id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
|---|---|---|---|
CVE-2017-15614
|
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-outif variable in the pptp_client.lua file.
|
[
"cpe:2.3:o:tp-link:er5110g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5110g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5120g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5120g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5510g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5510g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:er5520g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er5520g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4149g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4149g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4239g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4239g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r4299g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r4299g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473gp-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473gp-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473p-ac_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473p-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r473_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r473:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478g\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478g\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r478\\+_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r478\\+:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r483_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r483:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:r488_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:r488:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war458_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war458:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:war900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:war900l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr1750l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr1750l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr2600l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr2600l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr302_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr4300l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr4300l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450l_firmware:1.0161125:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr458l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr458l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900g_firmware:3.0_170306:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:wvr900l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:wvr900l:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-47245
|
WordPress ANAC XML Viewer Plugin <= 1.7 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Marco Milesi ANAC XML Viewer plugin <= 1.7 versions.
|
[
"cpe:2.3:a:marcomilesi:anac_xml_viewer:*:*:*:*:*:wordpress:*:*"
] |
CVE-2008-1402
|
MG-SOFT Net Inspector 6.5.0.828 and earlier for Windows allows remote attackers to cause a (1) denial of service (exception and crash) via a UDP packet to the SNMP Trap Service (MgWTrap3.exe) or (2) denial of service (device freeze or memory consumption) via a malformed request to the Net Inspector Server (niengine).
|
[
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mg-soft:net_inspector:*:*:*:*:*:*:*:*"
] |
|
GHSA-68hh-g5c3-pjg2
|
Missing Authorization vulnerability in WPWeb Elite WooCommerce PDF Vouchers allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WooCommerce PDF Vouchers: from n/a through 4.9.4.
|
[] |
|
CVE-2009-1768
|
Directory traversal vulnerability in download.php in Rama Zaiten CMS 0.9.8 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
|
[
"cpe:2.3:a:ramazeiten:ramazaitencms0.9.7.5:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ramazeiten:ramazaitencms0.9.7.6:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ramazeiten:ramazaitencms0.9.7.8:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ramazeiten:ramazaitencms0.9.8:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-4667
|
The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2009-3367
|
Multiple cross-site scripting (XSS) vulnerabilities in An image gallery 1.0 allow remote attackers to inject arbitrary web script or HTML via the path parameter to (1) index.php and (2) main.php, and the (3) show parameter to main.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:plohni:an_image_gallery:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-9p4h-5gqr-3c46
|
VMware Workstation (12.x prior to 12.5.3) and Horizon View Client (4.x prior to 4.4.0) contain multiple heap buffer-overflow vulnerabilities in JPEG2000 parser in the TPView.dll. On Workstation, this may allow a guest to execute code or perform a Denial of Service on the Windows OS that runs Workstation. In the case of a Horizon View Client, this may allow a View desktop to execute code or perform a Denial of Service on the Windows OS that runs the Horizon View Client. Exploitation is only possible if virtual printing has been enabled. This feature is not enabled by default on Workstation but it is enabled by default on Horizon View.
|
[] |
|
CVE-2024-25366
|
Buffer Overflow vulnerability in mz-automation.de libiec61859 v.1.4.0 allows a remote attacker to cause a denial of service via the mmsServer_handleGetNameListRequest function to the mms_getnamelist_service component.
|
[
"cpe:2.3:a:mz-automation:lib60870:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-37330
|
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
|
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
|
[
"cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:*:*"
] |
GHSA-94hf-42cp-33m4
|
IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x, B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
|
[] |
|
GHSA-c57p-3v2g-w9rg
|
Insertion of Sensitive Information into Log File in Apache Tomcat
|
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.This issue was fixed in Apache Tomcat 7.0.17 but the release votes for the 7.0.17 and 7.0.18 release candidates did not pass. Therefore, users must download 7.0.19 to obtain a version that includes a fix.
|
[] |
CVE-2024-49700
|
WordPress ARPrice plugin <= 4.0.3 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound ARPrice allows Reflected XSS. This issue affects ARPrice: from n/a through 4.0.3.
|
[] |
CVE-2019-19089
|
eSOMS: X-Content-Type-Options Header Missing
|
For ABB eSOMS versions 4.0 to 6.0.3, the X-Content-Type-Options Header is missing in the HTTP response, potentially causing the response body to be interpreted and displayed as different content type other than declared. A possible attack scenario would be unauthorized code execution via text interpreted as JavaScript.
|
[
"cpe:2.3:a:hitachienergy:esoms:*:*:*:*:*:*:*:*"
] |
CVE-2016-9821
|
Integer overflow in libavcodec/mpegvideo_parser.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via a crafted file.
|
[
"cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*"
] |
|
GHSA-vx6p-6hc5-p7cr
|
The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to download the contents of arbitrary files on the server, which can contain sensitive information. The requires the premium version of the plugin to be activated.
|
[] |
|
GHSA-4jpf-c3p7-8jx7
|
Multiple integer overflows in the (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER, and (4) FLASK_CONTEXT_TO_SID suboperations in the flask hypercall in Xen 4.3.x, 4.2.x, 4.1.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1892, CVE-2014-1893, and CVE-2014-1894.
|
[] |
|
GHSA-f3r5-64g9-rq7c
|
In camera middleware, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629582; Issue ID: ALPS07629582.
|
[] |
|
GHSA-954c-jjx6-cxv7
|
Reflected XSS from the callback handler's error query parameter
|
OverviewVersions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message.Am I affected?You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response.How to fix that?Upgrade to version `1.4.2`.Will this update impact my users?The fix adds basic HTML escaping to the error message and it should not impact your users.Credithttps://github.com/inian
https://github.com/git-ishanpatel
|
[] |
GHSA-chxv-69f7-52q5
|
The update functionality in the rslider_page uses an rs_id POST parameter which is not validated, sanitised or escaped before being inserted in sql query, therefore leading to SQL injection for users having Administrator role.
|
[] |
|
GHSA-863r-cfhv-7rmg
|
MicroDicomDICOM Viewer suffers from an out-of-bounds write vulnerability. Remote attackers are able to exploit this issue to potentially execute arbitrary code on affected installations of DICOM Viewer. User interaction is required to exploit the vulnerability in that the user must either visit a malicious website or open a malicious DICOM file locally.
|
[] |
|
CVE-2023-2420
|
MLECMS common.func.php get_url sql injection
|
A vulnerability was found in MLECMS 3.0. It has been rated as critical. This issue affects the function get_url in the library /upload/inc/lib/admin of the file upload\inc\include\common.func.php. The manipulation of the argument $_SERVER['REQUEST_URI'] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227717 was assigned to this vulnerability.
|
[
"cpe:2.3:a:mlecms:mlecms:3.0:*:*:*:*:*:*:*"
] |
GHSA-fxj6-gm5w-8mwr
|
An information disclosure vulnerability was discovered in alipay_function.php in the log file of Alibaba payment interface on PHPPYUN prior to version 5.0.1. If exploited, this vulnerability will allow attackers to obtain users' personally identifiable information including e-mail address and telephone numbers.
|
[] |
|
GHSA-qx8r-w7wr-86w4
|
Incorrect default permissions in the AMD Cloud Manageability Service (ACMS) Software installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
|
[] |
|
CVE-2016-10780
|
cPanel before 60.0.25 allows stored XSS in the ftp_sessions API (SEC-180).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-34821
|
Cross Site Scripting (XSS) vulnerability exists in AAT Novus Management System through 1.51.2. The WebUI has wrong HTTP 404 error handling implemented. A remote, unauthenticated attacker may be able to exploit the issue by sending malicious HTTP requests to non-existing URIs. The value of the URL path filename is copied into the HTML document as plain text tags.
|
[
"cpe:2.3:a:aat:novus_management_system:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-18098
|
The searchrequest-xml resource in Atlassian Jira before version 7.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through various fields.
|
[
"cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*"
] |
|
GHSA-fm69-w7g9-r3fg
|
PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/#maintenance_sysTask/edit.
|
[] |
|
CVE-2021-45026
|
ASG technologies ASG-Zena Cross Platform Server Enterprise Edition 4.2.1 is vulnerable to Cross Site Scripting (XSS).
|
[
"cpe:2.3:a:rocketsoftware:ags-zena:4.2.1:*:*:*:enterprise:*:*:*"
] |
|
CVE-2022-23285
|
Remote Desktop Client Remote Code Execution Vulnerability
|
Remote Desktop Client Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
CVE-2024-38755
|
WordPress DirectoryPress plugin <= 3.6.10 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Designinvento DirectoryPress allows SQL Injection.This issue affects DirectoryPress: from n/a through 3.6.10.
|
[
"cpe:2.3:a:designinvento:directorypress:*:*:*:*:*:wordpress:*:*"
] |
GHSA-726g-hprw-wx45
|
Multiple vulnerabilities in the web framework code of the Cisco Prime Collaboration Provisioning could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web interface of the affected system. More Information: CSCut43061 CSCut43066 CSCut43736 CSCut43738 CSCut43741 CSCut43745 CSCut43748 CSCut43751 CSCut43756 CSCut43759 CSCut43764 CSCut43766. Known Affected Releases: 10.6.
|
[] |
|
GHSA-p9p9-hfpr-fx4f
|
dialog.php in CONTENTCustomizer 3.1mp and earlier allows remote attackers to obtain sensitive author credentials by making a request with an editauthor action, then reading the value of the newlocalpassword password input field in the HTML source of the resulting page.
|
[] |
|
CVE-2022-3181
|
An Improper Input Validation vulnerability exists in Trihedral VTScada version 12.0.38 and prior. A specifically malformed HTTP request could cause the affected VTScada to crash. Both local area network (LAN)-only and internet facing systems are affected.
|
[
"cpe:2.3:a:trihedral:vtscada:*:*:*:*:*:*:*:*"
] |
|
GHSA-j2f6-v4vj-2456
|
An Improper Check for Unusual or Exceptional Conditions vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS onSRX1600, SRX2300, SRX 4000 Series, and SRX5000 Series with SPC3allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).If a sequence of specific PIM packets is received, this will cause a flowd crash and restart.This issue affects Junos OS:all versions before 21.2R3-S9,21.4 versions before 21.4R3-S11,22.2 versions before 22.2R3-S7,22.4 versions before 22.4R3-S6,23.2 versions before 23.2R2-S4,23.4 versions before 23.4R2-S4,24.2 versions before 24.2R2.This is a similar, but different vulnerability than the issue reported asCVE-2024-47503, published in JSA88133.
|
[] |
|
GHSA-qr6c-mgw3-xxq8
|
In the Linux kernel, the following vulnerability has been resolved:atm: iphase: fix possible use-after-free in ia_module_exit()This module's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.
|
[] |
|
CVE-2010-1669
|
SQL injection vulnerability in Mahara 1.1.x before 1.1.9 and 1.2.x before 1.2.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:mahara:mahara:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mahara:mahara:1.2.4:*:*:*:*:*:*:*"
] |
|
GHSA-4558-4wr6-c38x
|
A vulnerability classified as problematic has been found in H3C SecCenter SMP-E1114P02 up to 20250513. Affected is the function Download of the file /packetCaptureStrategy/download. The manipulation of the argument Name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
CVE-2017-1000443
|
Eleix Openhacker version 0.1.47 is vulnerable to a XSS vulnerability in the bank transactions component resulting in arbitrary code execution in the browser.
|
[
"cpe:2.3:a:openhacker_project:openhacker:0.1.47:*:*:*:*:*:*:*"
] |
|
GHSA-46c3-gjp8-q49w
|
Student Information System v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'photo' parameter of my-profile page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application.
|
[] |
|
CVE-2022-3372
|
Cross-Site Request Forgery (CSRF) in Riello UPS Netman-204
|
There is a CSRF vulnerability on Netman-204 version 02.05. An attacker could manage to change administrator passwords through a Cross Site Request Forgery due to the lack of proper validation on the CRSF token. This vulnerability could allow a remote attacker to access the administrator panel, being able to modify different parameters that are critical for industrial operations.
|
[
"cpe:2.3:h:riello-ups:netman_204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:riello-ups:netman_204_firmware:02.05:*:*:*:*:*:*:*"
] |
GHSA-cc7j-f64f-pf58
|
Multiple cross-site scripting (XSS) vulnerabilities in x10 MP3 Search engine 1.6.5 allow remote attackers to inject arbitrary web script or HTML via the (1) pic_id parameter to includes/video_ad.php, (2) category parameter to linkvideos_listing.php, id parameter to (3) templates/header1.php and (4) mp3/lyrics.php, key parameter to (5) video_listing.php and (6) adult/video_listing.php, and name parameter to (7) mp3/embed.php and (8) mp3/info.php.
|
[] |
|
GHSA-7767-85v2-wj6x
|
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the wpfc_preload_single_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber-level access to initiate cache creation.
|
[] |
|
CVE-2019-14483
|
AdRem NetCrunch 10.6.0.4587 allows Credentials Disclosure. Every user can read the BSD, Linux, MacOS and Solaris private keys, private keys' passwords, and root passwords stored in the credential manager. Every administrator can read the ESX and Windows passwords stored in the credential manager.
|
[
"cpe:2.3:a:adremsoft:netcrunch:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-29041
|
Express.js Open Redirect in malformed URLs
|
Express.js minimalist web framework for node. Versions of Express.js prior to 4.19.0 and all pre-release alpha and beta versions of 5.0 are affected by an open redirect vulnerability using malformed URLs. When a user of Express performs a redirect using a user-provided URL Express performs an encode [using `encodeurl`](https://github.com/pillarjs/encodeurl) on the contents before passing it to the `location` header. This can cause malformed URLs to be evaluated in unexpected ways by common redirect allow list implementations in Express applications, leading to an Open Redirect via bypass of a properly implemented allow list. The main method impacted is `res.location()` but this is also called from within `res.redirect()`. The vulnerability is fixed in 4.19.2 and 5.0.0-beta.3.
|
[] |
GHSA-9q22-46jj-7c8m
|
Cross-site scripting (XSS) vulnerability in ThemeBeans Blooog theme 1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the jQuery parameter to assets/js/jplayer.swf.
|
[] |
|
CVE-2008-0867
|
Cross-site scripting (XSS) vulnerability in portal/server.pt in BEA AquaLogic Interaction 6.1 through MP1 and Plumtree Foundation 6.0 through SP1 allows remote attackers to inject arbitrary web script or HTML via the name parameter.
|
[
"cpe:2.3:a:bea_systems:aqualogic_interaction:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea_systems:aqualogic_interaction:6.1:mp1:*:*:*:*:*:*",
"cpe:2.3:a:bea_systems:plumtree_foundation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bea_systems:plumtree_foundation:6.0:sp1:*:*:*:*:*:*"
] |
|
GHSA-g26c-r36p-w7g4
|
costview3/xmlrpc_server/xmlrpc.php in CostView in Caldera 9.20 allows remote attackers to execute arbitrary commands via shell metacharacters in a methodCall element in a PHP XMLRPC request.
|
[] |
|
CVE-2012-5323
|
Cross-site request forgery (CSRF) vulnerability in webconfig/admin_passwd/passwd.html/admin_passwd in Xavi X7968 allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via the sysUserName, sysPassword, and sysCfmPwd parameters.
|
[
"cpe:2.3:h:xavi:x7968:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-0908
|
The Advanced Post Block – Display Posts, Pages, or Custom Posts on Your Page plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the apbPosts() function hooked via an AJAX action in all versions up to, and including, 1.13.1. This makes it possible for unauthenticated attackers to retrieve all post data, including those that may be password protected.
|
[
"cpe:2.3:a:abuhayat:advanced_post_block:*:*:*:*:*:*:*:*"
] |
|
GHSA-x34j-q4jr-cvm6
|
Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-30181, CVE-2022-33641, CVE-2022-33642, CVE-2022-33643, CVE-2022-33650, CVE-2022-33651, CVE-2022-33652, CVE-2022-33653, CVE-2022-33654, CVE-2022-33655, CVE-2022-33656, CVE-2022-33657, CVE-2022-33658, CVE-2022-33659, CVE-2022-33660, CVE-2022-33661, CVE-2022-33662, CVE-2022-33663, CVE-2022-33664, CVE-2022-33665, CVE-2022-33666, CVE-2022-33667, CVE-2022-33668, CVE-2022-33669, CVE-2022-33671, CVE-2022-33672, CVE-2022-33673, CVE-2022-33674, CVE-2022-33677.
|
[] |
|
CVE-2008-3588
|
Multiple SQL injection vulnerabilities in phsBlog 0.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) eid parameter to comments.php, (2) cid parameter to index.php, and the (3) urltitle parameter to entries.php.
|
[
"cpe:2.3:a:phsblog:phsblog:0.1.1:*:*:*:*:*:*:*"
] |
|
CVE-2013-3214
|
vtiger CRM 5.4.0 and earlier contain a PHP Code Injection Vulnerability in 'vtigerolservice.php'.
|
[
"cpe:2.3:a:vtiger:vtiger_crm:*:*:*:*:*:*:*:*"
] |
|
GHSA-44jw-5jxp-qmqr
|
ASCII Armor parser in Windows PGP 7.0.3 and earlier allows attackers to create files in arbitrary locations via a malformed ASCII armored file.
|
[] |
|
CVE-2022-32894
|
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-mf5c-mpv7-gxg8
|
Tenda FH1203 V2.0.1.6 was discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
|
[] |
|
CVE-2009-3332
|
SQL injection vulnerability in the JBudgetsMagic (com_jbudgetsmagic) component 0.3.2 through 0.4.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the bid parameter in a mybudget action to index.php.
|
[
"cpe:2.3:a:sopinet:com_jbudgetsmagic:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sopinet:com_jbudgetsmagic:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sopinet:com_jbudgetsmagic:0.4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] |
|
GHSA-ch6f-q6p6-gf44
|
In the Linux kernel, the following vulnerability has been resolved:cifs: avoid NULL pointer dereference in dbg callcifs_server_dbg() implies server to be non-NULL so
move call under condition to avoid NULL pointer dereference.Found by Linux Verification Center (linuxtesting.org) with SVACE.
|
[] |
|
GHSA-j9q2-q6gv-w438
|
An issue was discovered in Digi ConnectPort LTS before 1.4.12. A Directory Traversal vulnerability exists in WebFS. This allows an attacker on the local area network to manipulate URLs to include traversal sequences, potentially leading to unauthorized access to data.
|
[] |
|
GHSA-h4f8-93hw-pp9f
|
Command-injection vulnerability in Huawei E587 3G Mobile Hotspot 11.203.27 allows remote attackers to execute arbitrary shell commands with root privileges due to an error in the Web UI.
|
[] |
|
GHSA-7575-9jw8-fp9m
|
On the Axesstel MU553S MU55XS-V1.14, there is a Stored Cross Site Scripting vulnerability in the APN parameter under the "Basic Settings" page.
|
[] |
|
GHSA-85r4-xc54-8ww3
|
A vulnerability, which was classified as problematic, has been found in Legrand SMS PowerView 1.x. This issue affects some unknown processing. The manipulation of the argument redirect leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-7xr6-jcgr-7226
|
Vulnerability in GIOP dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (memory consumption).
|
[] |
|
GHSA-3qxh-754r-9gj8
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Zota allows PHP Local File Inclusion. This issue affects Zota: from n/a through 1.3.8.
|
[] |
|
CVE-2024-43189
|
IBM Concert Software information disclosure
|
IBM Concert Software 1.0.0 through 1.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
|
[
"cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.1:*:*:*:*:*:*:*"
] |
CVE-2022-2130
|
Cross-site Scripting (XSS) - Reflected in microweber/microweber
|
Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.17.
|
[
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] |
CVE-2013-2824
|
Schneider Electric StruxureWare SCADA Expert Vijeo Citect 7.40, Vijeo Citect 7.20 through 7.30SP1, CitectSCADA 7.20 through 7.30SP1, StruxureWare PowerSCADA Expert 7.30 through 7.30SR1, and PowerLogic SCADA 7.20 through 7.20SR1 do not properly handle exceptions, which allows remote attackers to cause a denial of service via a crafted packet.
|
[
"cpe:2.3:a:schneider-electric:citectscada:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:citectscada:7.20:sp1:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:citectscada:7.20:sp2:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:citectscada:7.20:sp3:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:citectscada:7.20:sp4:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:citectscada:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:citectscada:7.30:sp1:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:powerlogic_scada:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:powerlogic_scada:7.20:sr1:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_powerscada_expert:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_powerscada_expert:7.30:sr1:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_scada_expert_vijeo_citect:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_scada_expert_vijeo_citect:7.20:sp1:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_scada_expert_vijeo_citect:7.20:sp2:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_scada_expert_vijeo_citect:7.20:sp3:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_scada_expert_vijeo_citect:7.20:sp4:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_scada_expert_vijeo_citect:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_scada_expert_vijeo_citect:7.30:sp1:*:*:*:*:*:*",
"cpe:2.3:a:schneider-electric:struxureware_scada_expert_vijeo_citect:7.40:*:*:*:*:*:*:*"
] |
|
CVE-2005-1790
|
Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:6.0.2800.1106:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*"
] |
|
GHSA-92xp-xgh3-7m2f
|
Buffer overflow in Orbz 2.10 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long password field in a join request.
|
[] |
|
GHSA-hf73-54jv-gg64
|
Computer Laboratory Management System v1.0 is vulnerable to SQL Injection via the "id" parameter of /admin/?page=user/manage_user&id=6.
|
[] |
|
CVE-2023-48452
|
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] |
GHSA-xj7c-fgvc-fxmf
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Bridge Core allows Stored XSS. This issue affects Bridge Core: from n/a through n/a.
|
[] |
|
CVE-2024-7758
|
Stylish Price List < 7.1.8 - Contributor+ Stored XSS
|
The Stylish Price List WordPress plugin before 7.1.8 does not sanitise and escape some of its settings, which could allow high privilege users of contributor and above to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] |
CVE-2022-30776
|
atmail 6.5.0 allows XSS via the index.php/admin/index/ error parameter.
|
[
"cpe:2.3:a:atmail:atmail:6.5.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-43543
|
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
|
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] |
GHSA-86hq-hxhx-87gp
|
WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1.
|
[] |
|
CVE-2008-2280
|
Cross-site scripting (XSS) vulnerability in admin/index.php in Script PHP PicEngine 1.0 allows remote attackers to inject arbitrary web script or HTML via the l parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:scriptphp:picengine:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-9598-xhf2-cw82
|
PHP remote file inclusion vulnerability in SAPID CMS 123 rc3 allows remote attackers to execute arbitrary PHP code via a URL in the (1) root_path parameter in usr/extensions/get_infochannel.inc.php and the (2) GLOBALS["root_path"] parameter in usr/extensions/get_tree.inc.php.
|
[] |
|
CVE-2011-3412
|
Microsoft Publisher 2003 SP3, and 2007 SP2 and SP3, allows remote attackers to execute arbitrary code via a crafted Publisher file that leverages incorrect memory handling, aka "Publisher Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:publisher:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:publisher:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:publisher:2007:sp3:*:*:*:*:*:*"
] |
|
CVE-2025-25269
|
Local Privilege Escalation via Unauthenticated Command Injection
|
An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation.
|
[] |
GHSA-mwvh-p3hx-x4gg
|
Ibexa Kernel's files with blacklisted extensions can be still saved to drafts
|
ImpactFile validation can be configured to reject certain files by file type. When this happens, validation fails, and the content can't be published. However, the file can be saved when saving the content draft. This means unwanted files can be present in storage, even if they are not easily accessible due to the content not being published. The fix ensures these unwanted file types are never stored. An attacker would need to have existing access to create content with a file field type to exploit this.PatchesSee "Patched versions".
Commit: https://github.com/ezsystems/ezplatform-kernel/commit/7e472317f7c75f45f72f74c38406952d8bea0de1Referenceshttps://developers.ibexa.co/security-advisories/ibexa-sa-2024-002-file-validation-and-workflow-stages
|
[] |
CVE-2020-4246
|
IBM Security Identity Governance and Intelligence 5.2.6 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 175481.
|
[
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.6:*:*:*:*:*:*:*"
] |
|
CVE-2017-16798
|
In CMS Made Simple 2.2.3.1, the is_file_acceptable function in modules/FileManager/action.upload.php only blocks file extensions that begin or end with a "php" substring, which allows remote attackers to bypass intended access restrictions or trigger XSS via other extensions, as demonstrated by .phtml, .pht, .html, or .svg.
|
[
"cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.3.1:*:*:*:*:*:*:*"
] |
|
GHSA-gfh4-f3wf-9223
|
Cross-site scripting (XSS) vulnerability in Moodle 2.0.x before 2.0.9, 2.1.x before 2.1.6, and 2.2.x before 2.2.3 allows remote authenticated users to inject arbitrary web script or HTML via the idnumber field to cohort/edit.php.
|
[] |
|
GHSA-mrjw-2vh7-3rf9
|
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
|
[] |
|
CVE-2024-21230
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql_cluster:7.5.35_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_cluster:7.6.31_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-c53q-p5wq-m9g6
|
The default views in the Organic Groups (OG) module 6.x-2.x before 6.x-2.4 for Drupal do not properly check permissions when all users have the "access content" permission removed, which allows remote attackers to bypass access restrictions and possibly have other unspecified impact.
|
[] |
|
CVE-2013-4296
|
The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.
|
[
"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:0.10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:1.0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:1.0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:1.0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:1.0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:1.0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:libvirt:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-5g4q-5r23-wrrp
|
Missing Authorization vulnerability in Webcodin WCP Contact Form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WCP Contact Form: from n/a through 3.1.0.
|
[] |
|
CVE-2023-36407
|
Windows Hyper-V Elevation of Privilege Vulnerability
|
Windows Hyper-V Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] |
GHSA-m9w8-wxvp-c9gv
|
Drupal Open Social Missing Authorization vulnerability
|
Missing Authorization vulnerability in Drupal Open Social allows Forceful Browsing. This issue affects Open Social: from 0.0.0 before 12.3.11, from 12.4.0 before 12.4.10.
|
[] |
GHSA-q58r-qh3r-4w5f
|
The WPQA Builder WordPress plugin before 5.9 does not have CSRF check when following and unfollowing users, which could allow attackers to make logged in users perform such actions via CSRF attacks
|
[] |
|
CVE-2021-37137
|
The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.
|
[
"cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_apis:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_apis:19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_apis:19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_apis:20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_apis:21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_digital_experience:21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-p878-6hmx-f7fp
|
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
|
[] |
|
CVE-2023-1500
|
code-projects Simple Art Gallery adminHome.php cross site scripting
|
A vulnerability, which was classified as problematic, has been found in code-projects Simple Art Gallery 1.0. Affected by this issue is some unknown functionality of the file adminHome.php. The manipulation of the argument about_info leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223400.
|
[
"cpe:2.3:a:code-projects:simple_art_gallery:1.0:*:*:*:*:*:*:*"
] |
CVE-2018-11646
|
webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in UIProcess/API/glib/WebKitFaviconDatabase.cpp in WebKit, as used in WebKitGTK+ through 2.21.3, mishandle an unset pageURL, leading to an application crash.
|
[
"cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-9879
|
Website File Changes < 2.1.1 - Authenticated SQL Injection
|
The Melapress File Monitor WordPress plugin before 2.1.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
|
[] |
GHSA-65vv-2r24-pjcx
|
Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
|
[] |
|
CVE-2025-30538
|
WordPress Simple Optimizer plugin <= 1.2.7 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in ChrisHurst Simple Optimizer allows Cross Site Request Forgery. This issue affects Simple Optimizer: from n/a through 1.2.7.
|
[] |
GHSA-c37p-qfh4-9v45
|
Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.