id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-8877-prq4-9xfw
|
Actionpack Open Redirect Vulnerability
|
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
|
[] |
GHSA-3wg9-ch55-29w5
|
In Bevywise MQTTRoute 1.1 build 1018-002, a connect packet combined with a malformed unsubscribe request packet can be used to cause a Denial of Service attack against the broker.
|
[] |
|
GHSA-xvwc-mxm8-8hqg
|
An issue discovered in CS-Cart MultiVendor 4.16.1 allows attackers to alter arbitrary user account profiles via crafted post request.
|
[] |
|
GHSA-2w2h-r9hg-5f4m
|
Cross-site request forgery (CSRF) vulnerability in Mahara before 1.4.1 allows remote attackers to hijack the authentication of administrators for requests that add a user to an institution.
|
[] |
|
GHSA-xqq4-7jq4-8rv5
|
Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-31948, CVE-2021-31964.
|
[] |
|
GHSA-v47v-v7j2-rgh4
|
SQL injection vulnerability in the Parish of the Holy Spirit Religious Art Gallery (hs_religiousartgallery) extension 0.1.2 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] |
|
CVE-2018-11329
|
The DrugDealer function of a smart contract implementation for Ether Cartel, an Ethereum game, allows attackers to take over the contract's ownership, aka ceoAnyone. After that, all the digital assets (including Ether balance and tokens) might be manipulated by the attackers, as exploited in the wild in May 2018.
|
[
"cpe:2.3:a:ethercartel:ether_cartel:2018-05-18:*:*:*:*:*:*:*"
] |
|
GHSA-vm76-33jx-q8x5
|
Web Port 1.19.1 allows XSS via the /access/setup type parameter.
|
[] |
|
CVE-2011-2103
|
Adobe Reader and Acrobat 8.x before 8.3 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
|
[
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.6:*:*:*:*:*:*:*"
] |
|
GHSA-jgx3-5crp-mxjw
|
A post-authenticated stored XSS was found in MultiUx v.3.1.12.0 via the /multiux/SaveMailbox LastName field.
|
[] |
|
CVE-2023-50351
|
Insecure key rotation affects MyXalytics
|
HCL DRYiCE MyXalytics is impacted by the use of an insecure key rotation mechanism which can allow an attacker to compromise the confidentiality or integrity of data.
|
[
"cpe:2.3:a:hcltech:dryice_myxalytics:5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:dryice_myxalytics:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:dryice_myxalytics:6.1:*:*:*:*:*:*:*"
] |
CVE-2018-1000858
|
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
|
[
"cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] |
|
CVE-2025-20935
|
Improper handling of insufficient permission or privileges in ClipboardService prior to SMR Apr-2025 Release 1 allows local attackers to access files with system privilege. User interaction is required for triggering this vulnerability.
|
[] |
|
GHSA-4qp7-4vpc-hwfm
|
Vulnerable versions of the JupiterX Core (<= 2.0.6) plugin register an AJAX action jupiterx_conditional_manager which can be used to call any function in the includes/condition/class-condition-manager.php file by sending the desired function to call in the sub_action parameter. This can be used to view site configuration and logged-in users, modify post conditions, or perform a denial of service attack.
|
[] |
|
GHSA-8gqf-m68r-p56c
|
Vulnerability in the Oracle WebCenter Sites Support Tools product of Oracle Fusion Middleware (component: User Interface). The supported version that is affected is Prior to 4.4.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites Support Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites Support Tools accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Sites Support Tools accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebCenter Sites Support Tools. CVSS 3.1 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
|
[] |
|
CVE-2008-5651
|
SQL injection vulnerability in plugins/bookmarker/bookmarker_backend.php in MyioSoft EasyBookMarker 4.0 allows remote attackers to execute arbitrary SQL commands via the Parent parameter.
|
[
"cpe:2.3:a:myiosoft:easybookmarker:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-20552
|
In btif_a2dp_sink_command_ready of btif_a2dp_sink.cc, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-243922806
|
[
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
GHSA-xvpr-22g7-3fc2
|
The Debian apache2ctl script in the apache2 package squeeze before 2.2.16-6+squeeze11, wheezy before 2.2.22-13, and sid before 2.2.22-13 for the Apache HTTP Server on Debian GNU/Linux does not properly create the /var/lock/apache2 lock directory, which allows local users to gain privileges via an unspecified symlink attack.
|
[] |
|
CVE-2021-32198
|
EmTec ZOC through 8.02.4 allows remote servers to cause a denial of service (Windows GUI hang) by telling the ZOC window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. In other words, it does not implement a usleep or similar delay upon processing a title change.
|
[
"cpe:2.3:a:emtec:zoc:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-14763
|
Vulnerability in the Oracle Application Express Quick Poll component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Quick Poll. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Quick Poll, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Quick Poll accessible data as well as unauthorized read access to a subset of Oracle Application Express Quick Poll accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-32243
|
WordPress Internal Link Optimiser plugin <= 5.1.2 - Settings Change vulnerability
|
Missing Authorization vulnerability in Toast Plugins Internal Link Optimiser allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Internal Link Optimiser: from n/a through 5.1.2.
|
[] |
GHSA-hcfh-jx3g-qxw4
|
Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "title" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser.
|
[] |
|
CVE-2024-54926
|
A SQL Injection vulnerability was found in /search_class.php of kashipara E-learning Management System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the school_year parameter.
|
[
"cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-36844
|
Junos OS: EX Series: A PHP vulnerability in J-Web allows an unauthenticated attacker to control important environment variables
|
A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environment variables.
Using a crafted request an attacker is able to modify
certain PHP environment variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities.
This issue affects Juniper Networks Junos OS on EX Series:
* All versions prior to 20.4R3-S9;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S7;
* 21.3 versions
prior to
21.3R3-S5;
* 21.4 versions
prior to
21.4R3-S5;
* 22.1 versions
prior to
22.1R3-S4;
* 22.2 versions
prior to
22.2R3-S2;
* 22.3 versions
prior to 22.3R3-S1;
* 22.4 versions
prior to
22.4R2-S2, 22.4R3;
* 23.2 versions prior to
23.2R1-S1, 23.2R2.
|
[
"cpe:2.3:h:juniper:ex2200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2200-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2200-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300-c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex2300m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex3200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex3300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex3300-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4200-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48tafi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48tdc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-48tdc-afi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-mp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4300m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4500-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4550-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4550\\/vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4600-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex4650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex6200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex6210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex8200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex8200-vc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex8208:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex8216:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9208:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9214:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9251:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:ex9253:-:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*"
] |
GHSA-2w9p-mj8f-374x
|
Mattermost Mobile fails to limit the maximum number of Markdown elements in a post allowing an attacker to send a post with hundreds of emojis to a channel and freeze the mobile app of users when viewing that particular channel.
|
[] |
|
CVE-2020-2496
|
Cross-site scripting vulnerability in QTS and QuTS hero
|
If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QANP have already fixed these vulnerabilities in the following versions of QTS and QuTS hero. QuTS hero h4.5.1.1472 build 20201031 and later QTS 4.5.1.1456 build 20201015 and later QTS 4.4.3.1354 build 20200702 and later QTS 4.3.6.1333 build 20200608 and later QTS 4.3.4.1368 build 20200703 and later QTS 4.3.3.1315 build 20200611 and later QTS 4.2.6 build 20200611 and later
|
[
"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*"
] |
GHSA-27jj-5xgw-m6qw
|
Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
|
[] |
|
CVE-2007-5515
|
Unspecified vulnerability in the Spatial component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.2, and 10.2.0.3 has unknown impact and remote attack vectors, aka DB27.
|
[
"cpe:2.3:a:oracle:database_server:9.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.2.0.8dv:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.3:*:*:*:*:*:*:*"
] |
|
CVE-2024-40422
|
The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system.
|
[
"cpe:2.3:a:stitionai:devika:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-3rv9-f576-m286
|
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Virames Vira-Investing allows Account Footprinting.This issue affects Vira-Investing: before 1.0.84.86.
|
[] |
|
CVE-2020-9752
|
Naver Cloud Explorer before 2.2.2.11 allows the attacker can move a local file in any path on the filesystem as a system privilege through its named pipe.
|
[
"cpe:2.3:a:naver:cloud_explorer:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-32801
|
WordPress Widget Post Slider plugin <= 1.3.5 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ShapedPlugin Widget Post Slider allows Stored XSS.This issue affects Widget Post Slider: from n/a through 1.3.5.
|
[
"cpe:2.3:a:wordpress:widget_post_slider:*:*:*:*:*:*:*:*"
] |
CVE-2012-1055
|
Heap-based buffer overflow in PhotoLine 17.01 and possibly other versions before 17.02 allows remote attackers to execute arbitrary code via a JPEG2000 (JP2) file with a crafted Quantization Default (QCD) marker segment.
|
[
"cpe:2.3:a:pl32:photoline:17.01:*:*:*:*:*:*:*"
] |
|
GHSA-qx33-h57r-w5q6
|
OpenAFS 1.6.19 and earlier allows remote attackers to obtain sensitive directory information via vectors involving the (1) client cache partition, (2) fileserver vice partition, or (3) certain RPC responses.
|
[] |
|
CVE-2015-1720
|
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Use After Free Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:r2:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] |
|
CVE-2013-5766
|
Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control EM Base Platform 10.2.0.5 and 11.1.0.1; EM DB Control 11.1.0.7, 11.2.0.2, and 11.2.0.3; and EM Plugin for DB 12.1.0.2 and 12.1.0.3 allows remote attackers to affect integrity via unknown vectors related to DB Performance Advisories/UIs.
|
[
"cpe:2.3:a:oracle:enterprise_manager_database_control:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_database_control:11.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_database_control:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_grid_control:10.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_grid_control:11.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_plugin_for_database_control:12.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_plugin_for_database_control:12.1.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-pmqf-hcfv-43rc
|
In Fibaro Home Center 2 and Lite devices in all versions provide a web based management interface over unencrypted HTTP protocol. Communication between the user and the device can be eavesdropped to hijack sessions, tokens and passwords.
|
[] |
|
GHSA-gj47-jf8p-7hxm
|
Under specific circumstances, insecure permissions in Ivanti Velocity License Server before version 5.2 allows a local authenticated attacker to achieve local privilege escalation.
|
[] |
|
CVE-2025-26408
|
Unprotected JTAG Interface
|
The JTAG interface of Wattsense Bridge devices can be accessed with physical access to the PCB. After connecting to the interface, full access to the device is possible. This enables an attacker to extract information, modify and debug the device's firmware. All known versions are affected.
|
[] |
GHSA-m6g3-5ffp-hrjx
|
Unrestricted Upload of File with Dangerous Type vulnerability in Paxman Product Website Showcase allows Upload a Web Shell to a Web Server.This issue affects Product Website Showcase: from n/a through 1.0.
|
[] |
|
GHSA-942h-7fc9-gvf2
|
Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4191, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254.
|
[] |
|
GHSA-8766-gh77-5x27
|
SQL injection vulnerability in Shalwan MusicBox 2.3.4 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter in a viewgallery action in a request for the top-level URI. NOTE: the start parameter/search action is already covered by CVE-2006-1807, and the show parameter/top action is already covered by CVE-2006-1360.
|
[] |
|
GHSA-rw4v-mgcj-gfcq
|
The Gallery Metabox for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the refresh_metabox function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to obtain a list of images attached to a post.
|
[] |
|
CVE-2020-25073
|
FreedomBox through 20.13 allows remote attackers to obtain sensitive information from the /server-status page of the Apache HTTP Server, because a connection from the Tor onion service (or from PageKite) is considered a local connection. This affects both the freedombox and plinth packages of some Linux distributions, but only if the Apache mod_status module is enabled.
|
[
"cpe:2.3:a:debian:freedombox:*:*:*:*:*:*:*:*"
] |
|
GHSA-6ppw-252q-r2mf
|
jizhiCMS 2.5 suffers from a File upload vulnerability.
|
[] |
|
GHSA-f62q-ww86-h898
|
Gemalto Tokend 2013 has an Arbitrary File Creation/Overwrite Vulnerability
|
[] |
|
CVE-2023-6050
|
Estatik Real Estate Plugin < 4.1.1 - Reflected XSS
|
The Estatik Real Estate Plugin WordPress plugin before 4.1.1 does not sanitise and escape various parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
[
"cpe:2.3:a:estatik:estatik:*:*:*:*:*:wordpress:*:*"
] |
CVE-2018-6856
|
Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via IOCTL 0x8020601C. By crafting an input buffer we can control the execution path to the point where a global variable will be written to a user controlled address. We can take advantage of this condition to zero-out the pointer to the security descriptor in the object header of a privileged process or modify the security descriptor itself and run code in the context of a process running as SYSTEM.
|
[
"cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:6.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_easy_device_encryption_client:7.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:5.60.3:vs-nfd:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:6.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:6.00.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:7.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_enterprise_client:8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.90.1:ts:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.90.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sophos:safeguard_lan_crypt_client:3.95.1:ts:*:*:*:*:*:*"
] |
|
GHSA-w7mw-fjhg-xrq2
|
A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
|
[] |
|
CVE-2025-25284
|
Path Traversal and Local File Read via VRT (Virtual Format) in ZOO-Project WPS Implementation
|
The ZOO-Project is an open source processing platform, released under MIT/X11 Licence. A vulnerability in ZOO-Project's WPS (Web Processing Service) implementation allows unauthorized access to files outside the intended directory through path traversal. Specifically, the Gdal_Translate service, when processing VRT (Virtual Format) files, does not properly validate file paths referenced in the VRTRasterBand element, allowing attackers to read arbitrary files on the system. The vulnerability exists because the service doesn't properly sanitize the SourceFilename parameter in VRT files, allowing relative path traversal sequences (../). When combined with VRT's raw data handling capabilities, this allows reading arbitrary files as raw binary data and converting them to TIFF format, effectively exposing their contents. This vulnerability is particularly severe because it allows attackers to read sensitive system files, potentially exposing configuration data, credentials, or other confidential information stored on the server. An unauthenticated attacker can read arbitrary files from the system through path traversal, potentially accessing sensitive information such as configuration files, credentials, or other confidential data stored on the server. The vulnerability requires no authentication and can be exploited remotely through the WPS service. This issue has been addressed in commit `5f155a8` and all users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[] |
CVE-2018-19037
|
On Virgin Media wireless router 3.0 hub devices, the web interface is vulnerable to denial of service. When POST requests are sent and keep the connection open, the router lags and becomes unusable to anyone currently using the web interface.
|
[
"cpe:2.3:o:virginmedia:hub_3.0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:virginmedia:hub_3.0:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-8160
|
The Madapt Driver of some Huawei smart phones with software Earlier than Vicky-AL00AC00B172 versions,Vicky-AL00CC768B122,Vicky-TL00AC01B167,Earlier than Victoria-AL00AC00B172 versions,Victoria-TL00AC00B123,Victoria-TL00AC01B167 has a use after free (UAF) vulnerability. An attacker can trick a user to install a malicious application which has a high privilege to exploit this vulnerability, Successful exploitation may cause arbitrary code execution.
|
[
"cpe:2.3:o:huawei:vicky-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:vicky-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:vicky-al00c_firmware:vicky-al00cc768b122:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:vicky-al00c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:vicky-tl00a_firmware:vicky-tl00ac01b167:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:vicky-tl00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:victoria-al00a_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:victoria-al00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:victoria-tl00a_firmware:victoria-tl00ac00b123:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:victoria-tl00a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:victoria-tl00a_firmware:victoria-tl00ac01b167:*:*:*:*:*:*:*"
] |
|
CVE-2022-36563
|
Incorrect access control in the install directory (C:\RailsInstaller) of Rubyinstaller2 v3.1.2 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.
|
[
"cpe:2.3:a:rubyinstaller:rubyinstaller2:*:*:*:*:*:ruby:*:*"
] |
|
CVE-2017-17329
|
Huawei ViewPoint 8660 V100R008C03 have a memory leak vulnerability. The software does not release allocated memory properly when parse XML Schema data. An authenticated attacker could upload a crafted XML file, successful exploit could cause the system service abnormal since run out of memory.
|
[
"cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*"
] |
|
GHSA-8rjj-rr5j-hqwh
|
IBM Spectrum Protect Plus 10.1.0 through 10.1.6 may allow a local user to obtain access to information beyond their intended role and permissions. IBM X-Force ID: 193653.
|
[] |
|
CVE-2023-21188
|
In btm_ble_update_inq_result of btm_ble_gap.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-264624283
|
[
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-35349
|
A vulnerability has been discovered in Diño Physics School Assistant version 2.3. The vulnerability impacts an unidentified code within the file /admin/category/view_category.php. Manipulating the argument id can result in SQL injection.
|
[
"cpe:2.3:a:dino_physics_school_assistant_project:dino_physics_school_assistant:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dino_physics_school_assistant_project:dino_physics_school_assistant:2.3:*:*:*:*:*:*:*"
] |
|
CVE-2025-2659
|
Project Worlds Online Time Table Generator index.php sql injection
|
A vulnerability, which was classified as critical, was found in Project Worlds Online Time Table Generator 1.0. This affects an unknown part of the file /student/index.php. The manipulation of the argument e leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] |
CVE-2021-4313
|
NethServer phonenehome index.php get_country_coor sql injection
|
A vulnerability was found in NethServer phonenehome. It has been rated as critical. This issue affects the function get_info/get_country_coor of the file server/index.php. The manipulation leads to sql injection. The identifier of the patch is 759c30b0ddd7d493836bbdf695cf71624b377391. It is recommended to apply a patch to fix this issue. The identifier VDB-218393 was assigned to this vulnerability.
|
[
"cpe:2.3:a:nethserver-phonenehome_project:nethserver-phonenehome:*:*:*:*:*:*:*:*"
] |
GHSA-7gfq-fv5r-j8r5
|
A vulnerability, which was classified as problematic, has been found in Bdtask Bhojon Best Restaurant Management Software 2.9. This issue affects some unknown processing of the file /dashboard/message of the component Message Page. The manipulation of the argument Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254531. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
CVE-2020-26899
|
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.
|
[
"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-3106
|
IBM Rational ClearQuest 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 does not properly implement the Local Access Only protection mechanism, which allows remote attackers to bypass authentication and read files via the Help Server Administration feature.
|
[
"cpe:2.3:a:ibm:rational_clearcase:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:7.1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_clearcase:8.0.1.4:*:*:*:*:*:*:*"
] |
|
CVE-2022-2378
|
Easy Student Results <= 2.2.8 - Reflected Cross-Site Scripting
|
The Easy Student Results WordPress plugin through 2.2.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
|
[
"cpe:2.3:a:easy_student_results_project:easy_student_results:*:*:*:*:*:wordpress:*:*"
] |
GHSA-6g5w-xrv7-fffr
|
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in AIX windows to cause a denial of service. IBM X-Force ID: 267970.
|
[] |
|
GHSA-8r7h-2v88-7fq5
|
The Ice Age Village (aka com.gameloft.android.ANMP.GloftIAHM) application 2.8.0m for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] |
|
GHSA-6c9g-wrqp-q548
|
Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.
|
[] |
|
GHSA-28qr-hqrv-mhvr
|
libdwarf 2016-10-21 allows context-dependent attackers to obtain sensitive information or cause a denial of service by using the "malformed dwarf file" approach, related to a "Heap Buffer Over-read" issue affecting the dwarf_util.c component, aka DW201611-006.
|
[] |
|
GHSA-w5qh-gchv-44g2
|
Use of weak credentials in the Tenda RX2 Pro 16.03.30.14 allows an unauthenticated attacker to authenticate to the telnet service by calculating the root password based on easily-obtained device information. The password is based on the last two digits/octets of the MAC address.
|
[] |
|
GHSA-5mw2-67q5-9c2w
|
FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)
|
[] |
|
CVE-2025-49253
|
WordPress Lasa <= 1.1 - Local File Inclusion Vulnerability
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Lasa allows PHP Local File Inclusion. This issue affects Lasa: from n/a through 1.1.
|
[] |
CVE-2022-36437
|
The Connection handler in Hazelcast and Hazelcast Jet allows a remote unauthenticated attacker to access and manipulate data in the cluster with the identity of another already authenticated connection. The affected Hazelcast versions are through 4.0.6, 4.1.9, 4.2.5, 5.0.3, and 5.1.2. The affected Hazelcast Jet versions are through 4.5.3.
|
[
"cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:-:*:*:*",
"cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:hazelcast:hazelcast-jet:*:*:*:*:-:*:*:*",
"cpe:2.3:a:hazelcast:hazelcast-jet:*:*:*:*:enterprise:*:*:*"
] |
|
CVE-2018-18552
|
ServersCheck Monitoring Software through 14.3.3 allows local users to cause a denial of service (menu functionality loss) by creating an LNK file that points to a second LNK file, if this second LNK file is associated with a Start menu. Ultimately, this behavior comes from a Directory Traversal bug (via the sensor_details.html id parameter) that allows creating empty files in arbitrary directories.
|
[
"cpe:2.3:a:serverscheck:monitoring_software:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-11086
|
Pivotal Usage Service in Pivotal Application Service, versions 2.0 prior to 2.0.21 and 2.1 prior to 2.1.13 and 2.2 prior to 2.2.5, contains a bug which may allow escalation of privileges. A space developer with access to the system org may be able to access an artifact which contains the CF admin credential, allowing them to escalate to an admin role.
|
[
"cpe:2.3:a:pivotal_software:pivotal_application_service:*:*:*:*:*:*:*:*"
] |
|
GHSA-p5r3-w88m-mm8j
|
A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. Affected by this issue is some unknown functionality of the component PASSIVE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
CVE-2006-1545
|
Direct static code injection vulnerability in admin/config.php in vscripts (aka Kuba Kunkiewicz) VNews 1.2 allows remote authenticated administrators to execute code by inserting the code into variables that are stored in admin/config.php.
|
[
"cpe:2.3:a:vscripts:vnews:1.2:*:*:*:*:*:*:*"
] |
|
CVE-2024-45240
|
The TikTok (aka com.zhiliaoapp.musically) application before 34.5.5 for Android allows the takeover of Lynxview JavaScript interfaces via deeplink traversal (in the application's exposed WebView). (On Android 12 and later, this is only exploitable by third-party applications.)
|
[
"cpe:2.3:a:tiktok:tiktok:*:*:*:*:*:android:*:*"
] |
|
GHSA-29hm-v8p9-7mcg
|
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible to takeover GitLab Pages with unique domain URLs if the random string added was known.
|
[] |
|
CVE-2000-0291
|
Buffer overflow in Star Office 5.1 allows attackers to cause a denial of service by embedding a long URL within a document.
|
[
"cpe:2.3:a:sun:staroffice:5.1:*:*:*:*:*:*:*"
] |
|
GHSA-7pq2-hg75-vrf6
|
An information disclosure vulnerability exists in the cookie functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. The session cookie and the pass cookie miss the HttpOnly flag, making them accessible via JavaScript. The session cookie also misses the secure flag, which allows the session cookie to be leaked over non-HTTPS connections. This could allow an attacker to steal the session cookie via crafted HTTP requests.This vulnerabilty is for the session cookie which can be leaked via JavaScript.
|
[] |
|
CVE-2023-22575
|
Dell PowerScale OneFS 9.0.0.x - 9.4.0.x contain an insertion of sensitive information into log file vulnerability in celog. A low privileges user could potentially exploit this vulnerability, leading to information disclosure and escalation of privileges.
|
[
"cpe:2.3:o:dell:emc_powerscale_onefs:*:*:*:*:*:*:*:*"
] |
|
GHSA-8422-qvqx-f423
|
Buffer overflow in licq 1.0.4 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string of format string characters such as "%d".
|
[] |
|
CVE-2012-4429
|
Vino 2.28, 2.32, 3.4.2, and earlier allows remote attackers to read clipboard activity by listening on TCP port 5900.
|
[
"cpe:2.3:a:david_king:vino:*:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.7.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.11.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.13.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.17.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.19.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.19.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.21.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.23.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.23.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.23.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.23.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.25.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.26:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.26.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.26.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.27.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.27.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.27.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.27.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.28.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.31.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.31.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.32.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.32.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:2.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.90:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.91:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.1.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.3.92:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:david_king:vino:3.4.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-3073
|
Quaonos Schema ST4 example templates prone to XSS
|
Quanos "SCHEMA ST4" example web templates in version Bootstrap 2019 v2/2021 v1/2022 v1/2022 SP1 v1 or below are prone to JavaScript injection allowing a remote attacker to hijack existing sessions to e.g. other web services in the same environment or execute scripts in the users browser environment. The affected script is '*-schema.js'.
|
[
"cpe:2.3:o:weidmueller:19_iot_md01_lan_h4_s0011_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:19_iot_md01_lan_h4_s0011:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:fp_iot_md01_4eu_s2_00000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:fp_iot_md01_4eu_s2_00000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:fp_iot_md01_lan_s2_00000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:fp_iot_md01_lan_s2_00000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:fp_iot_md01_lan_s2_00011_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:fp_iot_md01_lan_s2_00011:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:fp_iot_md02_4eu_s3_00000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:fp_iot_md02_4eu_s3_00000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:iot-gw30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:iot-gw30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:iot-gw30-4g-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:iot-gw30-4g-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:uc20-wl2000-ac_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:uc20-wl2000-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:uc20-wl2000-iot_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:uc20-wl2000-iot:-:*:*:*:*:*:*:*"
] |
CVE-2023-22503
|
Affected versions of Atlassian Confluence Server and Data Center allow anonymous remote attackers to view the names of attachments and labels in a private Confluence space. This occurs via an Information Disclosure vulnerability in the macro preview feature.
This vulnerability was reported by Rojan Rijal of the Tinder Security Engineering team.
The affected versions are before version 7.13.15, from version 7.14.0 before 7.19.7, and from version 7.20.0 before 8.2.0.
|
[
"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-4223
|
Podcast Producer in Apple Mac OS X 10.5 before 10.5.6 allows remote attackers to bypass authentication and gain administrative access via unspecified vectors.
|
[
"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*"
] |
|
CVE-2022-0493
|
String Locator < 2.5.0 - Admin+ Arbitrary File Read
|
The String locator WordPress plugin before 2.5.0 does not properly validate the path of the files to be searched, allowing high privilege users such as admin to query arbitrary files on the web server via a path traversal vector. Furthermore, due to a flaw in the search, allowing a pattern to be provided, which will be used to output the relevant matches from the matching file, all content of the file can be disclosed.
|
[
"cpe:2.3:a:string_locator_project:string_locator:*:*:*:*:*:wordpress:*:*"
] |
CVE-2019-7005
|
Unauthenticated Information Disclosure Vulnerability in IP Office
|
A vulnerability was discovered in the web interface component of IP Office that may potentially allow a remote, unauthenticated user with network access to gain sensitive information. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 through 11.0.4.2.
|
[
"cpe:2.3:a:avaya:ip_office:*:*:*:*:*:*:*:*"
] |
GHSA-jr3c-5vfx-72q8
|
Permission control vulnerability in the network module. Successful exploitation of this vulnerability may affect service availability.
|
[] |
|
GHSA-763v-33mm-cgwq
|
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
|
[] |
|
GHSA-m3qh-v5h7-rj85
|
WebKit, as used in Apple iOS before 6.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-01-28-1.
|
[] |
|
GHSA-922c-wmf5-rmhj
|
GPAC through 2.2.1 has a use-after-free vulnerability in the function gf_bifs_flush_command_list in bifs/memory_decoder.c.
|
[] |
|
CVE-2024-1896
|
The Photo Gallery – Responsive Photo Gallery, Image Gallery, Portfolio Gallery, Logo Gallery And Team Gallery plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.1 via deserialization via shortcode of untrusted input from the 'awl_lg_settings_' attribute. This makes it possible for authenticated attackers, with contributor access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
|
[] |
|
CVE-2023-39137
|
An issue in Archive v3.3.7 allows attackers to spoof zip filenames which can lead to inconsistent filename parsing.
|
[
"cpe:2.3:a:archive_project:archive:3.3.7:*:*:*:*:*:*:*"
] |
|
GHSA-943j-jxpr-v9mq
|
libautotrace.a in AutoTrace 0.31.1 allows remote attackers to cause a denial of service (invalid write and SEGV), related to the pnm_load_ascii function in input-pnm.c:303:12.
|
[] |
|
CVE-2008-5499
|
Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.
|
[
"cpe:2.3:a:adobe:flash_player_for_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-27631
|
Cross Site Request Forgery vulnerability in GNU Savane v.3.12 and before allows a remote attacker to escalate privileges via siteadmin/usergroup.php
|
[
"cpe:2.3:a:savannah:savane:*:*:*:*:*:*:*:*"
] |
|
CVE-2007-0733
|
Unspecified vulnerability in ImageIO in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote user-assisted attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted RAW image that triggers memory corruption.
|
[
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:imageio:*:*:*:*:*:*:*:*"
] |
|
GHSA-qhx4-9cx2-q4rc
|
An issue in the Printer Manager Systm of Entrust Corp Printer Manager D3.18.4-3 and below allows attackers to execute a directory traversal via a crafted POST request.
|
[] |
|
CVE-2025-24961
|
Insecure path traversal in filesystem and filesystem-nio2 storage backends in org.gaul S3Proxy
|
org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[] |
CVE-2025-38189
|
drm/v3d: Avoid NULL pointer dereference in `v3d_job_update_stats()`
|
In the Linux kernel, the following vulnerability has been resolved:
drm/v3d: Avoid NULL pointer dereference in `v3d_job_update_stats()`
The following kernel Oops was recently reported by Mesa CI:
[ 800.139824] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000588
[ 800.148619] Mem abort info:
[ 800.151402] ESR = 0x0000000096000005
[ 800.155141] EC = 0x25: DABT (current EL), IL = 32 bits
[ 800.160444] SET = 0, FnV = 0
[ 800.163488] EA = 0, S1PTW = 0
[ 800.166619] FSC = 0x05: level 1 translation fault
[ 800.171487] Data abort info:
[ 800.174357] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[ 800.179832] CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[ 800.184873] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[ 800.190176] user pgtable: 4k pages, 39-bit VAs, pgdp=00000001014c2000
[ 800.196607] [0000000000000588] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
[ 800.205305] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[ 800.211564] Modules linked in: vc4 snd_soc_hdmi_codec drm_display_helper v3d cec gpu_sched drm_dma_helper drm_shmem_helper drm_kms_helper drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm i2c_brcmstb snd_timer snd backlight
[ 800.234448] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.25+rpt-rpi-v8 #1 Debian 1:6.12.25-1+rpt1
[ 800.244182] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT)
[ 800.250005] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 800.256959] pc : v3d_job_update_stats+0x60/0x130 [v3d]
[ 800.262112] lr : v3d_job_update_stats+0x48/0x130 [v3d]
[ 800.267251] sp : ffffffc080003e60
[ 800.270555] x29: ffffffc080003e60 x28: ffffffd842784980 x27: 0224012000000000
[ 800.277687] x26: ffffffd84277f630 x25: ffffff81012fd800 x24: 0000000000000020
[ 800.284818] x23: ffffff8040238b08 x22: 0000000000000570 x21: 0000000000000158
[ 800.291948] x20: 0000000000000000 x19: ffffff8040238000 x18: 0000000000000000
[ 800.299078] x17: ffffffa8c1bd2000 x16: ffffffc080000000 x15: 0000000000000000
[ 800.306208] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 800.313338] x11: 0000000000000040 x10: 0000000000001a40 x9 : ffffffd83b39757c
[ 800.320468] x8 : ffffffd842786420 x7 : 7fffffffffffffff x6 : 0000000000ef32b0
[ 800.327598] x5 : 00ffffffffffffff x4 : 0000000000000015 x3 : ffffffd842784980
[ 800.334728] x2 : 0000000000000004 x1 : 0000000000010002 x0 : 000000ba4c0ca382
[ 800.341859] Call trace:
[ 800.344294] v3d_job_update_stats+0x60/0x130 [v3d]
[ 800.349086] v3d_irq+0x124/0x2e0 [v3d]
[ 800.352835] __handle_irq_event_percpu+0x58/0x218
[ 800.357539] handle_irq_event+0x54/0xb8
[ 800.361369] handle_fasteoi_irq+0xac/0x240
[ 800.365458] handle_irq_desc+0x48/0x68
[ 800.369200] generic_handle_domain_irq+0x24/0x38
[ 800.373810] gic_handle_irq+0x48/0xd8
[ 800.377464] call_on_irq_stack+0x24/0x58
[ 800.381379] do_interrupt_handler+0x88/0x98
[ 800.385554] el1_interrupt+0x34/0x68
[ 800.389123] el1h_64_irq_handler+0x18/0x28
[ 800.393211] el1h_64_irq+0x64/0x68
[ 800.396603] default_idle_call+0x3c/0x168
[ 800.400606] do_idle+0x1fc/0x230
[ 800.403827] cpu_startup_entry+0x40/0x50
[ 800.407742] rest_init+0xe4/0xf0
[ 800.410962] start_kernel+0x5e8/0x790
[ 800.414616] __primary_switched+0x80/0x90
[ 800.418622] Code: 8b170277 8b160296 11000421 b9000861 (b9401ac1)
[ 800.424707] ---[ end trace 0000000000000000 ]---
[ 800.457313] ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---
This issue happens when the file descriptor is closed before the jobs
submitted by it are completed. When the job completes, we update the
global GPU stats and the per-fd GPU stats, which are exposed through
fdinfo. If the file descriptor was closed, then the struct `v3d_file_priv`
and its stats were already freed and we can't update the per-fd stats.
Therefore, if the file descriptor was already closed, don't u
---truncated---
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.