id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
GHSA-p4cc-w597-6cpm
Cryptographically weak PRNG in `utils.generateUUID`
In Brief`utils.generateUUID`, a helper function available in essentially all versions of NodeBB (as far back as v1.0.1 and potentially earlier) used a cryptographically insecure Pseudo-random number generator (`Math.random()`), which meant that a specially crafted script combined with multiple invocations of the password reset functionality could enable an attacker to correctly calculate the reset code for an account they do not have access to.ImpactThis vulnerability impacts all installations of NodeBB. The vulnerability allows for an attacker to take over any account without the involvement of the victim, and as such, the remediation should be applied immediately (either via NodeBB upgrade or cherry-pick of the specific changeset. Patches have been provided for both active branches of NodeBB (v2.x and v1.19.x)—please see below.If you are already on v2.0.0 or v1.19.7, you can upgrade with no ill effects. The new version contains only the patch for this vulnerability.The impact of this vulnerability is slightly lessened by the requirement that the target's email address must be known, **and** user emails are protected values in NodeBB. However, since NodeBB can be configured to display email addresses if the admin so wishes, and as email addresses can often by derived from other sources and/or guessed, the impact of this vulnerability is still fairly high.Patchesv2.xThe vulnerability has been patched in https://github.com/NodeBB/NodeBB/commit/e802fab87f94a13f397f04cfe6068f2f7ddf7888. You can cherry-pick this directly into your codebase.v1.19.xThe vulnerability has been patched in 81e3c1ba488d03371a5ce8d0ebb5c5803026e0f9. You can cherry-pick this directly into your codebase.WorkaroundsThere is no known workaround, but the patch sets listed above will fully patch the vulnerability.References[CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)](http://cwe.mitre.org/data/definitions/338.html)For more informationIf you have any questions or comments about this advisory:Discuss it on [our community forum](community.nodebb.org/)Email us at [support@nodebb.org](mailto:support@nodebb.org)
[]
GHSA-j9jv-927j-jjrm
A vulnerability was found in ualbertalib NEOSDiscovery 1.0.70 and classified as problematic. This issue affects some unknown processing of the file app/views/bookmarks/_refworks.html.erb. The manipulation leads to use of web link to untrusted target with window.opener access. The attack may be initiated remotely. Upgrading to version 1.0.71 is able to address this issue. The name of the patch is abe9f57123e0c278ae190cd7402a623d66c51375. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222287.
[]
CVE-2018-1000658
LimeSurvey version prior to 3.14.4 contains a file upload vulnerability in upload functionality that can result in an attacker gaining code execution via webshell. This attack appear to be exploitable via an authenticated user uploading a zip archive which can contains malicious php files that can be called under certain circumstances. This vulnerability appears to have been fixed in after commit 91d143230eb357260a19c8424b3005deb49a47f7 / version 3.14.4.
[ "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*" ]
GHSA-qf6r-242x-wpg6
python_book V1.0 is vulnerable to Incorrect Access Control, which allows attackers to obtain sensitive information of users with different IDs by modifying the ID parameter.
[]
GHSA-jm92-fqw4-8r6p
An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory, aka 'Windows Update Stack Elevation of Privilege Vulnerability'.
[]
CVE-2022-22197
Junos OS and Junos OS Evolved: An rpd core will be observed with proxy BGP route-target filtering enabled and certain route add and delete event happening
An Operation on a Resource after Expiration or Release vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker with an established BGP session to cause a Denial of Service (DoS). This issue occurs when proxy-generate route-target filtering is enabled, and certain proxy-route add and delete events are happening. This issue affects: Juniper Networks Junos OS All versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S8, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S1; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S2, 20.3R2. Juniper Networks Junos OS Evolved All versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R3-EVO; 20.3 versions prior to 20.3R2-EVO.
[ "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.1:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos_os_evolved:20.3:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s12:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*" ]
CVE-2023-1574
Information disclosure in the user creation feature of a MSSQL data source in Devolutions Remote Desktop Manager 2023.1.9 and below on Windows allows an attacker with access to the user interface to obtain sensitive information via the error message dialog that displays the password in clear text.
[ "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:windows:*:*" ]
GHSA-vgv5-c6v7-9jrc
The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows attackers to bypass safe mode and read files via a file:// request containing null characters.
[]
CVE-2023-28246
Windows Registry Elevation of Privilege Vulnerability
Windows Registry Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
GHSA-6mmf-qm37-pmgg
Duplicate Advisory: Pimcore vulnerable to Reflected XSS in Predefined Properties module in Settings
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of [GHSA-7r35-chv4-xr3r](https://github.com/advisories/GHSA-7r35-chv4-xr3r). This link is maintained ot preserve external references.Original DescriptionCross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.20.
[]
GHSA-q9g6-jf2g-r26w
A branch/tag name confusion in GitLab CE/EE affecting all versions prior to 15.2.5, 15.3 prior to 15.3.4, and 15.4 prior to 15.4.1 allows an attacker to manipulate pages where the content of the default branch would be expected.
[]
GHSA-7vmw-m77g-4fxf
In the Linux kernel, the following vulnerability has been resolved:vhost_task: Handle SIGKILL by flushing work and exitingInstead of lingering until the device is closed, this has us handle SIGKILL by:marking the worker as killed so we no longer try to use it with new virtqueues and new flush operations.setting the virtqueue to worker mapping so no new works are queued.running all the exiting works.
[]
CVE-2018-14670
Incorrect configuration in deb package in ClickHouse before 1.1.54131 could lead to unauthorized use of the database.
[ "cpe:2.3:a:yandex:clickhouse:*:*:*:*:*:*:*:*" ]
GHSA-p2pf-g8cq-3gq5
teler-waf contains detection rule bypass via Entities payload
Descriptionteler-waf is a Go HTTP middleware that provides teler IDS functionality to protect against web-based attacks. teler-waf prior to version v0.2.0 is vulnerable to a bypass attack when a specific case-sensitive hex entities payload with special characters such as CR/LF and horizontal tab is used. This vulnerability allows an attacker to execute arbitrary JavaScript code on the victim's browser and compromise the security of the web application.ImpactAn attacker can exploit this vulnerability to bypass common web attack threat rules in teler-waf and launch cross-site scripting (XSS) attacks. The attacker can execute arbitrary JavaScript code on the victim's browser and steal sensitive information, such as login credentials and session tokens, or take control of the victim's browser and perform malicious actions.PatchesVersion [v0.2.0](https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0) includes a patch for this vulnerability.WorkaroundsWe advised updating their installations to version v0.2.0 and frontwards immediately.
[]
CVE-2024-12812
WP ERP < 1.13.4 - Custom+ Unauthorized Access to Terminated Employee Information
The WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting WordPress plugin before 1.13.4 has an issue where employees can manipulate parameters to access the data of terminated employees.
[]
CVE-2005-0932
Multiple SQL injection vulnerabilities in phpCOIN 1.2.1b and earlier allow remote attackers to execute arbitrary SQL commands (1) via the search engine, (2) the username or email fields in the "forgotten password" feature, or (3) the domain name in a package order.
[ "cpe:2.3:a:coinsoft_technologies:phpcoin:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:coinsoft_technologies:phpcoin:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:coinsoft_technologies:phpcoin:1.2.1b:*:*:*:*:*:*:*" ]
CVE-2012-1706
Unspecified vulnerability in the Oracle FLEXCUBE Direct Banking component in Oracle Financial Services Software 5.0.2, 5.3.0 through 5.3.4, 6.0.1, and 6.2.0 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Logging.
[ "cpe:2.3:a:oracle:financial_services_software:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_software:6.2.0:*:*:*:*:*:*:*" ]
CVE-2021-24371
RSVPMaker < 8.7.3 - Authenticated (admin+) SSRF
The Import feature of the RSVPMaker WordPress plugin before 8.7.3 (/wp-admin/tools.php?page=rsvpmaker_export_screen) takes an URL input and calls curl on it, without first validating it to ensure it's a remote one. As a result, a high privilege user could use that feature to scan the internal network via a SSRF attack.
[ "cpe:2.3:a:carrcommunications:rsvpmaker:*:*:*:*:*:wordpress:*:*" ]
CVE-2017-1000484
By linking to a specific url in Plone 2.5-5.1rc1 with a parameter, an attacker could send you to his own website. On its own this is not so bad: the attacker could more easily link directly to his own website instead. But in combination with another attack, you could be sent to the Plone login form and login, then get redirected to the specific url, and then get a second redirect to the attacker website. (The specific url can be seen by inspecting the hotfix code, but we don't want to make it too easy for attackers by spelling it out here.)
[ "cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:3.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:4.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.1:a1:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.1:a2:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.1:b2:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.1:b3:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.1:b4:*:*:*:*:*:*", "cpe:2.3:a:plone:plone:5.1:rc1:*:*:*:*:*:*" ]
GHSA-mjvw-frxx-6hm5
The caching invalidation guidelines from the AMD-Vi specification (48882—Rev 3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction (see stale DMA mappings) if some fields of the DTE are updated but the IOMMU TLB is not flushed.Such stale DMA mappings can point to memory ranges not owned by the guest, thus allowing access to unindented memory regions.
[]
CVE-2012-5190
Prizm Content Connect 5.1 has an Arbitrary File Upload Vulnerability
[ "cpe:2.3:a:accusoft:prizm_content_connect:5.1:*:*:*:*:*:*:*" ]
CVE-2018-20645
PHP Scripts Mall Basic B2B Script 2.0.9 has HTML injection via the First Name or Last Name field.
[ "cpe:2.3:a:basic_b2b_script_project:basic_b2b_script:2.0.9:*:*:*:*:*:*:*" ]
GHSA-vfh6-97gq-4gwj
Live Helper Chat before 3.44v allows stored XSS in chat messages with an operator via BBCode.
[]
CVE-2014-0407
Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.20, 4.0.22, 4.1.30, 4.2.20, and 4.3.4 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core, a different vulnerability than CVE-2014-0405.
[ "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.1.26:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:3.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:vm_virtualbox:4.0.18:*:*:*:*:*:*:*" ]
CVE-2024-9782
D-Link DIR-619L B1 formEasySetupWWConfig buffer overflow
A vulnerability was found in D-Link DIR-619L B1 2.06. It has been declared as critical. This vulnerability affects the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:h:d-link:dir-619l_b1:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-619l_firmware:2.06:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*" ]
CVE-2015-3181
files/externallib.php in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 does not consider the moodle/user:manageownfiles capability before approving a private-file upload, which allows remote authenticated users to bypass intended file-management restrictions by using web services to perform uploads after this capability has been revoked.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.8.5:*:*:*:*:*:*:*" ]
GHSA-hg4q-qffw-jqg4
Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
[]
GHSA-4j9g-hqrw-w86v
CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a implements an incorrect exception type when an illegal virtual address is loaded.
[]
GHSA-m8cf-5cgm-249r
Windows Hyper-V Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33758.
[]
GHSA-2mcp-f38w-p5gf
A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs.The bug may be used by an unprivileged user to read the contents of files to which they would not otherwise have access, such as the local password database.
[]
CVE-2019-13218
Division by zero in the predict_point function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
[ "cpe:2.3:a:stb_vorbis_project:stb_vorbis:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
GHSA-vwrx-67m6-2266
VMware Aria Operations contains a Local privilege escalation vulnerability. A malicious actor with administrative privileges in the Aria Operations application can gain root access to the underlying operating system.
[]
GHSA-w267-2gcr-ggcp
When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.
[]
GHSA-8h7r-v8v3-6p7w
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability via unknown vectors related to Kernel, a different vulnerability than CVE-2012-0098.
[]
GHSA-c3vv-p7mp-g6xv
IOAcceleratorFamily in Apple OS X before 10.10.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-3706.
[]
GHSA-jmp3-vh9c-94m8
Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
[]
GHSA-73h6-jqm3-v68r
An issue was discovered in Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2. XSS exists in /netflow/jspui/userManagementForm.jsp via these GET parameters: authMeth, passWord, pwd1, and userName.
[]
CVE-2022-0110
Incorrect security UI in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
CVE-2019-0654
A spoofing vulnerability exists when Microsoft browsers improperly handles specific redirects, aka 'Microsoft Browser Spoofing Vulnerability'.
[ "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2023-45577
Stack Overflow vulnerability in D-Link device DI-7003GV2.D1 v.23.08.25D1 and before, DI-7100G+V2.D1 v.23.08.23D1 and before, DI-7100GV2.D1 v.23.08.23D1, DI-7200G+V2.D1 v.23.08.23D1 and before, DI-7200GV2.E1 v.23.08.23E1 and before, DI-7300G+V2.D1 v.23.08.23D1, and DI-7400G+V2.D1 v.23.08.23D1 and before allows a remote attacker to execute arbitrary code via the wanid parameter of the H5/speedlimit.data function.
[ "cpe:2.3:o:d-link:di-7003gv2.d1:*:*:*:*:*:*:*:*", "cpe:2.3:a:d-link:di-7200g_plus_v2.d1:*:*:*:*:*:*:*:*", "cpe:2.3:a:d-link:di-7100gv2.d1:*:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:di-7200gv2.e1:*:*:*:*:*:*:*:*", "cpe:2.3:a:d-link:di-7300g_plus_v2.d1:*:*:*:*:*:*:*:*", "cpe:2.3:h:d-link:di-7400g_plus_v2.d1:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:di-7003g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-7003g:v2.d1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:di-7100g\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-7100g\\+:v2.d1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:di-7100g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-7100g:v2.d1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:di-7200g\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-7200g\\+:v2.d1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:di-7200g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-7200g:v2.e1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:di-7300g\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-7300g\\+:v2.d1:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:di-7400g\\+_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:di-7400g\\+:v2.d1:*:*:*:*:*:*:*" ]
GHSA-3rxp-2593-q684
IBM Engineering products are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 190566.
[]
CVE-2020-1640
Junos OS: Receipt of certain genuine BGP packets from any BGP Speaker causes RPD to crash.
An improper use of a validation framework when processing incoming genuine BGP packets within Juniper Networks RPD (routing protocols process) daemon allows an attacker to crash RPD thereby causing a Denial of Service (DoS) condition. This framework requires these packets to be passed. By continuously sending any of these types of formatted genuine packets, an attacker can repeatedly crash the RPD process causing a sustained Denial of Service. Authentication to the BGP peer is not required. This issue can be initiated or propagated through eBGP and iBGP and can impact devices in either modes of use as long as the devices are configured to support the compromised framework and a BGP path is activated or active. This issue affects: Juniper Networks Junos OS 16.1 versions 16.1R7-S6 and later versions prior to 16.1R7-S8; 17.3 versions 17.3R2-S5, 17.3R3-S6 and later versions prior to 17.3R3-S8; 17.4 versions 17.4R2-S7, 17.4R3 and later versions prior to 17.4R2-S11, 17.4R3-S2; 18.1 versions 18.1R3-S7 and later versions prior to 18.1R3-S10; 18.2 versions 18.2R2-S6, 18.2R3-S2 and later versions prior to 18.2R2-S7, 18.2R3-S5; 18.2X75 versions 18.2X75-D12, 18.2X75-D32, 18.2X75-D33, 18.2X75-D51, 18.2X75-D60, 18.2X75-D411, 18.2X75-D420 and later versions prior to 18.2X75-D32, 18.2X75-D33, 18.2X75-D420, 18.2X75-D52, 18.2X75-D60, 18.2X75-D65, 18.2X75-D70;(*1) 18.3 versions 18.3R1-S6, 18.3R2-S3, 18.3R3 and later versions prior to 18.3R2-S4, 18.3R3-S2; 18.4 versions 18.4R1-S5, 18.4R2-S4, 18.4R3 and later versions prior to 18.4R1-S7, 18.4R2-S5, 18.4R3-S3(*2); 19.1 versions 19.1R1-S3, 19.1R2 and later versions prior to 19.1R1-S5, 19.1R2-S2, 19.1R3-S2; 19.2 versions 19.2R1-S2, 19.2R2 and later versions prior to 19.2R1-S5, 19.2R2, 19.2R3; 19.3 versions prior to 19.3R2-S3, 19.3R3; 19.4 versions prior to 19.4R1-S2, 19.4R2, 19.4R3; 20.1 versions prior to 20.1R1-S1, 20.1R2. This issue does not affect Junos OS prior to 16.1R1. This issue affects IPv4 and IPv6 traffic.
[ "cpe:2.3:o:juniper:junos:16.1:r7-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1:r7-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2x75:d12:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2x75:d411:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2x75:d51:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*" ]
CVE-2018-4200
An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers a WebCore::jsElementScrollHeightGetter use-after-free.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
CVE-2023-32767
The web interface of Symcon IP-Symcon before 6.3 (i.e., before 2023-05-12) allows a remote attacker to read sensitive files via .. directory-traversal sequences in the URL.
[ "cpe:2.3:a:symcon:ip_symcon:*:*:*:*:*:*:*:*" ]
GHSA-rpm9-4hwq-7f64
Information Disclosure in API in Replicated Replicated Classic versions prior to 2.53.1 on all platforms allows authenticated users with Admin Console access to retrieve sensitive data, including application secrets, via accessing container definitions with environment variables through the Admin Console API on port 8800.This CVE was originally reserved in 2021 and later publicly disclosed by Replicated on their website on 21 October 2021. However, it mistakenly remained in the Reserved But Public (RBP) status with the CVE Numbering Authority (CNA). Please note that this product reached its end of life on 31 December 2024. Publishing this CVE with the CNA was required to comply with CNA rules, despite the fact that the issue was disclosed and fixed four years ago, and the affected product is no longer supported as of 2024.Summary of VulnerabilityThis advisory discloses a low severity security vulnerability in the versions of Replicated Classic listed above (“Affected Replicated Classic Versions”)DescriptionReplicated Classic versions prior to 2.53.1 have an authenticated API from the Replicated Admin Console that may expose sensitive data including application secrets, depending on how the application manifests are written. A user with valid credentials and access to the Admin Console port (8800) on the Replicated Classic server can retrieve container definitions including environment variables which may contain passwords and other secrets depending on how the application is configured.This data is shared over authenticated sessions to the Admin Console only, and was never displayed or used in the application processing. To remediate this issue, we removed the sensitive data from the API, sending only the data to the Admin Console that was needed.TimelineThis issue was discovered during a security review on 16 September 2021. Patched versions were released on 23 September 2021. This advisory was published on 21 October 2021.The CVE Numbering Authority (CNA) notified Replicated on 23 January 2025 that the CVE was still in Reserved But Public (RBP) status. Upon discovering the oversight in updating the status to published with the CNA, Replicated submitted the updated report on the same day, 23 January 2025.
[]
CVE-2013-1236
Cisco TelePresence Supervisor MSE 8050 before 2.3(1.31) allows remote attackers to cause a denial of service (CPU consumption or device reload) by establishing TCP connections at a high rate, aka Bug IDs CSCuf76076 and CSCuf79763.
[ "cpe:2.3:a:cisco:telepresence_supervisor_mse_8050_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:telepresence_supervisor_mse_8050:-:*:*:*:*:*:*:*" ]
GHSA-pg87-372g-hvgc
Tuxera NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur allowing for code execution and escalation of privileges.
[]
GHSA-3257-3x3f-wr7h
The mintToken function of a smart contract implementation for JustDCoin (JustD), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
CVE-2025-3479
Forminator <= 1.42.0 - Order Replay Vulnerability
The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Order Replay in all versions up to, and including, 1.42.0 via the 'handle_stripe_single' function due to insufficient validation on a user controlled key. This makes it possible for unauthenticated attackers to reuse a single Stripe PaymentIntent for multiple transactions. Only the first transaction is processed via Stripe, but the plugin sends a successful email message for each transaction, which may trick an administrator into fulfilling each order.
[]
GHSA-v2j9-943x-2mr8
PHP remote file inclusion vulnerability in ch_readalso.php in News Manager 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the read_xml_include parameter.
[]
GHSA-m7mr-jwvj-gjjr
Information disclosure vulnerability in Netatmo Indoor Module firmware 100 and earlier.
[]
GHSA-c7pv-p336-6hqg
RockOA V1.9.8 is affected by a cross-site scripting (XSS) vulnerability which allows remote attackers to send malicious code to the administrator and execute JavaScript code, because webmain/flow/input/mode_emailmAction.php does not perform strict filtering.
[]
GHSA-2m9g-2gcv-g547
Cross-site scripting (XSS) vulnerability in search.html in Search Engine Builder allows remote attackers to inject arbitrary web script or HTML via the searWords parameter.
[]
CVE-2023-38042
A local privilege escalation vulnerability in Ivanti Secure Access Client for Windows allows a low privileged user to execute code as SYSTEM.
[ "cpe:2.3:a:ivanti:secure_access_client:*:*:*:*:*:*:*:*" ]
GHSA-2mxj-pg8q-6c2c
The Side Menu Lite WordPress plugin before 2.2.6 does not sanitise user input from the List page in the admin dashboard before using it in SQL statement, leading to a SQL Injection issue
[]
GHSA-2mgm-8w3p-2gr4
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
CVE-2024-44117
Multiple vulnerabilities in SAP NetWeaver Application Server for ABAP and ABAP Platform
The RFC enabled function module allows a low privileged user to perform various actions, such as modifying the URLs of any user's favourite nodes and workbook ID. There is low impact on integrity and availability of the application.
[]
CVE-2019-6734
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit PhantomPDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the setInterval method. By performing actions in JavaScript, an attacker can cause a pointer to be reused after it has been freed. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7452.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2019-2632
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" ]
CVE-2024-24753
Bref Multiple Value Headers Not Supported in ApiGatewayFormatV2
Bref enable serverless PHP on AWS Lambda. When Bref is used in combination with an API Gateway with the v2 format, it does not handle multiple values headers. If PHP generates a response with two headers having the same key but different values only the latest one is kept. If an application relies on multiple headers with the same key being set for security reasons, then Bref would lower the application security. For example, if an application sets multiple `Content-Security-Policy` headers, then Bref would just reflect the latest one. This vulnerability is patched in 2.1.13.
[ "cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*" ]
CVE-2022-4413
Cross-site Scripting (XSS) - Reflected in nuxt/framework
Cross-site Scripting (XSS) - Reflected in GitHub repository nuxt/framework prior to v3.0.0-rc.13.
[ "cpe:2.3:a:nuxt:framework:3.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc10:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc11:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc12:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc7:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc8:*:*:*:*:*:*", "cpe:2.3:a:nuxt:framework:3.0.0:rc9:*:*:*:*:*:*" ]
GHSA-w4hx-6h4x-fcmw
An elevation of privilege vulnerability in the Qualcomm kyro L2 driver. Product: Android. Versions: Android kernel. Android ID: A-32831370. References: QC-CR#1103158.
[]
GHSA-rjqw-qqh7-82cw
Pedro Lineu Orso chetcpasswd 2.3.3 does not have a rate limit for client requests, which might allow remote attackers to determine passwords via a dictionary attack.
[]
GHSA-5hqv-5j7f-95hv
Dell EMC RecoverPoint versions prior to 5.1.2.1 and RecoverPoint for VMs versions prior to 5.2.0.2 contain an information disclosure vulnerability. A malicious boxmgmt user may potentially be able to determine the existence of any system file via Boxmgmt CLI.
[]
CVE-2010-4390
Multiple heap-based buffer overflows in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and Linux RealPlayer 11.0.2.1744 allow remote attackers to have an unspecified impact via a crafted header in an IVR file.
[ "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2020-9280
In SilverStripe through 4.5, files uploaded via Forms to folders migrated from Silverstripe CMS 3.x may be put to the default "/Uploads" folder instead. This affects installations which allowed upload folder protection via the optional silverstripe/secureassets module under 3.x. This module is installed and enabled by default on the Common Web Platform (CWP). The vulnerability only affects files uploaded after an upgrade to 4.x.
[ "cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*" ]
GHSA-9357-fg29-22cv
Mobile Safari in Apple iOS before 7 does not prevent HTML interpretation of a document served with a text/plain content type, which allows remote attackers to conduct cross-site scripting (XSS) attacks by uploading a file.
[]
CVE-2022-35788
Azure Site Recovery Elevation of Privilege Vulnerability
Azure Site Recovery Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:azure_site_recovery_vmware_to_azure:*:*:*:*:*:*:*:*" ]
GHSA-x659-43vv-626r
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of HTML files to PDF. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9591.
[]
GHSA-3h64-25x5-v8wv
Multiple SQL injection vulnerabilities in Blogs Manager 1.101 and earlier allow remote attackers to execute arbitrary SQL commands via the SearchField parameter in a search action to (1) _authors_list.php, (2) _blogs_list.php, (3) _category_list.php, (4) _comments_list.php, (5) _policy_list.php, (6) _rate_list.php, (7) categoriesblogs_list.php, (8) chosen_authors_list.php, (9) chosen_blogs_list.php, (10) chosen_comments_list.php, and (11) help_list.php in blogs/.
[]
GHSA-6r63-93f2-chm5
Book Store Management System v1.0 was discovered to contain hardcoded credentials which allows attackers to escalate privileges and access the admin panel.
[]
CVE-2016-10788
cPanel before 60.0.25 allows arbitrary code execution via Maketext in PostgreSQL adminbin (SEC-188).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
GHSA-cgcv-jfr4-p5gq
An undisclosed traffic pattern received by a BIG-IP Virtual Server with TCP Fast Open enabled may cause the Traffic Management Microkernel (TMM) to restart, resulting in a Denial-of-Service (DoS).
[]
CVE-2022-24419
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution during SMM.
[ "cpe:2.3:o:dell:alienware_13_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_13_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_15_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_15_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_15_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_15_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_17_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_17_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_17_r5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_17_r5:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_area_51m_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r8:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:edge_gateway_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:edge_gateway_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:edge_gateway_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:edge_gateway_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:edge_gateway_5100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:edge_gateway_5100:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:embedded_box_pc_3000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:embedded_box_pc_3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:embedded_box_pc_5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_14_3473_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_14_3473:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3573_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3573:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_5566_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_5566:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3277_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3277:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3465_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3465:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3477_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3477:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3482_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3482:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3565_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3565:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3782_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3782:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3379_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3379:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_14_5468_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_14_5468:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_15_5568_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_15_5568:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3267_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3267:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3268_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3268:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3572_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3572:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3582_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3582:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3660_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3660:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3667_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3667:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3668_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3668:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3669_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3669:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_7040_thin_client_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_7040_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8930_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8930:-:*:*:*:*:*:*:*" ]
GHSA-c39h-g3mf-r3mh
A Prototype Pollution issue in getsetprop 1.1.0 allows an attacker to execute arbitrary code via global.accessor.
[]
CVE-2014-7423
The Youth Incorporated (aka com.magzter.youthincorporated) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:magzter:youth_incorporated:3:*:*:*:*:android:*:*" ]
CVE-2019-5686
NVIDIA Windows GPU Display Driver (all versions) contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software uses an API function or data structure in a way that relies on properties that are not always guaranteed to be valid, which may lead to denial of service.
[ "cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-83r8-p8v6-6gfm
Slock<T> allows sending non-Send types across thread boundaries
`Slock<T>` unconditionally implements `Send`/`Sync`.Affected versions of this crate allows sending non-Send types to other threads, which can lead to data races and memory corruption due to the data race.
[]
GHSA-45m9-cx5g-fv72
Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Deployment.
[]
CVE-2020-11963
IQrouter through 3.3.1, when unconfigured, has multiple remote code execution vulnerabilities in the web-panel because of Bash Shell Metacharacter Injection. Note: The vendor claims that this vulnerability can only occur on a brand-new network that, after initiating the forced initial configuration (which has a required step for setting a secure password on the system), makes this CVE invalid. This vulnerability is “true for any unconfigured release of OpenWRT, and true of many other new Linux distros prior to being configured for the first time”
[ "cpe:2.3:o:evenroute:iqrouter_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:evenroute:iqrouter:-:*:*:*:*:*:*:*" ]
CVE-2017-17907
PHP Scripts Mall Car Rental Script has XSS via the admin/areaedit.php carid parameter or the admin/sitesettings.php websitename parameter.
[ "cpe:2.3:a:car_rental_script_project:car_rental_script:2.0.8:*:*:*:*:*:*:*" ]
GHSA-mq93-f783-wcgv
TOTOLINK CA300-POE V6.2c.884_B20180522 was found to contain a command injection vulnerability in the recvUpgradeNewFw function via the fwUrl parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
[]
GHSA-3932-xh88-q34x
LPPlus creates the lpdprocess file with world-writeable permissions, which allows local users to kill arbitrary processes by specifying an alternate process ID and using the setuid dcclpdshut program to kill the process that was specified in the lpdprocess file.
[]
CVE-2018-6906
A persistent Cross Site Scripting (XSS) vulnerability in the Green Electronics RainMachine Mini-8 (2nd Generation) and Touch HD 12 web application allows an attacker to inject arbitrary JavaScript via the REST API.
[ "cpe:2.3:a:rainmachine:rainmachine_web_application:-:*:*:*:*:*:*:*" ]
GHSA-x989-xh8p-mqvh
The WP Prayer WordPress plugin through 2.0.9 does not have CSRF check in place when updating its email settings, which could allow attackers to make a logged in admin change them via a CSRF attack
[]
CVE-2007-5212
Multiple cross-site scripting (XSS) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware before 2.43 allow remote attackers to inject arbitrary web script or HTML via (1) parameters associated with saved settings, as demonstrated by the conf_SMTP_MailServer1 parameter to ServerManager.srv; or (2) the subpage parameter to wizard/first/wizard_main_first.shtml. NOTE: an attacker can leverage a CSRF vulnerability to modify saved settings.
[ "cpe:2.3:h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*", "cpe:2.3:h:axis:2100_network_camera_firmware:*:*:*:*:*:*:*:*" ]
GHSA-95hj-vv2p-554x
A CSRF vulnerability exists in the Web File Manager's Edit Accounts functionality of Rumpus FTP Server 8.2.9.1. By exploiting it, an attacker can take over a user account by changing the password, update users' details, and escalate privileges via RAPR/DefineUsersSet.html.
[]
CVE-2018-1000659
LimeSurvey version 3.14.4 and earlier contains a directory traversal in file upload that allows upload of webshell vulnerability in file upload functionality that can result in remote code execution as authenticated user. This attack appear to be exploitable via An authenticated user can upload a specially crafted zip file to get remote code execution. This vulnerability appears to have been fixed in after commit 72a02ebaaf95a80e26127ee7ee2b123cccce05a7 / version 3.14.4.
[ "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*" ]
GHSA-846c-pcw3-c872
A vulnerability in the log subscription subsystem of the Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. The vulnerability is due to insufficient validation of user-supplied input on the web and command-line interface. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root.
[]
CVE-2025-0986
IBM PowerVM Hypervisor data manipulation
IBM PowerVM Hypervisor FW1050.00 through FW1050.30 and FW1060.00 through FW1060.20 could allow a local user, under certain Linux processor combability mode configurations, to cause undetected data loss or errors when performing gzip compression using HW acceleration.
[ "cpe:2.3:o:ibm:power9_system_firmware:fw1050.00:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:power9_system_firmware:fw1050.30:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:power9_system_firmware:fw1060.00:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:power9_system_firmware:fw1060.20:*:*:*:*:*:*:*" ]
GHSA-4h89-3mvx-g39h
A vulnerability, which was classified as critical, has been found in code-projects Staff Audit System 1.0. This issue affects some unknown processing of the file /search_index.php. The manipulation of the argument Search leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-4vrg-7q5p-xvrr
Incorrect default permissions for some Intel(R) Advisor software before version 2024.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
CVE-2023-46313
WordPress Zotpress Plugin <= 7.3.4 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Katie Seaborn Zotpress plugin <= 7.3.4 versions.
[ "cpe:2.3:a:katieseaborn:zotpress:*:*:*:*:*:wordpress:*:*" ]
GHSA-cq3j-jr55-f9fq
admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code.
[]
CVE-2022-23633
Exposure of sensitive information in Action Pack
Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.
[ "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
CVE-2022-28607
An issue was discovered in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to gain sensitive information via the action parameter to /system/user/modules/mod_users/controller.php.
[ "cpe:2.3:a:isic.lk_project:isic.lk:*:*:*:*:*:*:*:*" ]
CVE-2025-2484
Multi Video Box <= 1.5.2 - Reflected Cross-Site Scripting via video_id and group_id Parameters
The Multi Video Box plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'video_id' and 'group_id' parameters in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
GHSA-g6qm-p3jr-vj64
An incomplete fix for CVE-2020-12662 was shipped for Unbound in Red Hat Enterprise Linux 7, as part of erratum RHSA-2020:2414. Vulnerable versions of Unbound could still amplify an incoming query into a large number of queries directed to a target, even with a lower amplification ratio compared to versions of Unbound that shipped before the mentioned erratum. This issue is about the incomplete fix for CVE-2020-12662, and it does not affect upstream versions of Unbound.
[]
CVE-2025-6323
PHPGurukul Pre-School Enrollment System enrollment.php sql injection
A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0. It has been classified as critical. This affects an unknown part of the file /enrollment.php. The manipulation of the argument fathername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
GHSA-j84j-6hfg-p7h6
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.2.4.0, 10.0.2.0, 10.3.3.0, 10.3.4.0, and 10.3.5.0 allows local users to affect confidentiality, related to WLS Security.
[]