id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-hmww-h9vv-9rgj
|
Addressed multiple stack buffer overflow vulnerabilities that could allow an attacker to carry out escalation of privileges through unauthorized remote code execution in Western Digital My Cloud devices before 5.04.114.
|
[] |
|
GHSA-8r6q-2xj9-wv7v
|
The WP Users Exporter plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.4.2 via the 'Export Users' functionality. This makes it possible for authenticated attackers, such as a subscriber, to add untrusted input into profile information like First Names that will embed into the exported CSV file triggered by an administrator and can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
|
[] |
|
CVE-2022-37453
|
An issue was discovered in Softing OPC UA C++ SDK before 6.10. A buffer overflow or an excess allocation happens due to unchecked array and matrix bounds in structure data types.
|
[
"cpe:2.3:a:softing:edgeaggregator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:softing:edgeconnector:*:*:*:*:*:*:*:*",
"cpe:2.3:a:softing:opc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:softing:opc_ua_c\\+\\+_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:softing:secure_integration_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:softing:uagates:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-20068
|
Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to conduct cross-site scripting attacks via the error handling functionality of web pages.
|
[
"cpe:2.3:o:racom:m\\!dge_firmware:4.4.40.105:*:*:*:*:*:*:*",
"cpe:2.3:h:racom:m\\!dge:-:*:*:*:*:*:*:*"
] |
|
CVE-2012-6596
|
Palo Alto Networks PAN-OS 4.0.x before 4.0.9 and 4.1.x before 4.1.3 stores cleartext LDAP bind passwords in authd.log, which allows context-dependent attackers to obtain sensitive information by reading this file, aka Ref ID 35493.
|
[
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:paloaltonetworks:pan-os:4.1.2:*:*:*:*:*:*:*"
] |
|
GHSA-82xx-x8qj-3qpv
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in SinaExtra Sina Extension for Elementor allows PHP Local File Inclusion.This issue affects Sina Extension for Elementor: from n/a through 3.5.1.
|
[] |
|
CVE-2025-40663
|
Stored Cross-Site Scripting (XSS) in i2A-Cronos by i2A
|
Stored Cross-Site Scripting (XSS) vulnerability in i2A-Cronos version 23.02.01.17, from i2A. It allows an authenticated attacker to upload a malicious SVG image into the user's personal space in /CronosWeb/Modules/Persons/PersonalDocuments/PersonalDocuments.
There is no reported fix at this time.
|
[] |
CVE-2025-38076
|
alloc_tag: allocate percpu counters for module tags dynamically
|
In the Linux kernel, the following vulnerability has been resolved:
alloc_tag: allocate percpu counters for module tags dynamically
When a module gets unloaded it checks whether any of its tags are still in
use and if so, we keep the memory containing module's allocation tags
alive until all tags are unused. However percpu counters referenced by
the tags are freed by free_module(). This will lead to UAF if the memory
allocated by a module is accessed after module was unloaded.
To fix this we allocate percpu counters for module allocation tags
dynamically and we keep it alive for tags which are still in use after
module unloading. This also removes the requirement of a larger
PERCPU_MODULE_RESERVE when memory allocation profiling is enabled because
percpu memory for counters does not need to be reserved anymore.
|
[] |
CVE-2025-6469
|
code-projects Online Bidding System details.php sql injection
|
A vulnerability was found in code-projects Online Bidding System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /details.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] |
GHSA-p36j-vmfc-m4v5
|
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
|
[] |
|
GHSA-wxg2-rrf5-g5rr
|
Directory traversal vulnerability in download.php in Rama Zaiten CMS 0.9.8 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
|
[] |
|
GHSA-hjg3-gh8v-mvc5
|
Uncontrolled resource consumption for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable escalation of privilege via adjacent access.
|
[] |
|
GHSA-vj73-r662-h884
|
Moxa MiiNePort E1 has a vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to perform arbitrary system operation or disrupt service.
|
[] |
|
GHSA-5r36-65fj-vf38
|
Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.1.0-12.4.0 and 14.0.0-14.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).
|
[] |
|
GHSA-vcxq-55mq-gj87
|
Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[] |
|
CVE-2024-8883
|
Keycloak: vulnerable redirect uri validation results in open redirec
|
A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.
|
[
"cpe:/a:redhat:build_keycloak:22",
"cpe:/a:redhat:build_keycloak:24",
"cpe:/a:redhat:build_keycloak:22::el9",
"cpe:/a:redhat:build_keycloak:24::el9",
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0",
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9",
"cpe:/a:redhat:red_hat_single_sign_on:7.6",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9",
"cpe:/a:redhat:rhosemc:1.0::el8",
"cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*"
] |
GHSA-7wcw-mh3f-j3v9
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins ComboBlocks allows Stored XSS.This issue affects ComboBlocks: from n/a through 2.2.86.
|
[] |
|
CVE-2025-46655
|
CodiMD through 2.5.4 has a CSP-based protection mechanism against XSS through uploaded SVG documents containing JavaScript, but it can be bypassed in certain cases of different-origin file storage, such as AWS S3. NOTE: it can be considered a user error if AWS is employed for hosting untrusted JavaScript content, but the selected architecture within AWS does not have components that are able to insert Content-Security-Policy headers.
|
[] |
|
CVE-2023-38087
|
Kofax Power PDF clearTimeOut Out-Of-Bounds Write Remote Code Execution Vulnerability
|
Kofax Power PDF clearTimeOut Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of app objects. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20560.
|
[
"cpe:2.3:a:kofax:power_pdf:5.0.0.19:*:*:*:*:*:*:*"
] |
GHSA-4fmm-h427-wp43
|
A vulnerability was found in phpscriptpoint BloodBank 1.1. It has been rated as problematic. This issue affects some unknown processing of the file page.php. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-235205 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
CVE-2021-43772
|
Trend Micro Security 2021 v17.0 (Consumer) contains a vulnerability that allows files inside the protected folder to be modified without any detection.
|
[
"cpe:2.3:a:trendmicro:antivirus\\+_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:internet_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:maximum_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:premium_security:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-q59c-g8h6-83g2
|
Due to a security misconfiguration vulnerability, customers can develop Production Operator Dashboards (PODs) that enable outside users to access customer data when they access these dashboards. Since no mechanisms exist to enforce authentication, malicious unauthenticated users can view non-sensitive customer information. However, this does not affect data integrity or availability.
|
[] |
|
CVE-2020-1269
|
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0986, CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] |
|
GHSA-mfx2-qm46-9g4c
|
Multiple SQL injection vulnerabilities in Uapplication UPhotoGallery 1.1 allow remote attackers to execute arbitrary SQL commands via the ci parameter to (1) slideshow.asp or (2) thumbnails.asp.
|
[] |
|
CVE-2021-22884
|
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
|
[
"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-4852
|
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 generates web pages containing external links in response to GET requests with query strings for enterprise/mobile-monitor/ and certain other files, which makes it easier for remote attackers to obtain sensitive information by reading (1) web-server access logs or (2) web-server Referer logs, related to a "cross-domain Referer leakage" issue.
|
[
"cpe:2.3:a:parallels:parallels_plesk_panel:10.4.4_build20111103.18:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*"
] |
|
GHSA-586w-pwc3-98vf
|
Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-23285.
|
[] |
|
CVE-2022-36012
|
Assertion fail on MLIR empty edge names in TensorFlow
|
TensorFlow is an open source platform for machine learning. When `mlir::tfg::ConvertGenericFunctionToFunctionDef` is given empty function attributes, it crashes. We have patched the issue in GitHub commit ad069af92392efee1418c48ff561fd3070a03d7b. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
|
[
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*"
] |
GHSA-3wwc-wj68-5rvm
|
Asp Project Management 1.0 allows remote attackers to bypass authentication and gain administrative access by setting the crypt cookie to 1.
|
[] |
|
GHSA-phmw-jx86-x666
|
Authenticated Rundeck users can view or delete jobs they do not have authorization for.
|
Access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks.The affected URLs are:`http[s]://[host]/context/rdJob/*``http[s]://[host]/context/api/*/incubator/jobs`ImpactRundeck, Process Automation version 4.12.0 up to 4.16.0PatchesPatched versions: 4.17.3WorkaroundsAccess to two URLs used in either Rundeck Open Source or Process Automation products could be blocked at a load balancer level.`http[s]://host/context/rdJob/*``http[s]://host/context/api/*/incubator/jobs`For more informationIf you have any questions or comments about this advisory:Open an issue in [our forums](https://community.pagerduty.com/forum/c/process-automation)Enterprise Customers can open a [Support ticket](https://support.rundeck.com)
|
[] |
GHSA-v4w9-xgx3-w3p2
|
Multiple buffer overflows in Ipswitch IMail before 2006.21 allow remote attackers or authenticated users to execute arbitrary code via (1) the authentication feature in IMailsec.dll, which triggers heap corruption in the IMail Server, or (2) a long SUBSCRIBE IMAP command, which triggers a stack-based buffer overflow in the IMAP Daemon.
|
[] |
|
CVE-2022-24651
|
sentcms 4.0.x allows remote attackers to cause arbitrary file uploads through an unauthorized file upload interface, resulting in PHP code execution through /user/upload/upload.
|
[
"cpe:2.3:a:sentcms:sentcms:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-pgw2-vj22-3w7g
|
There is a stored Cross-site Scripting vulnerability in ArcGIS Server for versions 10.9.1 – 11.3 that may allow a remote, authenticated attacker to create a stored crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. The privileges required to execute this attack are high, requiring publisher capabilities. The impact is low to both confidentiality and integrity while having no impact to availability.
|
[] |
|
GHSA-g5qw-8x6f-r52j
|
An exploitable use-after-free vulnerability in the DXF-parsing functionality in Autodesk Advance Steel 2018, Autodesk AutoCAD 2018, Autodesk AutoCAD Architecture 2018, Autodesk AutoCAD Electrical 2018, Autodesk AutoCAD Map 3D 2018, Autodesk AutoCAD Mechanical 2018, Autodesk AutoCAD MEP 2018, Autodesk AutoCAD P&ID 2018, Autodesk AutoCAD Plant 3D 2018, Autodesk AutoCAD LT 2018, and Autodesk Civil 3D 2018. A specially crafted DXF file may trigger a use-after-free, resulting in code execution.
|
[] |
|
GHSA-6554-x964-82c2
|
Heap buffer overflow in WebGL in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[] |
|
CVE-2015-5839
|
dyld in Apple iOS before 9 allows attackers to bypass a code-signing protection mechanism via an app that places a crafted signature in an executable file.
|
[
"cpe:2.3:o:apple:watchos:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-x7j6-wh2h-fcwx
|
pycode-browser before version 1.0 is prone to a predictable temporary file vulnerability.
|
[] |
|
GHSA-6xp2-37x8-82p9
|
Web Port 1.19.1 allows XSS via the /log type parameter.
|
[] |
|
GHSA-mw6q-98mp-g8g8
|
Cross-site Scripting in bootstrap-table
|
This affects all versions of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
|
[] |
GHSA-xjcw-q83g-v2h5
|
Rapid7 Insight Platform versions between November 2019 and August 14, 2024 suffer from missing authorization issues whereby an attacker can intercept local requests to set the name and description of a new user group. This could potentially lead to an empty user group being added to the incorrect customer. This vulnerability is remediated as of August 14, 2024.
|
[] |
|
CVE-2023-49270
|
Hotel Management v1.0 - Multiple Reflected Cross-Site Scripting (XSS)
|
Hotel Management v1.0 is vulnerable to multiple authenticated Reflected Cross-Site Scripting vulnerabilities. The 'check_in_date' parameter of the reservation.php resource is copied into the HTML document as plain text between tags. Any input is echoed unmodified in the application's response.
|
[
"cpe:2.3:a:kashipara:hotel_management:1.0:*:*:*:*:*:*:*"
] |
CVE-2013-0481
|
The console in IBM Sterling B2B Integrator 5.1 and 5.2 and Sterling File Gateway 2.1 and 2.2 allows remote attackers to read stack traces by triggering (1) an error or (2) an exception.
|
[
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*"
] |
|
GHSA-g22j-4xvg-qp2w
|
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1407, CVE-2019-1435, CVE-2019-1437, CVE-2019-1438.
|
[] |
|
CVE-2007-0556
|
The query planner in PostgreSQL before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 does not verify that a table is compatible with a "previously made query plan," which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content via an "ALTER COLUMN TYPE" SQL statement, which can be leveraged to read arbitrary memory from the server.
|
[
"cpe:2.3:a:postgresql:postgresql:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:1.09:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-36947
|
Unsafe Parsing of a PNG tRNS chunk in FastStone Image Viewer through 7.5 results in a stack buffer overflow.
|
[
"cpe:2.3:a:faststone:image_viewer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-53388
|
A DOM Clobbering vulnerability in mavo v0.3.2 allows attackers to execute arbitrary code via supplying a crafted HTML element.
|
[] |
|
CVE-2021-43959
|
Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to access the content of internal network resources via a Server-Side Request Forgery (SSRF) vulnerability in the CSV importing feature of JSM Insight. When running in an environment like Amazon EC2, this flaw may be used to access to a metadata resource that provides access credentials and other potentially confidential information. The affected versions are before version 4.13.20, from version 4.14.0 before 4.20.8, and from version 4.21.0 before 4.22.2.
|
[
"cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:data_center:*:*:*",
"cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:server:*:*:*",
"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*",
"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*"
] |
|
CVE-2021-39735
|
In gasket_alloc_coherent_memory of gasket_page_table.c, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151455484References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-21335
|
Basic Authentication can be bypassed using a malformed username
|
In the SPNEGO HTTP Authentication Module for nginx (spnego-http-auth-nginx-module) before version 1.1.1 basic Authentication can be bypassed using a malformed username. This affects users of spnego-http-auth-nginx-module that have enabled basic authentication. This is fixed in version 1.1.1 of spnego-http-auth-nginx-module. As a workaround, one may disable basic authentication.
|
[
"cpe:2.3:a:spnego_http_authentication_module_project:spnego_http_authentication_module:*:*:*:*:*:nginx:*:*"
] |
GHSA-3q94-6qx8-j4xw
|
Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0202, and CVE-2010-0203.
|
[] |
|
CVE-2025-52828
|
WordPress Red Art <= 3.7 - PHP Object Injection Vulnerability
|
Deserialization of Untrusted Data vulnerability in designthemes Red Art allows Object Injection. This issue affects Red Art: from n/a through 3.7.
|
[] |
GHSA-v243-67v6-3pxr
|
In gallery3d and photos, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-201535148
|
[] |
|
GHSA-q6r8-7f8c-3669
|
A vulnerability classified as critical has been found in PHPGurukul Medical Card Generation System 1.0. This affects an unknown part of the file /admin/edit-card-detail.php of the component Managecard Edit Card Detail Page. The manipulation of the argument editid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
GHSA-3vmm-p7jr-jw44
|
mod_cluster in JBoss Enterprise Application Platform 5.1.2 for Red Hat Linux allows worker nodes to register with arbitrary virtual hosts, which allows remote attackers to bypass intended access restrictions and provide malicious content, hijack sessions, and steal credentials by registering from an external vhost that does not enforce security constraints.
|
[] |
|
GHSA-j79c-f2gc-9f4j
|
Multiple unspecified vulnerabilities in (1) getShell and (2) getCommand in IBM AIX 5.3 allow local users to append to arbitrary files.
|
[] |
|
GHSA-mvp5-qx9c-c3fv
|
XWiki makes title of inaccessible pages available through the class property values REST API
|
ImpactThe title of every single page whose reference is known can be accessed through the REST API as long as an XClass with a page property is accessible, this is the default for an XWiki installation. This allows an attacker to get titles of pages whose reference is known, one title per request. This doesn't affect fully [private wikis](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Access%20Rights/#HPrivateWiki) as the REST endpoint checks access rights on the XClass definition. The impact on confidentiality depends on the strategy for page names. By default, page names match the title, so the impact should be low but if page names are intentionally obfuscated because the titles are sensitive, the impact could be high.PatchesThis has been fixed in XWiki 16.4.7, 16.10.3 and 17.0.0 by adding access control checks before getting the title of any page.WorkaroundsWe're not aware of any workarounds.
|
[] |
GHSA-3vp4-9c6g-mcq2
|
Heateor Social Login WordPress prior to 1.1.32 contains a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the website using the product.
|
[] |
|
CVE-2017-6895
|
USB Pratirodh allows remote attackers to conduct XML External Entity (XXE) attacks via XML data in usb.xml.
|
[
"cpe:2.3:a:usb_pratirodh_project:usb_pratirodh:-:*:*:*:*:*:*:*"
] |
|
GHSA-7ggp-fc92-x5m6
|
Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device.
|
[] |
|
GHSA-63g3-7wjw-9cxg
|
ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE allow remote attackers to discover usernames and password hashes by reading the cgi-bin/webproc HTML source code, a different vulnerability than CVE-2015-8703.
|
[] |
|
CVE-2022-21306
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-8qj9-f5hw-7wqq
|
The kadence-blocks-pro WordPress plugin before 2.3.8 does not prevent users with at least the contributor role using some of its shortcode's functionalities to leak arbitrary options from the database.
|
[] |
|
GHSA-wpp8-fp59-g7vc
|
McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not disable the server-side session token upon the closing of the Management Console/Dashboard, which makes it easier for remote attackers to hijack sessions by capturing a session cookie and then modifying the response to a login attempt, related to a "Logout Failure" issue.
|
[] |
|
GHSA-6hfv-6jwx-94p8
|
WUZHI CMS 4.1.0 allows persistent XSS via the form%5Bqq_10%5D parameter to the /index.php?m=member&f=index&v=profile&set_iframe=1 URI.
|
[] |
|
GHSA-25j5-9j9v-cp8m
|
Race condition in the Radeon DRI driver for Linux kernel 2.6.8.1 allows local users with DRI privileges to execute arbitrary code as root.
|
[] |
|
CVE-2024-25864
|
Server Side Request Forgery (SSRF) vulnerability in Friendica versions after v.2023.12, allows a remote attacker to execute arbitrary code and obtain sensitive information via the fpostit.php component.
|
[
"cpe:2.3:a:friendica:friendica:2023.12:*:*:*:*:*:*:*"
] |
|
CVE-2004-1220
|
Battlefield 1942 1.6.19 and earlier, and Battlefield Vietnam 1.2 and earlier, allows a remote master server to cause a denial of service (client crash) via a server reply that contains a large numplayers value, which triggers a null dereference.
|
[
"cpe:2.3:a:digital_illusions:battlefield_1942:1.6.19:*:*:*:*:*:*:*",
"cpe:2.3:a:digital_illusions:battlefield_vietnam:1.2:*:*:*:*:*:*:*"
] |
|
CVE-2017-11888
|
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability".
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] |
|
CVE-2015-7967
|
SafeNet Authentication Service for Citrix Web Interface Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module.
|
[
"cpe:2.3:a:gemalto:safenet_authentication_service_for_citrix_web_interface_agent:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-45880
|
GibbonEdu Gibbon through version 25.0.0 allows Directory Traversal via the report template builder. An attacker can create a new Asset Component. The templateFileDestination parameter can be set to an arbitrary pathname (and extension). This allows creation of PHP files outside of the uploads directory, directly in the webroot.
|
[
"cpe:2.3:a:gibbonedu:gibbon:*:*:*:*:*:*:*:*"
] |
|
GHSA-h3hp-4554-qqhx
|
cPanel before 55.9999.141 allows account-suspension bypass via ftp (SEC-105).
|
[] |
|
GHSA-9r5x-crjw-6ghj
|
A deserialization vulnerability exists in how the ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
|
[] |
|
CVE-2023-36584
|
Windows Mark of the Web Security Feature Bypass Vulnerability
|
Windows Mark of the Web Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
GHSA-v4fq-8hcp-2q5g
|
A Deserialization of Untrusted Data vulnerability in Hewlett Packard Enterprise Intelligent Management Center (iMC) PLAT version 7.3 E0504P2 was found.
|
[] |
|
GHSA-326c-f2r3-76jm
|
MikroTik RouterBOARD v6.39.2 and v6.40.5 allows an unauthenticated remote attacker to cause a denial of service by connecting to TCP port 53 and sending data that begins with many '\0' characters, possibly related to DNS.
|
[] |
|
GHSA-389j-cw3h-6fc8
|
During installation or upgrade to Software House C•CURE 9000 v2.70 and American Dynamics victor Video Management System v5.2, the credentials of the user used to perform the installation or upgrade are logged in a file. The install log file persists after the installation.
|
[] |
|
CVE-2010-5218
|
Untrusted search path vulnerability in Dupehunter 9.0.0.3911 allows local users to gain privileges via a Trojan horse Fwpuclnt.dll file in the current working directory, as demonstrated by a directory that contains a .dhjb file. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:dupehunter:dupehunter:9.0.0.3911:*:*:*:*:*:*:*"
] |
|
CVE-2020-4231
|
IBM Security Identity Governance and Intelligence 5.2.6 could allow an authenticated user to perform unauthorized commands due to hazardous input validation. IBM X-Force ID: 175335.
|
[
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.6:*:*:*:*:*:*:*"
] |
|
CVE-2013-7260
|
Multiple stack-based buffer overflows in RealNetworks RealPlayer before 17.0.4.61 on Windows, and Mac RealPlayer before 12.0.1.1738, allow remote attackers to execute arbitrary code via a long (1) version number or (2) encoding declaration in the XML declaration of an RMP file, a different issue than CVE-2013-6877.
|
[
"cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.0.4.43:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.0.5.109:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.0.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:15.02.71:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:16.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:16.0.0.282:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:16.0.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:16.0.2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:16.0.3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.305:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.331:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.0:10.0.0.352:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0._481:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.396:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:10.1:10.0.0.412:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.0.1701:*:mac:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.1.1737:-:-:*:-:macos:*:*"
] |
|
GHSA-9mph-5q5c-gvvf
|
The Array.prototype.join method in Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via a non-array object that contains initial holes.
|
[] |
|
CVE-2000-0988
|
WinU 1.0 through 5.1 has a backdoor password that allows remote attackers to gain access to its administrative interface and modify configuration.
|
[
"cpe:2.3:a:bardon_data_systems:winu:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-20032
|
On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:
A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.
This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.
For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/"].
|
[
"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*",
"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:1.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:1.0.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:clamav:clamav:1.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*"
] |
|
GHSA-34fw-m7m3-5c57
|
EMC RSA BSAFE Crypto-J versions prior to 6.2.2 has a PKCS#12 Timing Attack Vulnerability. A possible timing attack could be carried out by modifying a PKCS#12 file that has an integrity MAC for which the password is not known. An attacker could then feed the modified PKCS#12 file to the toolkit and guess the current MAC one byte at a time. This is possible because Crypto-J uses a non-constant-time method to compare the stored MAC with the calculated MAC. This vulnerability is similar to the issue described in CVE-2015-2601.
|
[] |
|
CVE-2003-0517
|
faxrunqd.in in mgetty 1.1.28 and earlier allows local users to overwrite files via a symlink attack on JOB files.
|
[
"cpe:2.3:a:mgetty_project:mgetty:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-42736
|
In telecom service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
|
[
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-26360
|
A CWE-306 "Missing Authentication for Critical Function" in maxprofile/persistance/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to delete dashboards via crafted HTTP requests.
|
[] |
|
CVE-2022-3689
|
HTML Forms < 1.3.25 - Admin+ SQLi
|
The HTML Forms WordPress plugin before 1.3.25 does not properly properly escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users
|
[
"cpe:2.3:a:ibericode:html_forms:*:*:*:*:*:wordpress:*:*"
] |
GHSA-pqch-79w5-3vfc
|
The Master Slider WordPress plugin before 3.10.5 does not sanitise and escape some of its settings, which could allow high privilege users such as Editor and above to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] |
|
CVE-1999-1034
|
Vulnerability in login in AT&T System V Release 4 allows local users to gain privileges.
|
[
"cpe:2.3:o:att:svr4:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2006-7237
|
PHP remote file inclusion vulnerability in mod/nc_phpmyadmin/core/libraries/Theme_Manager.class.php in Ixprim 2.0 allows remote attackers to execute arbitrary PHP code via a URL in an unspecified parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:ixprim-cms:ixprim:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-3950
|
sanluan PublicCMS Tab dwz.min.js initLink cross site scripting
|
A vulnerability, which was classified as problematic, was found in sanluan PublicCMS. Affected is the function initLink of the file dwz.min.js of the component Tab Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a972dc9b1c94aea2d84478bf26283904c21e4ca2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213456.
|
[
"cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*"
] |
CVE-2024-43891
|
tracing: Have format file honor EVENT_FILE_FL_FREED
|
In the Linux kernel, the following vulnerability has been resolved:
tracing: Have format file honor EVENT_FILE_FL_FREED
When eventfs was introduced, special care had to be done to coordinate the
freeing of the file meta data with the files that are exposed to user
space. The file meta data would have a ref count that is set when the file
is created and would be decremented and freed after the last user that
opened the file closed it. When the file meta data was to be freed, it
would set a flag (EVENT_FILE_FL_FREED) to denote that the file is freed,
and any new references made (like new opens or reads) would fail as it is
marked freed. This allowed other meta data to be freed after this flag was
set (under the event_mutex).
All the files that were dynamically created in the events directory had a
pointer to the file meta data and would call event_release() when the last
reference to the user space file was closed. This would be the time that it
is safe to free the file meta data.
A shortcut was made for the "format" file. It's i_private would point to
the "call" entry directly and not point to the file's meta data. This is
because all format files are the same for the same "call", so it was
thought there was no reason to differentiate them. The other files
maintain state (like the "enable", "trigger", etc). But this meant if the
file were to disappear, the "format" file would be unaware of it.
This caused a race that could be trigger via the user_events test (that
would create dynamic events and free them), and running a loop that would
read the user_events format files:
In one console run:
# cd tools/testing/selftests/user_events
# while true; do ./ftrace_test; done
And in another console run:
# cd /sys/kernel/tracing/
# while true; do cat events/user_events/__test_event/format; done 2>/dev/null
With KASAN memory checking, it would trigger a use-after-free bug report
(which was a real bug). This was because the format file was not checking
the file's meta data flag "EVENT_FILE_FL_FREED", so it would access the
event that the file meta data pointed to after the event was freed.
After inspection, there are other locations that were found to not check
the EVENT_FILE_FL_FREED flag when accessing the trace_event_file. Add a
new helper function: event_file_file() that will make sure that the
event_mutex is held, and will return NULL if the trace_event_file has the
EVENT_FILE_FL_FREED flag set. Have the first reference of the struct file
pointer use event_file_file() and check for NULL. Later uses can still use
the event_file_data() helper function if the event_mutex is still held and
was not released since the event_file_file() call.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*"
] |
CVE-2024-23114
|
Apache Camel: Camel-CassandraQL: Unsafe Deserialization from CassandraAggregationRepository
|
Deserialization of Untrusted Data vulnerability in Apache Camel CassandraQL Component AggregationRepository which is vulnerable to unsafe deserialization. Under specific conditions it is possible to deserialize malicious payload.This issue affects Apache Camel: from 3.0.0 before 3.21.4, from 3.22.0 before 3.22.1, from 4.0.0 before 4.0.4, from 4.1.0 before 4.4.0.
Users are recommended to upgrade to version 4.4.0, which fixes the issue. If users are on the 4.0.x LTS releases stream, then they are suggested to upgrade to 4.0.4. If users are on 3.x, they are suggested to move to 3.21.4 or 3.22.1
|
[
"cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*"
] |
CVE-2017-14095
|
A vulnerability in Trend Micro Smart Protection Server (Standalone) versions 3.2 and below could allow an attacker to perform remote command execution via a local file inclusion on a vulnerable system.
|
[
"cpe:2.3:a:trendmicro:smart_protection_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-49w7-5r33-jm9m
|
http-swagger XSS via PUT requests
|
http-swagger before 1.2.6 allows XSS via PUT requests, because a file that has been uploaded (via httpSwagger.WrapHandler and *webdav.memFile) can subsequently be accessed via a GET request. NOTE: this is independently fixable with respect to CVE-2022-24863, because (if a solution continued to allow PUT requests) large files could have been blocked without blocking JavaScript, or JavaScript could have been blocked without blocking large files.
|
[] |
CVE-2025-23496
|
WordPress WP FPO plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP FPO allows Reflected XSS. This issue affects WP FPO: from n/a through 1.0.
|
[] |
GHSA-fp6q-4pvx-cxr2
|
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bluetooth L2CAP dissector could divide by zero. This was addressed in epan/dissectors/packet-btl2cap.c by validating an interval value.
|
[] |
|
CVE-2025-25520
|
Seacms <13.3 is vulnerable to SQL Injection in admin_pay.php.
|
[] |
|
GHSA-887c-mr87-cxwp
|
PyTorch Improper Resource Shutdown or Release vulnerability
|
A vulnerability, which was classified as problematic, was found in PyTorch 2.6.0. Affected is the function torch.nn.functional.ctc_loss of the file aten/src/ATen/native/LossCTC.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is 46fc5d8e360127361211cb237d5f9eef0223e567. It is recommended to apply a patch to fix this issue.
|
[] |
GHSA-4x4x-4g44-6g6p
|
The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the sirv_upload_file_by_chanks AJAX action in all versions up to, and including, 7.2.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.