSA-jwrv-23j5-7gc8
Untrusted search path vulnerability in the pthread_win32_process_attach_np function in pthreadGC2.dll in Pthreads-win32 2.8.0 allows local users to gain privileges via a Trojan horse quserex.dll file in the current working directory. NOTE: some of these details are obtained from third party information.
[]
CVE-2017-3749
On Lenovo VIBE mobile phones, the Idea Friend Android application allows private data to be backed up and restored via Android Debug Bridge, which allows tampering leading to privilege escalation in conjunction with CVE-2017-3748 and CVE-2017-3750.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a1600:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a2560:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a2800:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a2860:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a2880:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a3000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a3500:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a3600-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a3600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a3800-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a3900:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a6000:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a6000-i:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a6020i37:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_a6800:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_k30-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_k30-w-cu:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_k32c30:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:vibe_k80m:-:*:*:*:*:*:*:*" ]
GHSA-f798-xfgv-r47g
Unspecified vulnerability in the WebFGServer application in AREVA e-terrahabitat 5.7 and earlier allows remote attackers to cause a denial of service (system crash) via unknown vectors, aka PD32020.
[]
CVE-2018-13221
The sell function of a smart contract implementation for Extreme Coin (XT) (Contract Name: ExtremeToken), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets.
[ "cpe:2.3:a:extreme_coin_project:extreme_coin:-:*:*:*:*:*:*:*" ]
GHSA-35ff-c49r-m93w
A vulnerability was found in SourceCodester Online Eyewear Shop 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /orders/view_order.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2017-0439
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32450647. References: QC-CR#1092059.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*" ]
CVE-2020-7996
htdocs/user/passwordforgotten.php in Dolibarr 10.0.6 allows XSS via the Referer HTTP header.
[ "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:10.0.6:*:*:*:*:*:*:*" ]
GHSA-x3p9-c74w-j5mx
An issue was discovered in Pulse Secure Pulse Connect Secure before 9.1R8. An authenticated attacker can access the admin page console via the end-user web interface because of a rewrite.
[]
CVE-2024-23838
TrueLayer.Client SSRF when fetching payment or payment provider
TrueLayer.NET is the .Net client for TrueLayer. The vulnerability could potentially allow a malicious actor to gain control over the destination URL of the HttpClient used in the API classes. For applications using the SDK, requests to unexpected resources on local networks or to the internet could be made which could lead to information disclosure. The issue can be mitigated by having strict egress rules limiting the destinations to which requests can be made, and applying strict validation to any user input passed to the `truelayer-dotnet` library. Versions of TrueLayer.Client `v1.6.0` and later are not affected.
[ "cpe:2.3:a:truelayer:truelayer.net:*:*:*:*:*:*:*:*" ]
GHSA-m7ch-pp3j-w35h
Cross-site scripting (XSS) vulnerability in D-link IP camera DCS-2103 with firmware before 1.20 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING to vb.htm.
[]
CVE-2018-14517
SeaCMS 6.61 has two XSS issues in the admin_config.php file via certain form fields.
[ "cpe:2.3:a:seacms:seacms:6.61:*:*:*:*:*:*:*" ]
GHSA-66g9-p6q6-rqc4
In gpu driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
[]
CVE-2024-55963
An issue was discovered in Appsmith before 1.51. A user on Appsmith that doesn't have admin permissions can trigger the restart API on Appsmith, causing a server restart. This is still within the Appsmith container, and the impact is limited to Appsmith's own server only, but there is a denial of service because it can be continually restarted. This is due to incorrect access control checks, which should check for super user permissions on the incoming request.
[]
GHSA-fh62-4c6v-6f9m
Multiple directory traversal vulnerabilities in Pyrophobia 2.1.3.1 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) act or (2) pid parameter to the top-level URI (index.php), or the (3) action parameter to admin/index.php. NOTE: some of these details are obtained from third party information.
[]
CVE-2024-35688
WordPress Master Addons for Elementor plugin <= 2.0.5.9 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jewel Theme Master Addons for Elementor allows Stored XSS.This issue affects Master Addons for Elementor: from n/a through 2.0.5.9.
[ "cpe:2.3:a:master-addons:master_addons:*:*:*:*:*:wordpress:*:*" ]
GHSA-mxfm-hg3q-8qf4
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[]
GHSA-j9jw-jrhw-54vc
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.
[]
GHSA-62hv-fgc6-fxm4
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brian Batt Insert or Embed Articulate Content into WordPress allows Stored XSS.This issue affects Insert or Embed Articulate Content into WordPress: from n/a through 4.3000000021.
[]
GHSA-w6gf-8h7h-2hmw
Cross-site scripting (XSS) vulnerability in the J-Web interface in Juniper JUNOS 8.5R1.14 and 9.0R1.1 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI.
[]
CVE-2021-3018
ipeak Infosystems ibexwebCMS (aka IPeakCMS) 3.5 is vulnerable to an unauthenticated Boolean-based SQL injection via the id parameter on the /cms/print.php page.
[ "cpe:2.3:a:ipeak:ipeakcms:3.5:*:*:*:*:*:*:*" ]
CVE-2024-9112
FastStone Image Viewer PSD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
FastStone Image Viewer PSD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FastStone Image Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25102.
[ "cpe:2.3:a:faststone:image_viewer:7.8:*:*:*:*:*:*:*" ]
GHSA-g6vm-3ch8-c6jq
Apache IoTDB Session Fixation vulnerability
Apache IoTDB version 0.13.0 is vulnerable to session id attack. Users should upgrade to version 0.13.1 which addresses this issue.
[]
CVE-2024-9837
AADMY – Add Auto Date Month Year Into Posts <= 2.0.1 - Unauthenticated Arbitrary Shortcode Execution
The The AADMY – Add Auto Date Month Year Into Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
[ "cpe:2.3:a:numanrki:aadmy_add_auto_date_month_year_into_posts:*:*:*:*:*:*:*:*" ]
CVE-2017-7999
Atlassian Eucalyptus before 4.4.1, when in EDGE mode, allows remote authenticated users with certain privileges to cause a denial of service (E2 service outage) via unspecified vectors.
[ "cpe:2.3:a:eucalyptus:eucalyptus:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:eucalyptus:eucalyptus:4.4.0:*:*:*:*:*:*:*" ]
GHSA-vfgg-7jw9-pp5v
Microsoft DWM Core Library Elevation of Privilege Vulnerability.
[]
CVE-2004-1460
Cisco Secure Access Control Server (ACS) 3.2(3) and earlier, when configured with an anonymous bind in Novell Directory Services (NDS) and authenticating NDS users with NDS, allows remote attackers to gain unauthorized access to AAA clients via a blank password.
[ "cpe:2.3:a:cisco:secure_access_control_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.2:*:windows_server:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_acs_solution_engine:*:*:*:*:*:*:*:*" ]
CVE-2025-1510
Custom Post Type Date Archives <= 2.7.1 - Missing Authorization to Unauthenticated Arbitrary Shortcode Execution
The The Custom Post Type Date Archives plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.7.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
[]
CVE-2014-8987
Cross-site scripting (XSS) vulnerability in the "set configuration" box in the Configuration Report page (adm_config_report.php) in MantisBT 1.2.13 through 1.2.17 allows remote administrators to inject arbitrary web script or HTML via the config_option parameter, a different vulnerability than CVE-2014-8986.
[ "cpe:2.3:a:mantisbt:mantisbt:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:mantisbt:mantisbt:1.2.17:*:*:*:*:*:*:*" ]
GHSA-5ch6-6g8r-j7w5
Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability. This vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. Exploitation of this issue typically requires user interaction, such as convincing a victim to click on a specially crafted link or to submit a form that triggers the malicious script.
[]
GHSA-fmp6-4cgh-vf6r
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18324.
[]