id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2024-38356
|
TinyMCE Cross-Site Scripting (XSS) vulnerability using noneditable_regexp option
|
TinyMCE is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in TinyMCE’s content extraction code. When using the `noneditable_regexp` option, specially crafted HTML attributes containing malicious code were able to be executed when content was extracted from the editor. This vulnerability has been patched in TinyMCE 7.2.0, TinyMCE 6.8.4 and TinyMCE 5.11.0 LTS by ensuring that, when using the `noneditable_regexp` option, any content within an attribute is properly verified to match the configured regular expression before being added. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[] |
GHSA-6gx9-22p7-84wm
|
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.4.9 allow remote attackers to inject arbitrary web script or HTML via (1) <math> tags or (2) Extension or <nowiki> sections that "bypass HTML style attribute restrictions" that are intended to protect against XSS vulnerabilities in Internet Explorer clients.
|
[] |
|
GHSA-62qv-qwj7-9q6x
|
A post authentication command injection vulnerability exists when configuring the wireguard VPN functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection . An attacker can make an authenticated HTTP request to trigger this vulnerability.
|
[] |
|
GHSA-5xv2-q475-rwrh
|
Katello uses hard coded credential
|
The installation script in Katello 1.0 and earlier does not properly generate the `Application.config.secret_token` value, which causes each default installation to have the same secret token, and allows remote attackers to authenticate to the CloudForms System Engine web interface as an arbitrary user by creating a cookie using the default `secret_token`.
|
[] |
CVE-2019-7720
|
taocms through 2014-05-24 allows eval injection by placing PHP code in the install.php db_name parameter and then making a config.php request.
|
[
"cpe:2.3:a:taogogo:taocms:*:*:*:*:*:*:*:*"
] |
|
GHSA-6qwv-phcw-fvw8
|
Cross-site scripting (XSS) vulnerability in Kayako SupportSuite 3.50.06 allows remote attackers to inject arbitrary web script or HTML via the subject field in a ticket.
|
[] |
|
CVE-2006-5294
|
Cross-site scripting (XSS) vulnerability in index.php in phplist before 2.10.3 allows remote attackers to inject arbitrary web script or HTML via the unsubscribeemail parameter.
|
[
"cpe:2.3:a:tincan:phplist:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-29972
|
An argument injection vulnerability in the browser-based authentication component of the Magnitude Simba Amazon Redshift ODBC Driver (1.4.14 through 1.4.21.1001 and 1.4.22 through 1.4.x before 1.4.52) may allow a local user to execute arbitrary code.
|
[
"cpe:2.3:a:insightsoftware:magnitude_simba_amazon_redshift_odbc_driver:*:*:*:*:*:*:*:*"
] |
|
GHSA-j4vm-fm5v-hp47
|
There is a improper input validation vulnerability in some Huawei Smartphone.Successful exploit of this vulnerability can cause memory access errors and denial of service.
|
[] |
|
CVE-2024-8890
|
Insertion of Sensitive Information Into Sent Data vulnerability on CIRCUTOR Q-SMT
|
An attacker with access to the network where the CIRCUTOR Q-SMT is located in its firmware version 1.0.4, could obtain legitimate credentials or steal sessions due to the fact that the device only implements the HTTP protocol. This fact prevents a secure communication channel from being established.
|
[
"cpe:2.3:o:circutor:q-smt_firmware:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:h:circutor:q-smt:-:*:*:*:*:*:*:*"
] |
GHSA-xfmg-272h-3c38
|
Unspecified vulnerability in the OS-Core.CORE2-KRN fileset in HP HP-UX B.11.23 and B.11.31 allows local users to cause a denial of service via unknown vectors.
|
[] |
|
GHSA-6gqw-9w99-v9gq
|
Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.
|
[] |
|
GHSA-j9fh-rgr3-3jq5
|
Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted SSL handshake.
|
[] |
|
GHSA-w39x-q2hf-mc75
|
There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance.
|
[] |
|
CVE-2021-25093
|
Link Library < 7.2.8 - Unauthenticated Arbitrary Links Deletion
|
The Link Library WordPress plugin before 7.2.8 does not have authorisation in place when deleting links, allowing unauthenticated users to delete arbitrary links via a crafted request
|
[
"cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*"
] |
CVE-2018-16767
|
In WAVM through 2018-07-26, a crafted file sent to the WebAssembly Virtual Machine may cause a denial of service (application crash) or possibly have unspecified other impact because of an unspecified "heap-buffer-overflow" condition in FunctionValidationContext::popAndValidateOperand.
|
[
"cpe:2.3:a:webassembly_virtual_machine_project:webassembly_virtual_machine:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-47169
|
Microsoft Word Remote Code Execution Vulnerability
|
Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally.
|
[] |
GHSA-fmgr-4m8w-g72q
|
Simple PHP Blog (sphpBlog) 0.4.0 allows remote attackers to obtain sensitive information via a direct request to sb_functions.php, which leaks the full pathname in a PHP error message.
|
[] |
|
CVE-2010-1975
|
PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, and 8.4 before 8.4.4 does not properly check privileges during certain RESET ALL operations, which allows remote authenticated users to remove arbitrary parameter settings via a (1) ALTER USER or (2) ALTER DATABASE statement.
|
[
"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.0:beta1:*:*:*:*:*:*"
] |
|
GHSA-jgvj-mgv6-79x3
|
The web configuration interface for Catalyst 3500 XL switches allows remote attackers to execute arbitrary commands without authentication when the enable password is not set, via a URL containing the /exec/ directory.
|
[] |
|
GHSA-6p2h-8jgw-4php
|
Unknown vulnerability in Veritas i3 Focalpoint Server 7.1 and earlier has unknown attack vectors and unknown but "critical" impact.
|
[] |
|
GHSA-pxq6-8799-5v2r
|
The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection, therefore making it possible for low-level users, such as subscribers, to install and activate the SendWP Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 and retrieve the client_secret key needed to establish the SendWP connection while also installing the SendWP plugin.
|
[] |
|
CVE-2014-9901
|
The Qualcomm Wi-Fi driver in Android before 2016-08-05 on Nexus 7 (2013) devices makes incorrect snprintf calls, which allows remote attackers to cause a denial of service (device hang or reboot) via crafted frames, aka Android internal bug 28670333 and Qualcomm internal bug CR548711.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
GHSA-348q-695g-g2w8
|
A Stack-based Buffer Overflow (CWE-121) vulnerability exists in Eurotherm by Schneider Electric GUIcon V2.0 (Gold Build 683.0) which could cause remote code to be executed when parsing a GD1 file
|
[] |
|
GHSA-5854-jvxx-2cg9
|
Denial of Service in subtext
|
Versions of `subtext` >=4.1.0 are vulnerable to Denial of Service. The Content-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.RecommendationThis package is deprecated and is now maintained as `@hapi/subtext`. Please update your dependencies to use `@hapi/subtext`.
|
[] |
CVE-2025-32105
|
A buffer overflow in the the Sangoma IMG2020 HTTP server through 2.3.9.6 allows an unauthenticated user to achieve remote code execution.
|
[] |
|
CVE-2023-3539
|
SimplePHPscripts Simple Forum PHP URL Parameter preview.php cross site scripting
|
A vulnerability, which was classified as problematic, has been found in SimplePHPscripts Simple Forum PHP 2.7. This issue affects some unknown processing of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-233291.
|
[
"cpe:2.3:a:simplephpscripts:simple_forum_php:2.7:*:*:*:*:*:*:*"
] |
CVE-2024-35955
|
kprobes: Fix possible use-after-free issue on kprobe registration
|
In the Linux kernel, the following vulnerability has been resolved:
kprobes: Fix possible use-after-free issue on kprobe registration
When unloading a module, its state is changing MODULE_STATE_LIVE ->
MODULE_STATE_GOING -> MODULE_STATE_UNFORMED. Each change will take
a time. `is_module_text_address()` and `__module_text_address()`
works with MODULE_STATE_LIVE and MODULE_STATE_GOING.
If we use `is_module_text_address()` and `__module_text_address()`
separately, there is a chance that the first one is succeeded but the
next one is failed because module->state becomes MODULE_STATE_UNFORMED
between those operations.
In `check_kprobe_address_safe()`, if the second `__module_text_address()`
is failed, that is ignored because it expected a kernel_text address.
But it may have failed simply because module->state has been changed
to MODULE_STATE_UNFORMED. In this case, arm_kprobe() will try to modify
non-exist module text address (use-after-free).
To fix this problem, we should not use separated `is_module_text_address()`
and `__module_text_address()`, but use only `__module_text_address()`
once and do `try_module_get(module)` which is only available with
MODULE_STATE_LIVE.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-jf7x-r4m4-rqc9
|
IBM Business Automation Workflow and IBM Business Process Manager (IBM Business Process Manager Express 8.5.5, 8.5.6, 8.5.7, and 8.6) could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 182716.
|
[] |
|
GHSA-wjjf-7mc6-rgrr
|
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
|
[] |
|
CVE-2021-0460
|
In the FingerTipS touch screen driver, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-156739245
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-33004
|
The affected product is vulnerable to memory corruption condition due to lack of proper validation of user supplied files, which may allow an attacker to execute arbitrary code. User interaction is required on the WebAccess HMI Designer (versions 2.1.9.95 and prior).
|
[
"cpe:2.3:a:advantech:webaccess\\/hmi_designer:*:*:*:*:*:*:*:*"
] |
|
GHSA-hmm7-39qh-h2pq
|
Project Worlds Online Examination System 1.0 is affected by Cross Site Scripting (XSS) via account.php.
|
[] |
|
GHSA-948p-87wr-rw9m
|
In BIG-IP versions 17.0.x before 17.0.0.1, 16.1.x before 16.1.3.2, 15.1.x before 15.1.7, 14.1.x before 14.1.5.2, and 13.1.x before 13.1.5.1, when a sideband iRule is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization.
|
[] |
|
CVE-2021-23219
|
NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller, which may allow a user with elevated privileges to access protected information by identifying, exploiting, and loading vulnerable microcode. Such an attack may lead to information disclosure.
|
[
"cpe:2.3:h:nvidia:dgx-1_p100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:dgx-1_v100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:dgx-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:dgx_station_a100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:drive_constellation:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_605:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_625:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_635:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_640:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_705:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_720:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_730:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gt_740:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1050_ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1060:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1070_ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1080:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1080_ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1650_super:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1660:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1660_super:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_1660_ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_645:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_650_ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_650_ti_boost:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_660:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_660_ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_680:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_690:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_745:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_750_ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_760_ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_780:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_780_ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_960:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_970:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_980:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_titan_x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_rtx_2060:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_rtx_2060_super:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_rtx_2070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_rtx_2070_super:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_rtx_2080:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_rtx_2080_super:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_rtx_2080_ti:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:gtx_titan:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:gtx_titan_black:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:gtx_titan_z:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_agx_xavier_16gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_agx_xavier_32gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_agx_xavier_8gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_nano:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_nano:-:*:-:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_nano:-:*:developer_kit:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2_4gb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx2i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:developer_kit:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:production:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvidia_hgx-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvidia_t1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvidia_t2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvidia_t4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvidia_t400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:nvidia_t600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_gv100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m1000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m1200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m2000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m2200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m3000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m4000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m5000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m500m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m5500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m600m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p2200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p3200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p4200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p5200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_p620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_rtx_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_rtx_4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_rtx_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_rtx_6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_rtx_8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_t1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_t2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_t400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_t600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:shield_tv:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:shield_tv_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m60:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_p100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_p4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_p40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_p6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_v100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_v100s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:titan_rtx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:titan_v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:titan_x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:titan_xp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-0010
|
Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office 2016, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, Excel 2016 for Mac, PowerPoint 2016 for Mac, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:excel_for_mac:2011:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel_for_mac:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint_for_mac:2011:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint_for_mac:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_for_mac:2011:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_for_mac:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-7855
|
A CWE-248 Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a Denial of Service when sending invalid breakpoint parameters to the controller over Modbus
|
[
"cpe:2.3:o:schneider-electric:modicon_premium_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_premium:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_quantum_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_quantum:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*"
] |
|
GHSA-xg85-3q5w-8wff
|
The Advanced File Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.2.4 via the 'fma_local_file_system' function. This makes it possible for unauthenticated attackers to extract sensitive data including backups or other sensitive information if the files have been moved to the built-in Trash folder.
|
[] |
|
CVE-2025-22024
|
nfsd: fix management of listener transports
|
In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix management of listener transports
Currently, when no active threads are running, a root user using nfsdctl
command can try to remove a particular listener from the list of previously
added ones, then start the server by increasing the number of threads,
it leads to the following problem:
[ 158.835354] refcount_t: addition on 0; use-after-free.
[ 158.835603] WARNING: CPU: 2 PID: 9145 at lib/refcount.c:25 refcount_warn_saturate+0x160/0x1a0
[ 158.836017] Modules linked in: rpcrdma rdma_cm iw_cm ib_cm ib_core nfsd auth_rpcgss nfs_acl lockd grace overlay isofs uinput snd_seq_dummy snd_hrtimer nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables qrtr sunrpc vfat fat uvcvideo videobuf2_vmalloc videobuf2_memops uvc videobuf2_v4l2 videodev videobuf2_common snd_hda_codec_generic mc e1000e snd_hda_intel snd_intel_dspcfg snd_hda_codec snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer snd soundcore sg loop dm_multipath dm_mod nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vmw_vmci vsock xfs libcrc32c crct10dif_ce ghash_ce vmwgfx sha2_ce sha256_arm64 sr_mod sha1_ce cdrom nvme drm_client_lib drm_ttm_helper ttm nvme_core drm_kms_helper nvme_auth drm fuse
[ 158.840093] CPU: 2 UID: 0 PID: 9145 Comm: nfsd Kdump: loaded Tainted: G B W 6.13.0-rc6+ #7
[ 158.840624] Tainted: [B]=BAD_PAGE, [W]=WARN
[ 158.840802] Hardware name: VMware, Inc. VMware20,1/VBSA, BIOS VMW201.00V.24006586.BA64.2406042154 06/04/2024
[ 158.841220] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[ 158.841563] pc : refcount_warn_saturate+0x160/0x1a0
[ 158.841780] lr : refcount_warn_saturate+0x160/0x1a0
[ 158.842000] sp : ffff800089be7d80
[ 158.842147] x29: ffff800089be7d80 x28: ffff00008e68c148 x27: ffff00008e68c148
[ 158.842492] x26: ffff0002e3b5c000 x25: ffff600011cd1829 x24: ffff00008653c010
[ 158.842832] x23: ffff00008653c000 x22: 1fffe00011cd1829 x21: ffff00008653c028
[ 158.843175] x20: 0000000000000002 x19: ffff00008653c010 x18: 0000000000000000
[ 158.843505] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 158.843836] x14: 0000000000000000 x13: 0000000000000001 x12: ffff600050a26493
[ 158.844143] x11: 1fffe00050a26492 x10: ffff600050a26492 x9 : dfff800000000000
[ 158.844475] x8 : 00009fffaf5d9b6e x7 : ffff000285132493 x6 : 0000000000000001
[ 158.844823] x5 : ffff000285132490 x4 : ffff600050a26493 x3 : ffff8000805e72bc
[ 158.845174] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000098588000
[ 158.845528] Call trace:
[ 158.845658] refcount_warn_saturate+0x160/0x1a0 (P)
[ 158.845894] svc_recv+0x58c/0x680 [sunrpc]
[ 158.846183] nfsd+0x1fc/0x348 [nfsd]
[ 158.846390] kthread+0x274/0x2f8
[ 158.846546] ret_from_fork+0x10/0x20
[ 158.846714] ---[ end trace 0000000000000000 ]---
nfsd_nl_listener_set_doit() would manipulate the list of transports of
server's sv_permsocks and close the specified listener but the other
list of transports (server's sp_xprts list) would not be changed leading
to the problem above.
Instead, determined if the nfsdctl is trying to remove a listener, in
which case, delete all the existing listener transports and re-create
all-but-the-removed ones.
|
[] |
CVE-2022-33685
|
Unprotected dynamic receiver in Wearable Manager Service prior to SMR Jul-2022 Release 1 allows attacker to launch arbitray activity and access senstive information.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2007-6193
|
The web management interface in Citrix NetScaler 8.0 build 47.8 stores the device's primary IP address in a cookie, which might allow remote attackers to obtain sensitive network configuration information if this address is not the same as the address being used by the web interface.
|
[
"cpe:2.3:a:citrix:netscaler:8.0:build_47.8:*:*:*:*:*:*"
] |
|
GHSA-7559-3vv2-j6vq
|
Multiple cross-site request forgery (CSRF) vulnerabilities in Omeka before 2.2.1 allow remote attackers to hijack the authentication of administrators for requests that (1) add a new super user account via a request to admin/users/add, (2) insert cross-site scripting (XSS) sequences via the api_key_label parameter to admin/users/api-keys/1, or (3) disable file validation via a request to admin/settings/edit-security.
|
[] |
|
GHSA-58gq-pfvp-f697
|
Unspecified vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager component in Oracle Commerce Platform 3.0.2, 3.1.1, 3.1.2, 11.0, and 11.1 allows remote attackers to affect confidentiality via unknown vectors related to Content Acquisition System.
|
[] |
|
CVE-2025-30140
|
An issue was discovered on G-Net Dashcam BB GONX devices. A Public Domain name is Used for the Internal Domain Name. It uses an unregistered public domain name as an internal domain, creating a security risk. This domain was not owned by GNET originally, allowing an attacker to register it and potentially intercept sensitive device traffic (it has since been registered by the vulnerability discoverer). If the dashcam or related services attempt to resolve this domain over the public Internet instead of locally, it could lead to data exfiltration or man-in-the-middle attacks.
|
[] |
|
CVE-2024-48707
|
Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under (a) action=add or action=edit within managemilestone.php file and (b) action=addpro within admin.php file.
|
[
"cpe:2.3:a:o-dyn:collabtive:*:*:*:*:*:*:*:*",
"cpe:2.3:a:o-dyn:collabtive:3.1:*:*:*:*:*:*:*"
] |
|
CVE-2018-1175
|
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 9.0.0.29935. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the interactive attribute of PrintParams objects. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-5438.
|
[
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] |
|
GHSA-c8h3-977p-ch8j
|
Buffer overflow in a third-party compression library (UNACEV2.DLL), as used in avast! Antivirus Home/Professional Edition 4.6.665 and Server Edition 4.6.460, allows remote attackers to execute arbitrary code via an ACE archive containing a long filename.
|
[] |
|
GHSA-4hjc-7286-ffp5
|
Cross-Site Request Forgery (CSRF) vulnerability in elfsight Elfsight Testimonials Slider allows Cross Site Request Forgery. This issue affects Elfsight Testimonials Slider: from n/a through 1.0.1.
|
[] |
|
GHSA-vq6c-fvxw-p45v
|
CSRF vulnerability in Jenkins kubernetes-cd Plugin allow capturing credentials
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[] |
CVE-2025-3312
|
PHPGurukul Men Salon Management System add-customer-services.php sql injection
|
A vulnerability, which was classified as critical, has been found in PHPGurukul Men Salon Management System 1.0. This issue affects some unknown processing of the file /admin/add-customer-services.php. The manipulation of the argument sids[] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] |
CVE-2023-2796
|
EventON < 2.1.2 - Unauthenticated Event Access
|
The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id.
|
[
"cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*"
] |
GHSA-xx69-9jc8-q7jv
|
Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] |
|
GHSA-r98c-rm5p-j4fw
|
Cross-site scripting (XSS) vulnerability in lib/mhtxthtml.pl in MHonArc 2.6.16 allows remote attackers to inject arbitrary web script or HTML via a malformed start tag and end tag for a SCRIPT element, as demonstrated by <scr<body>ipt> and </scr<body>ipt> sequences.
|
[] |
|
CVE-2013-4081
|
The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.6.15:*:*:*:*:*:*:*"
] |
|
GHSA-5qc7-3rq9-3wc2
|
Cross-site scripting (XSS) vulnerability in ViewCat.php in iTechClassifieds 3.0 allows remote attackers to inject arbitrary web script or HTML via the CatID parameter.
|
[] |
|
CVE-2019-20833
|
An issue was discovered in Foxit PhantomPDF before 8.3.10. It has mishandling of cloud credentials, as demonstrated by Google Drive.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-11044
|
link() silently truncates after a null byte on Windows
|
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
|
[
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:securitycenter:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] |
GHSA-qxg4-m824-m377
|
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). An attacker who performs a Man-in-the-Middle attack between the LOGO! BM and other devices could potentially decrypt and modify network traffic.
|
[] |
|
GHSA-r6hg-vfqv-94j7
|
registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the permissions to be world readable.
|
[] |
|
GHSA-c87c-rr2w-6q25
|
contrib/example.php in GeSHi before 1.0.7.3 allows remote attackers to read arbitrary files via the language field without a source field set.
|
[] |
|
CVE-2021-31627
|
Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the index parameter.
|
[
"cpe:2.3:o:tendacn:ac9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac9:3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac9:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-4202
|
A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-0695
|
A denial of service vulnerability in the Android media framework. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37094889.
|
[
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] |
|
GHSA-g25g-gjmh-hgmj
|
A heap-based buffer underwrite exists in ImageStream::getLine() located at Stream.cc in Poppler 0.74.0 that can (for example) be triggered by sending a crafted PDF file to the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
|
[] |
|
GHSA-w924-f8cp-9m63
|
Buffer overflow in RealNetworks RealPlayer 10 and 10.5 allows remote attackers to execute arbitrary code via a crafted image in a RealPlayer Skin (RJS) file. NOTE: due to the lack of details, it is unclear how this is different than CVE-2005-2629 and CVE-2005-2630, but the vendor advisory implies that it is different.
|
[] |
|
GHSA-gvv6-qc64-74pq
|
In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Disable MACsec offload for uplink representor profileMACsec offload is not supported in switchdev mode for uplink
representors. When switching to the uplink representor profile, the
MACsec offload feature must be cleared from the netdevice's features.If left enabled, attempts to add offloads result in a null pointer
dereference, as the uplink representor does not support MACsec offload
even though the feature bit remains set.Clear NETIF_F_HW_MACSEC in mlx5e_fix_uplink_rep_features().Kernel log:Oops: general protection fault, probably for non-canonical address 0xdffffc000000000f: 0000 [#1] SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000078-0x000000000000007f]
CPU: 29 UID: 0 PID: 4714 Comm: ip Not tainted 6.14.0-rc4_for_upstream_debug_2025_03_02_17_35 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:__mutex_lock+0x128/0x1dd0
Code: d0 7c 08 84 d2 0f 85 ad 15 00 00 8b 35 91 5c fe 03 85 f6 75 29 49 8d 7e 60 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 a6 15 00 00 4d 3b 76 60 0f 85 fd 0b 00 00 65 ff
RSP: 0018:ffff888147a4f160 EFLAGS: 00010206
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 000000000000000f RSI: 0000000000000000 RDI: 0000000000000078
RBP: ffff888147a4f2e0 R08: ffffffffa05d2c19 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: dffffc0000000000 R14: 0000000000000018 R15: ffff888152de0000
FS: 00007f855e27d800(0000) GS:ffff88881ee80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004e5768 CR3: 000000013ae7c005 CR4: 0000000000372eb0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
Call Trace:
<TASK>
? die_addr+0x3d/0xa0
? exc_general_protection+0x144/0x220
? asm_exc_general_protection+0x22/0x30
? mlx5e_macsec_add_secy+0xf9/0x700 [mlx5_core]
? __mutex_lock+0x128/0x1dd0
? lockdep_set_lock_cmp_fn+0x190/0x190
? mlx5e_macsec_add_secy+0xf9/0x700 [mlx5_core]
? mutex_lock_io_nested+0x1ae0/0x1ae0
? lock_acquire+0x1c2/0x530
? macsec_upd_offload+0x145/0x380
? lockdep_hardirqs_on_prepare+0x400/0x400
? kasan_save_stack+0x30/0x40
? kasan_save_stack+0x20/0x40
? kasan_save_track+0x10/0x30
? __kasan_kmalloc+0x77/0x90
? __kmalloc_noprof+0x249/0x6b0
? genl_family_rcv_msg_attrs_parse.constprop.0+0xb5/0x240
? mlx5e_macsec_add_secy+0xf9/0x700 [mlx5_core]
mlx5e_macsec_add_secy+0xf9/0x700 [mlx5_core]
? mlx5e_macsec_add_rxsa+0x11a0/0x11a0 [mlx5_core]
macsec_update_offload+0x26c/0x820
? macsec_set_mac_address+0x4b0/0x4b0
? lockdep_hardirqs_on_prepare+0x284/0x400
? _raw_spin_unlock_irqrestore+0x47/0x50
macsec_upd_offload+0x2c8/0x380
? macsec_update_offload+0x820/0x820
? __nla_parse+0x22/0x30
? genl_family_rcv_msg_attrs_parse.constprop.0+0x15e/0x240
genl_family_rcv_msg_doit+0x1cc/0x2a0
? genl_family_rcv_msg_attrs_parse.constprop.0+0x240/0x240
? cap_capable+0xd4/0x330
genl_rcv_msg+0x3ea/0x670
? genl_family_rcv_msg_dumpit+0x2a0/0x2a0
? lockdep_set_lock_cmp_fn+0x190/0x190
? macsec_update_offload+0x820/0x820
netlink_rcv_skb+0x12b/0x390
? genl_family_rcv_msg_dumpit+0x2a0/0x2a0
? netlink_ack+0xd80/0xd80
? rwsem_down_read_slowpath+0xf90/0xf90
? netlink_deliver_tap+0xcd/0xac0
? netlink_deliver_tap+0x155/0xac0
? _copy_from_iter+0x1bb/0x12c0
genl_rcv+0x24/0x40
netlink_unicast+0x440/0x700
? netlink_attachskb+0x760/0x760
? lock_acquire+0x1c2/0x530
? __might_fault+0xbb/0x170
netlink_sendmsg+0x749/0xc10
? netlink_unicast+0x700/0x700
? __might_fault+0xbb/0x170
? netlink_unicast+0x700/0x700
__sock_sendmsg+0xc5/0x190
____sys_sendmsg+0x53f/0x760
? import_iovec+0x7/0x10
? kernel_sendmsg+0x30/0x30
? __copy_msghdr+0x3c0/0x3c0
? filter_irq_stacks+0x90/0x90
? stack_depot_save_flags+0x28/0xa30
___sys_sen
---truncated---
|
[] |
|
CVE-2021-30606
|
Chromium: CVE-2021-30606 Use after free in Blink
|
[
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] |
|
GHSA-jpm3-6rm2-fhgg
|
A vulnerability in the web proxy functionality of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation mechanisms for certain fields in HTTP/HTTPS requests sent through an affected device. A successful attacker could exploit this vulnerability by sending a malicious HTTP/HTTPS request through an affected device. An exploit could allow the attacker to force the device to stop processing traffic, resulting in a DoS condition.
|
[] |
|
GHSA-xgx7-92gq-gr3r
|
The Axesstel MV 410R has a certain default administrator password, and does not force a password change, which makes it easier for remote attackers to obtain access.
|
[] |
|
CVE-2024-26265
|
The Image Uploader module in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions relies on a request parameter to limit the size of files that can be uploaded, which allows remote authenticated users to upload arbitrarily large files to the system's temp folder by modifying the `maxFileSize` parameter.
|
[] |
|
GHSA-6mq7-ggq4-5r36
|
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. A malicious application may be able to gain root privileges.
|
[] |
|
GHSA-v77w-gwjw-vpxc
|
Cross-site scripting (XSS) vulnerability in IBM Host On-Demand 11.0 through 11.0.14 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
|
[] |
|
CVE-2025-3384
|
1000 Projects Human Resource Management System employee.php sql injection
|
A vulnerability was found in 1000 Projects Human Resource Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /controller/employee.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] |
CVE-2020-36157
|
An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Unauthenticated Privilege Escalation via User Roles. Due to the lack of filtering on the role parameter that could be supplied during the registration process, an attacker could supply the role parameter with a WordPress capability (or any custom Ultimate Member role) and effectively be granted those privileges.
|
[
"cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2022-1665
|
A set of pre-production kernel packages of Red Hat Enterprise Linux for IBM Power architecture can be booted by the grub in Secure Boot mode even though it shouldn't. These kernel builds don't have the secure boot lockdown patches applied to it and can bypass the secure boot validations, allowing the attacker to load another non-trusted code.
|
[
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-xprr-83m2-vv8v
|
Mozilla Firefox before 3.0.6 and SeaMonkey before 1.1.15 do not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.
|
[] |
|
GHSA-9mmr-mf6m-p6m5
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] |
|
GHSA-fv8w-wmhg-965x
|
Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly identify the context of Windows shortcut files, which allows user-assisted remote attackers to bypass the Same Origin Policy via a crafted web site for which the user has previously saved a shortcut.
|
[] |
|
CVE-2018-8841
|
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an improper privilege management vulnerability may allow an authenticated user to modify files when read access should only be given to the user.
|
[
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:webaccess_dashboard:*:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:webaccess_scada:*:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:webaccess\\/nms:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-11828
|
In ColorOS (oppo mobile phone operating system, based on AOSP frameworks/native code position/services/surfaceflinger surfaceflinger.CPP), RGB is defined on the stack but uninitialized, so when the screenShot function to RGB value assignment, will not initialize the value is returned to the attackers, leading to values on the stack information leakage, the vulnerability can be used to bypass attackers ALSR.
|
[
"cpe:2.3:o:oppo:coloros:-:*:*:*:*:*:*:*"
] |
|
GHSA-4f8v-gh3f-vqfj
|
Multiple SQL injection vulnerabilities in MeGaCheatZ 1.1 allow remote attackers to execute arbitrary SQL commands via the ItemID parameter to (1) comments.php, (2) view.php, (3) siteadmin/ViewItem.php, and unspecified other vectors.
|
[] |
|
CVE-2015-0877
|
Unrestricted file upload vulnerability in app/lib/mlf.pl in C-BOARD Moyuku before 1.03b3 allows remote attackers to execute arbitrary code by uploading a file with a \0 character in its name.
|
[
"cpe:2.3:a:c-board_moyuku_project:c-board_moyuku:*:b2:*:*:*:*:*:*",
"cpe:2.3:a:c-board_moyuku_project:c-board_moyuku:1.01:b1:*:*:*:*:*:*",
"cpe:2.3:a:c-board_moyuku_project:c-board_moyuku:1.01:b2:*:*:*:*:*:*",
"cpe:2.3:a:c-board_moyuku_project:c-board_moyuku:1.01:b3:*:*:*:*:*:*",
"cpe:2.3:a:c-board_moyuku_project:c-board_moyuku:1.01:b4:*:*:*:*:*:*",
"cpe:2.3:a:c-board_moyuku_project:c-board_moyuku:1.01:b6:*:*:*:*:*:*",
"cpe:2.3:a:c-board_moyuku_project:c-board_moyuku:1.02:b1:*:*:*:*:*:*",
"cpe:2.3:a:c-board_moyuku_project:c-board_moyuku:1.03:b1:*:*:*:*:*:*"
] |
|
CVE-2024-9884
|
T(-) Countdown <= 2.4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
|
The T(-) Countdown plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tminus' shortcode in all versions up to, and including, 2.4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
CVE-2021-34609
|
A remote SQL injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.
|
[
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-ww9g-2qxc-wgxx
|
A vulnerability classified as problematic was found in Tenda AC18 15.03.05.05. Affected by this vulnerability is the function fromSysToolRestoreSet of the file /goform/SysToolRestoreSet. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257059. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
CVE-2010-2921
|
SQL injection vulnerability in the Golf Course Guide (com_golfcourseguide) component 0.9.6.0 beta and 1 beta for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a golfcourses action to index.php.
|
[
"cpe:2.3:a:photoindochina:com_golfcourseguide:0.9.6.0:1beta:*:*:*:*:*:*",
"cpe:2.3:a:photoindochina:com_golfcourseguide:0.9.6.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
|
GHSA-8r2v-vcp5-38xj
|
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105.
|
[] |
|
GHSA-8hc4-w8m7-wxxm
|
Unspecified vulnerability in the PeopleSoft Enterprise PT PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote authenticated users to affect integrity via unknown vectors related to Updates Change Assistant.
|
[] |
|
CVE-2009-4730
|
SQL injection vulnerability in report.php in x10 Adult Media Script 1.7 allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[
"cpe:2.3:a:x10media:adult_script:1.7:*:*:*:*:*:*:*"
] |
|
CVE-2025-46528
|
WordPress Availability Calendar <= 0.2.4 - Cross Site Request Forgery (CSRF) Vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Steve Availability Calendar allows Stored XSS. This issue affects Availability Calendar: from n/a through 0.2.4.
|
[] |
CVE-2020-1900
|
When unserializing an object with dynamic properties HHVM needs to pre-reserve the full size of the dynamic property array before inserting anything into it. Otherwise the array might resize, invalidating previously stored references. This pre-reservation was not occurring in HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0.
|
[
"cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.57.0:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.58.0:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.58.1:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.59.0:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.61.0:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:4.62.0:*:*:*:*:*:*:*"
] |
|
CVE-2025-3371
|
PCMan FTP Server DELETE Command buffer overflow
|
A vulnerability, which was classified as critical, has been found in PCMan FTP Server 2.0.7. This issue affects some unknown processing of the component DELETE Command Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] |
GHSA-j62w-ww35-j48j
|
Multiple buffer overflows in Novell iChain 2.1 before Field Patch 3, and iChain 2.2 before Field Patch 1a, allow attackers to cause a denial of service (ABEND) and possibly execute arbitrary code via (1) a long user name or (2) an unknown attack related to a "special script against login."
|
[] |
|
GHSA-m9jc-2fr5-vwq8
|
** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected is an unknown function of the file /sysmanage/updateos.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240240. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
|
[] |
|
CVE-2016-6597
|
Sophos EAS Proxy before 6.2.0 for Sophos Mobile Control, when Lotus Traveler is enabled, allows remote attackers to access arbitrary web-resources from the backend mail system via a request for the resource, aka an Open Reverse Proxy vulnerability.
|
[
"cpe:2.3:a:sophos:mobile_control_eas_proxy:*:*:*:*:*:*:*:*"
] |
|
GHSA-8p5c-f328-9fvv
|
Diffoscope may write to arbitrary locations due to an untrusted archive
|
diffoscope before 76 writes to arbitrary locations on disk based on the contents of an untrusted archive.
|
[] |
GHSA-whrr-78qv-jjpm
|
Adobe Dimension version 3.4.8 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] |
|
GHSA-2cj7-q7vw-gwx8
|
There is a path traversal vulnerability in ESRI ArcGIS Server versions 10.9.1 thru 11.3. Successful exploitation may allow a remote authenticated attacker with admin privileges to traverse the file system to access files outside of the intended directory. There is no impact to integrity or availability due to the nature of the files that can be accessed, but there is a potential high impact to confidentiality.
|
[] |
|
CVE-2021-42384
|
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function
|
[
"cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] |
|
GHSA-r45m-xv39-pj3h
|
Multiple cross-site scripting (XSS) vulnerabilities in WebCT Campus Edition 4.1.5.8, when "Don't wrap text" is enabled, allow remote authenticated users to inject arbitrary web script or HTML via a (1) mail message or (2) discussion board message. NOTE: this might overlap CVE-2005-1076.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.