id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2006-0393
|
OpenSSH in Apple Mac OS X 10.4.7 allows remote attackers to cause a denial of service or determine account existence by attempting to log in using an invalid user, which causes the server to hang.
|
[
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*"
] |
|
CVE-2012-4875
|
Heap-based buffer overflow in gdevwpr2.c in Ghostscript 9.04, when processing the OutputFile device parameter, allows user-assisted remote attackers to execute arbitrary code via a long file name in a PostScript document. NOTE: as of 20120314, the developer was not able to reproduce the issue and disputed it
|
[
"cpe:2.3:a:artifex:gpl_ghostscript:9.04:*:*:*:*:*:*:*"
] |
|
GHSA-hx92-h3v5-x8cr
|
TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the command parameter at setting/setTracerouteCfg.
|
[] |
|
GHSA-wmf8-8vrp-cvhv
|
controllers/member/api.php in dayrui FineCms 5.0.11 has XSS related to the dirname variable.
|
[] |
|
CVE-2024-25989
|
In gpu_slc_liveness_update of pixel_gpu_slc.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] |
|
GHSA-mh6q-7483-rvj7
|
An issue was discovered in Atos Eviden SMC xScale before 1.6.6. During initialization of nodes, some configuration parameters are retrieved from management nodes. These parameters embed credentials whose integrity and confidentiality may be important to the security of the HPC configuration. Because these parameters are needed for initialization, there is no available mechanism to ensure access control on the management node, and a mitigation measure is normally put in place to prevent access to unprivileged users. It was discovered that this mitigation measure does not survive a reboot of diskful nodes. (Diskless nodes are not at risk.) The mistake lies in the cloudinit configuration: the iptables configuration should have been in the bootcmd instead of the runcmd section.
|
[] |
|
CVE-2023-32763
|
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.
|
[
"cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*"
] |
|
GHSA-pr7h-529m-qm6h
|
WebKit, as used in Apple iOS before 9.2.1, Safari before 9.0.3, and tvOS before 9.1.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1724.
|
[] |
|
CVE-2025-46384
|
CWE-434 Unrestricted Upload of File with Dangerous Type
|
[] |
|
CVE-2024-33144
|
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the findApplyedTasksPage function in BpmTaskMapper.xml.
|
[
"cpe:2.3:a:j2eefast:j2eefast:*:*:*:*:*:*:*:*"
] |
|
CVE-2009-2213
|
The default configuration of the Security global settings on the Citrix NetScaler Access Gateway appliance with Enterprise Edition firmware 9.0, 8.1, and earlier specifies Allow for the Default Authorization Action option, which might allow remote authenticated users to bypass intended access restrictions.
|
[
"cpe:2.3:o:citrix:netscaler_access_gateway_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_access_gateway_firmware:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_access_gateway_firmware:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:netscaler_access_gateway_firmware:9.0:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:netscaler_access_gateway:-:-:enterprise:*:*:*:*:*"
] |
|
GHSA-6gc9-w97g-whgj
|
File Upload vulnerability in PluckCMS v.4.7.10 dev versions allows a remote attacker to execute arbitrary code via a crafted image file to the the save_file() parameter.
|
[] |
|
CVE-2024-43737
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
GHSA-pfmq-4r52-h3xc
|
Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
|
[] |
|
GHSA-q9gh-gp47-m5f2
|
IBM i2 Intelligent Analyis Platform 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 175645.
|
[] |
|
CVE-2025-1831
|
zj1983 zz ZorgAction.java GetDBUser sql injection
|
A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is the function GetDBUser of the file src/main/java/com/futvan/z/system/zorg/ZorgAction.java. The manipulation of the argument user_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
CVE-2018-17537
|
An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. blog-viewer has stored XSS during repository browsing, if package.json exists. .
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:11.3.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:11.3.0:*:*:*:enterprise:*:*:*"
] |
|
CVE-2022-34924
|
Lanling OA Landray Office Automation (OA) internal patch number #133383/#137780 contains an arbitrary file read vulnerability via the component /sys/ui/extend/varkind/custom.jsp.
|
[
"cpe:2.3:a:landray:landray_office_automation:-:*:*:*:*:*:*:*"
] |
|
CVE-2009-3871
|
Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
|
[
"cpe:2.3:a:sun:jdk:1.5.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_se:*:*:business:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_01:*:*:*:*:*:*:*"
] |
|
GHSA-6rp7-x538-xh3v
|
In store_upgrade and store_cmd of drivers/input/touchscreen/stm/ftm4_pdc.c, there are out of bound writes due to missing bounds checks or integer underflows. These could lead to escalation of privilege.
|
[] |
|
CVE-2019-4593
|
IBM QRadar 7.3.0 to 7.3.3 Patch 2 generates an error message that includes sensitive information that could be used in further attacks against the system. IBM X-ForceID: 167743.
|
[
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-46618
|
In JetBrains TeamCity before 2025.03.1 stored XSS was possible on Data Directory tab
|
[] |
|
GHSA-7mg9-54m6-qh35
|
A code injection vulnerability has been discovered in the Robot Operating System (ROS) 'rostopic' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the 'echo' verb, which allows a user to introspect a ROS topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code.
|
[] |
|
CVE-2018-16160
|
SecureCore Standard Edition Version 2.x allows an attacker to bypass the product 's authentication to log in to a Windows PC.
|
[
"cpe:2.3:a:ftsafe:securecore:*:*:*:*:standard:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-4513
|
Catalyst User Key Authentication Plugin Logout logout.php redirect
|
A vulnerability classified as problematic was found in Catalyst User Key Authentication Plugin 20220819 on Moodle. Affected by this vulnerability is an unknown functionality of the file /auth/userkey/logout.php of the component Logout. The manipulation of the argument return leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
GHSA-m37x-h78g-g7x6
|
A cross-site scripting (XSS) vulnerability in the component /admin/?setting-base.htm of Xiuno BBS 4.0.4 allows attackers to execute arbitrary web scripts or HTML via the sitebrief parameter.
|
[] |
|
GHSA-qx68-647q-334v
|
A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been declared as critical. Affected by this vulnerability is the function delete_product of the file /classes/Master.php?f=delete_product. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
CVE-2020-9604
|
Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a buffer error vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-4029
|
The /rest/project-templates/1.0/createshared resource in Atlassian Jira Server and Data Center before version 8.5.5, from 8.6.0 before 8.7.2, and from 8.8.0 before 8.8.1 allows remote attackers to enumerate project names via an improper authorization vulnerability.
|
[
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_software_data_center:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-44659
|
Adding a new pipeline in GoCD server version 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a Server Side Request Forgery (SSRF). NOTE: the vendor's position is that the observed behavior is not a vulnerability, because the product's design allows an admin to configure outbound requests
|
[
"cpe:2.3:a:thoughtworks:gocd:21.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-13885
|
Citrix Workspace App before 1912 on Windows has Insecure Permissions which allows local users to gain privileges during the uninstallation of the application.
|
[
"cpe:2.3:a:citrix:workspace_app:*:*:*:*:*:windows:*:*"
] |
|
GHSA-hcj6-hxx2-6wpj
|
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. A malicious application may be able to access private information.
|
[] |
|
GHSA-5c8v-jv86-mrjf
|
The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281.
|
[] |
|
GHSA-gf4f-cr5f-q363
|
The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function.
|
[] |
|
GHSA-6356-52fq-7vxx
|
Missing Authorization vulnerability in Leadinfo Leadinfo allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Leadinfo: from n/a through 1.1.
|
[] |
|
CVE-2019-8354
|
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
|
[
"cpe:2.3:a:sound_exchange_project:sound_exchange:14.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
] |
|
CVE-2018-5029
|
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-p2gc-m983-v5x9
|
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[] |
|
GHSA-rvr5-9pgv-pj7m
|
A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been classified as critical. This affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250791. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-wxvx-3x3r-j3jr
|
Unspecified vulnerability in the Solaris component in Oracle Sun Product Suite OpenSolaris snv_119 allows local users to affect integrity and availability via unknown vectors related to IP Filter.
|
[] |
|
CVE-2023-28176
|
Memory safety bugs present in Firefox 110 and Firefox ESR 102.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
GHSA-qpf2-w648-mr69
|
InHand Networks InRouter 900 Industrial 4G Router before v1.0.0.r11700 was discovered to contain a remote code execution (RCE) vulnerability via the function sub_1791C. This vulnerability is triggered via a crafted packet.
|
[] |
|
GHSA-5pjj-7fq8-9gpf
|
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability when saving a configurable product. An attacker with admin privileges can trigger a specially crafted script to achieve remote code execution.
|
[] |
|
GHSA-5wjj-xchx-55wf
|
In WhatsUp Gold versions released before 2024.0.1, a remote unauthenticated attacker could leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\.
|
[] |
|
GHSA-4356-g44g-mrvh
|
Cross-Site Scripting (XSS) vulnerability in School Attendance Monitoring System and School Event Management System affecting version 1.0. An attacker could create a specially crafted URL and send it to a victim to obtain details of their session cookie via the 'StudentID' parameter in '/AttendanceMonitoring/student/controller.php'.
|
[] |
|
CVE-1999-0670
|
Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands.
|
[
"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*"
] |
|
GHSA-7mrw-f6g3-g543
|
IBM Guardium Data Encryption (GDE) 3.0.0.2 and 4.0.0.4 does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 195709.
|
[] |
|
GHSA-qwxw-v6wx-qh2q
|
A sensitive information disclosure vulnerability in GitLab affecting all versions from 15.0 prior to 15.8.5, 15.9 prior to 15.9.4 and 15.10 prior to 15.10.1 allows an attacker to view the count of internal notes for a given issue.
|
[] |
|
GHSA-6882-p9r3-9xgj
|
Cross-site scripting (XSS) vulnerability in the MT4i plugin 3.1 beta 4 and earlier for Movable Type allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-2642.
|
[] |
|
GHSA-x8m6-fw59-xcw9
|
Stack-based buffer overflow in the Discovery Service for BrightStor ARCserve Backup 11.1 and earlier allows remote attackers to execute arbitrary code via a long packet to UDP port 41524, which is not properly handled in a recvfrom call.
|
[] |
|
CVE-2008-4037
|
Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.
|
[
"cpe:2.3:o:microsoft:windows:server_2003:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:server_2003:sp1:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:server_2003:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:server_2003:unknown:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:xp:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:xp:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:xp:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:xp:unknown:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*"
] |
|
CVE-2018-4082
|
An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[
"cpe:2.3:a:apple:apple_tv:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-3vvp-8645-4qmr
|
An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.
|
[] |
|
CVE-2020-27816
|
The elasticsearch-operator does not validate the namespace where kibana logging resource is created and due to that it is possible to replace the original openshift-logging console link (kibana console) to different one, created based on the new CR for the new kibana resource. This could lead to an arbitrary URL redirection or the openshift-logging console link damage. This flaw affects elasticsearch-operator-container versions before 4.7.
|
[
"cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-8xjw-q898-4mqq
|
The Synergy Systems & Solutions (SSS) HUSKY RTU 6049-E70, with firmware Versions 5.0 and prior, has an Incorrect Default Permissions (CWE-276) vulnerability. The affected product is vulnerable to insufficient default permissions, which could allow an attacker to view network configurations through SNMP communication. This is a different issue than CVE-2019-16879, CVE-2019-20045, CVE-2019-20046, CVE-2020-7800, and CVE-2020-7801.
|
[] |
|
CVE-2025-0229
|
code-projects Travel Management System enquiry.php sql injection
|
A vulnerability, which was classified as critical, has been found in code-projects Travel Management System 1.0. This issue affects some unknown processing of the file /enquiry.php. The manipulation of the argument pid/t1/t2/t3/t4/t5/t6/t7 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:fabianros:travel_management_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2023-31424
|
Web authentication and authorization bypass
|
Brocade SANnav Web interface before Brocade SANnav v2.3.0 and v2.2.2a
allows remote unauthenticated users to bypass web authentication and
authorization.
|
[
"cpe:2.3:a:broadcom:brocade_sannav:*:*:*:*:*:*:*:*"
] |
CVE-2021-22473
|
There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.
|
[
"cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2018-1000846
|
FreshDNS version 1.0.3 and earlier contains a Cross ite Request Forgery (CSRF) vulnerability in All (authenticated) API calls in index.php / class.manager.php that can result in Editing domains and zones with victim's privileges. This attack appear to be exploitable via Victim must open a website containing attacker's javascript. This vulnerability appears to have been fixed in 1.0.5 and later.
|
[
"cpe:2.3:a:freshdns_project:freshdns:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-6866
|
SQL injection vulnerability in modules.php in the Current_Issue module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id parameter in a summary action.
|
[
"cpe:2.3:a:php-nuke:current_issue_module:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-0133
|
In MockLocationAppPreferenceController.java, it is possible to mock the GPS location of the device due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145136060
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-52305
|
FPE in paddle.topk
|
FPE in paddle.topk in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
|
[
"cpe:2.3:a:paddlepaddle:paddlepaddle:*:*:*:*:*:*:*:*"
] |
CVE-2023-0471
|
Use after free in WebTransport in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-9v3v-9678-qvch
|
Michael-design iChat Realtime PHP Live Support System 1.6 has persistent Cross-site Scripting via chat,text-filed tags.
|
[] |
|
GHSA-59h8-h34r-q9cv
|
Ignite Realtime Openfire directory traversal vulnerability
|
PluginServlet.java in Ignite Realtime Openfire through 4.4.2 does not ensure that retrieved files are located under the Openfire home directory, aka a directory traversal vulnerability. Version 4.5.0-beta contains a fix for the issue.
|
[] |
CVE-2023-46906
|
juzaweb <= 3.4 is vulnerable to Incorrect Access Control, resulting in an application outage after a 500 HTTP status code. The payload in the timezone field was not correctly validated.
|
[
"cpe:2.3:a:juzaweb:cms:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-20118
|
A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device.
This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device.
Cisco has not and will not release software updates that address this vulnerability. However, administrators may disable the affected feature as described in the Workarounds ["#workarounds"] section.
{{value}} ["%7b%7bvalue%7d%7d"])}]]
|
[
"cpe:2.3:o:cisco:rv016_firmware:1.5.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv016_firmware:4.2.3.08:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_firmware:1.5.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_firmware:4.2.3.08:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_firmware:1.5.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_firmware:4.2.3.08:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_firmware:1.5.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_firmware:4.2.3.08:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv320_firmware:1.5.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv320_firmware:4.2.3.08:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv325_firmware:1.5.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv325_firmware:4.2.3.08:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-10862
|
An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Local Privilege Escalation (LPE) via RPC.
|
[
"cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-m44f-wcwx-2834
|
The Ninja Forms plugin before 3.4.28 for WordPress lacks escaping for submissions-table fields.
|
[] |
|
GHSA-xvq9-c88q-jf5x
|
Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.
|
[] |
|
CVE-2025-47554
|
WordPress CSS3 Compare Pricing Tables for WordPress plugin <= 11.6 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuanticaLabs CSS3 Compare Pricing Tables for WordPress allows Reflected XSS. This issue affects CSS3 Compare Pricing Tables for WordPress: from n/a through 11.6.
|
[] |
CVE-2006-0438
|
Cross-site request forgery (CSRF) vulnerability in phpBB 2.0.19, when Link to off-site Avatar or bbcode (IMG) are enabled, allows remote attackers to perform unauthorized actions as a logged in user via a link or IMG tag in a user profile, as demonstrated using links to (1) admin/admin_users.php and (2) modcp.php.
|
[
"cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.6c:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.6d:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0_rc4:*:*:*:*:*:*:*"
] |
|
CVE-2019-19375
|
In Octopus Deploy before 2019.10.7, in a configuration where SSL offloading is enabled, the CSRF cookie was sometimes sent without the secure attribute. (The fix for this was backported to LTS versions 2019.6.14 and 2019.9.8.)
|
[
"cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:-:*:*:*",
"cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:lts:*:*:*"
] |
|
GHSA-wxm6-gcq6-r4p5
|
Tooljet v1.6 does not properly handle missing values in the API, allowing attackers to arbitrarily reset passwords via a crafted HTTP request.
|
[] |
|
GHSA-733v-p3h5-qpq7
|
GraphQL Armor Cost-Limit Plugin Bypass via Introspection Query Obfuscation
|
SummaryA query cost restriction using the `cost-limit` can be bypassed if `ignoreIntrospection` is enabled (which is the default configuration) by naming your query/fragment `__schema`.DetailsAt the start of the `computeComplexity` function, we have the following check for `ignoreIntrospection` option:However, the `node` can be `FieldNode | FragmentDefinitionNode | InlineFragmentNode | OperationDefinitionNode | FragmentSpreadNode`So, for example, sending the following querywould create an `OperationDefinitionNode` with `node.name.value == 'hello'`The proper way to handle this would be to check for the `__schema` field, which would create a `FieldNode`.The fix isto assert that the node must be a `FieldNode`PoCImpactApplications using GraphQL Armor Cost Limit plugin with `ignoreIntrospection` enabled.Fix:Fixed on [772](https://github.com/Escape-Technologies/graphql-armor/pull/772). A quick patch would be to set `ignoreIntrospection` to false.
|
[] |
GHSA-xvc3-rmmw-6hxp
|
Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015.
|
[] |
|
CVE-2021-33822
|
An issue was discovered on 4GEE ROUTER HH70VB Version HH70_E1_02.00_22. Attackers can use slowhttptest tool to send incomplete HTTP request, which could make server keep waiting for the packet to finish the connection, until its resource exhausted. Then the web server is denial-of-service.
|
[
"cpe:2.3:o:sing4g:4gee_router_hh70vb_firmware:hh70_e1_02.00_22:*:*:*:*:*:*:*",
"cpe:2.3:h:sing4g:4gee_router_hh70vb:-:*:*:*:*:*:*:*"
] |
|
CVE-2006-1993
|
Mozilla Firefox 1.5.0.2, when designMode is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain Javascript that is not properly handled by the contentWindow.focus method in an iframe, which causes a reference to a deleted controller context object. NOTE: this was originally claimed to be a buffer overflow in (1) js320.dll and (2) xpcom_core.dll, but the vendor disputes this claim.
|
[
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*"
] |
|
GHSA-jcv4-2hjq-vv2c
|
The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
|
[] |
|
GHSA-6xq7-qqp2-9mmc
|
A use after free vulnerability exists in curl <v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed.
|
[] |
|
CVE-2008-1146
|
A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND.
|
[
"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:dragonflybsd:dragonflybsd:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:dragonflybsd:dragonflybsd:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:dragonflybsd:dragonflybsd:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:dragonflybsd:dragonflybsd:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.8:release_p7:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.8_prerelease:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.9_prerelease:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.10_prerelease:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.11_p20_release:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:4.11_release:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.5_release:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.5_stable:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0_p5_release:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.1:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.1:release_p10:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.1:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.2_releng:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.3_releng:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.0:pre-release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.0_beta4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:7.0_releng:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:3.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:4.0:beta:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cosmicperl:directory_pro:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:darwin:darwin:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:darwin:darwin:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:navision:financials_server:3.0:*:*:*:*:*:*:*"
] |
|
GHSA-6hrm-jqp3-64cv
|
Improper Certificate Validation in TweetStream
|
TweetStream 2.6.1 uses the library eventmachine in an insecure way that does not have TLS hostname validation. This allows an attacker to perform a man-in-the-middle attack.
|
[] |
GHSA-4gqg-m5mw-g8mg
|
Mastodon before 2.6.3 mishandles timeouts of incompletely established sessions.
|
[] |
|
CVE-2024-12752
|
Foxit PDF Reader AcroForm Memory Corruption Remote Code Execution Vulnerability
|
Foxit PDF Reader AcroForm Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25345.
|
[] |
CVE-2020-3462
|
Cisco Data Center Network Manager SQL Injection Vulnerability
|
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain and modify sensitive information that is stored in the underlying database.
|
[
"cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*"
] |
CVE-2009-3632
|
SQL injection vulnerability in the traditional frontend editing feature in the Frontend Editing subcomponent in TYPO3 4.0.13 and earlier, 4.1.x before 4.1.13, 4.2.x before 4.2.10, and 4.3.x before 4.3beta2 allows remote authenticated users to execute arbitrary SQL commands via unspecified parameters.
|
[
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.11:*:*:*:*:*:*:*"
] |
|
CVE-2016-0693
|
Unspecified vulnerability in Oracle Sun Solaris 10 and 11.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the PAM LDAP module.
|
[
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
] |
|
GHSA-vmfr-6chp-w9mf
|
An exploitable code execution vulnerability exists in the ILBM image rendering functionality of SDL2_image-2.0.2. A specially crafted ILBM image can cause a heap overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
|
[] |
|
GHSA-v6mw-4xwj-vqrm
|
The MultiPathResource class in Atlassian Fisheye and Crucible, before version 4.4.1 allows anonymous remote attackers to read arbitrary files via a path traversal vulnerability when Fisheye or Crucible is running on the Microsoft Windows operating system.
|
[] |
|
GHSA-9xfc-f5r7-8qq3
|
The Web Browser & Explorer (aka internetexplorer.browser.webexplorer) application 4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] |
|
CVE-2015-6131
|
Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows remote attackers to execute arbitrary code via a crafted .mcl file, aka "Media Center Library Parsing RCE Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] |
|
GHSA-qhw4-wwr7-gjc5
|
TensorFlow vulnerable to `CHECK` fail in `EmptyTensorList`
|
ImpactIf `EmptyTensorList` receives an input `element_shape` with more than one dimension, it gives a `CHECK` fail that can be used to trigger a denial of service attack.PatchesWe have patched the issue in GitHub commit [c8ba76d48567aed347508e0552a257641931024d](https://github.com/tensorflow/tensorflow/commit/c8ba76d48567aed347508e0552a257641931024d).The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Kang Hong Jin.
|
[] |
GHSA-jq6q-rgpf-9wqr
|
A vulnerability in the web interface for Cisco SD-WAN Solution vManage could allow an authenticated, remote attacker to impact the integrity of an affected system by executing arbitrary SQL queries. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input that includes SQL statements to an affected system. A successful exploit could allow the attacker to modify entries in some database tables, affecting the integrity of the data.
|
[] |
|
CVE-2022-4792
|
News & Blog Designer Pack < 3.3 - Contributor+ Stored XSS via Shortcode
|
The News & Blog Designer Pack WordPress plugin before 3.3 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
|
[
"cpe:2.3:a:infornweb:news_\\&_blog_designer_pack:*:*:*:*:*:wordpress:*:*"
] |
CVE-2007-5221
|
PHP remote file inclusion vulnerability in mail/childwindow.inc.php in Poppawid 2.7 allows remote attackers to execute arbitrary PHP code via a URL in the form parameter.
|
[
"cpe:2.3:a:poppawid:poppawid:2.7:*:*:*:*:*:*:*"
] |
|
CVE-2018-16266
|
The Enlightenment system service in Tizen allows an unprivileged process to fully control or capture windows, due to improper D-Bus security policy configurations. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
|
[
"cpe:2.3:o:linux:tizen:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:1.0:m1:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:3.0:m2:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:3.0:m3:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:4.0:m1:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:4.0:m2:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:4.0:m3:*:*:*:*:*:*",
"cpe:2.3:o:linux:tizen:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_gear:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-22450
|
A component of the HarmonyOS has a Incomplete Cleanup vulnerability. Local attackers may exploit this vulnerability to cause memory exhaustion.
|
[
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-x3p3-929j-pq66
|
Improper Neutralization of Input During Web Page Generation in Jenkins
|
Cross-site scripting (XSS) vulnerability in Jenkins before 1.640 and LTS before 1.625.2 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to workspaces and archived artifacts.
|
[] |
GHSA-jcrv-9q79-6v5h
|
efFingerD 0.2.12 allows remote attackers to cause a denial of service (daemon crash) via a packet with a single byte, which triggers a "Wrong protocol or connection state" error.
|
[] |
|
CVE-2019-17530
|
An issue was discovered in Bento4 1.5.1.0. There is a heap-based buffer over-read in AP4_PrintInspector::AddField in Core/Ap4Atom.cpp when called from AP4_CencSampleEncryption::DoInspectFields in Core/Ap4CommonEncryption.cpp, when called from AP4_Atom::Inspect in Core/Ap4Atom.cpp.
|
[
"cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.