id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2021-36686
|
Cross Site Scripting (XSS) vulnerability in yapi 1.9.1 allows attackers to execute arbitrary code via the /interface/api edit page.
|
[
"cpe:2.3:a:ymfe:yapi:1.9.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-37428
|
PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties.
|
[
"cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] |
|
CVE-2021-33348
|
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.
|
[
"cpe:2.3:a:jfinal:jfinal:*:*:*:*:*:*:*:*"
] |
|
GHSA-38gh-v47f-3r7c
|
Buffer overflow in KMplayer 2.9.4.1433 and earlier allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a long string in a subtitle (.srt) playlist file. NOTE: some of these details are obtained from third party information.
|
[] |
|
CVE-2024-12610
|
School Management System for Wordpress <= 93.0.0 - Missing Authorization to Unauthenticated Arbitrary Post Deletion
|
The School Management System for Wordpress plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'mj_smgt_remove_feetype' and 'mj_smgt_remove_category_new' AJAX actions in all versions up to, and including, 93.0.0. This makes it possible for unauthenticated attackers to delete arbitrary posts.
|
[] |
GHSA-p9g5-cmfc-4v42
|
On certain Brother devices, authorization is mishandled by including a valid AuthCookie cookie in the HTTP response to a failed login attempt. Affected models are: MFC-J6973CDW MFC-J4420DW MFC-8710DW MFC-J4620DW MFC-L8850CDW MFC-J3720 MFC-J6520DW MFC-L2740DW MFC-J5910DW MFC-J6920DW MFC-L2700DW MFC-9130CW MFC-9330CDW MFC-9340CDW MFC-J5620DW MFC-J6720DW MFC-L8600CDW MFC-L9550CDW MFC-L2720DW DCP-L2540DW DCP-L2520DW HL-3140CW HL-3170CDW HL-3180CDW HL-L8350CDW HL-L2380DW ADS-2500W ADS-1000W ADS-1500W.
|
[] |
|
CVE-2013-2073
|
Transifex command-line client before 0.9 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate.
|
[
"cpe:2.3:a:transifex:transifex:*:*:*:*:*:*:*:*",
"cpe:2.3:a:transifex:transifex:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:transifex:transifex:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:transifex:transifex:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:transifex:transifex:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:transifex:transifex:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:transifex:transifex:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:transifex:transifex:0.7:*:*:*:*:*:*:*"
] |
|
GHSA-x9vx-jm6h-mwx9
|
The FireCask Like & Share Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'width' parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] |
|
GHSA-834c-mvqv-5x66
|
An out of bounds memory access vulnerability in ONLYOFFICE DocumentServer 4.0.3 through 7.3.2 allows remote attackers to run arbitrary code via crafted JavaScript file.
|
[] |
|
GHSA-g8p5-fw36-3r3c
|
The NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication to obtain system information, disable logging, or modify caches.
|
[] |
|
GHSA-9f39-22hh-742x
|
Docebo 3.5.0.3 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) class/class.conf_fw.php, (2) class.module/class.event_manager.php, (3) lib/lib.domxml5.php, or (4) menu/menu_over.php in doceboCore/; or (5) class/class.conf_cms.php, (6) lib/lib.compose.php, (7) modules/chat/teleskill.php, or (8) class/class.admin_menu_cms.php in doceboCms/; which reveals the installation path in an error message.
|
[] |
|
GHSA-36gp-vxxv-fjf3
|
Cross-site scripting (XSS) vulnerability in thumbs.php in mmgallery 1.55 allows remote attackers to inject arbitrary web script or HTML via the page parameter.
|
[] |
|
CVE-2022-32372
|
itsourcecode Advanced School Management System v1.0 is vulnerable to SQL Injection via /school/model/get_subject.php?id=.
|
[
"cpe:2.3:a:advanced_school_management_system_project:advanced_school_management_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-868p-jhqw-wrgr
|
Plack-Middleware-Session before version 0.35 for Perl generates session ids insecurely.The default session id generator returns a SHA-1 hash seeded with the built-in rand function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage.Predicable session ids could allow an attacker to gain access to systems.
|
[] |
|
GHSA-p87g-jvpm-qw44
|
Leif M. Wright's Blog 3.5 stores the config file and other txt files under the web root with insufficient access control, which allows remote attackers to read the administrator's password.
|
[] |
|
CVE-2022-0301
|
Heap buffer overflow in DevTools in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-prqh-6jh9-2qr5
|
The AI Power: Complete AI Pack plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.8.96 via the wpaicg_troubleshoot_add_vector(). This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
|
[] |
|
GHSA-r76x-vv2v-w2xj
|
Multiple cross-site request forgery (CSRF) and cross-site scripting (XSS) vulnerabilities in Axous 1.1.1 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator account via an addnew action to admin/administrators_add.php; or (2) conduct cross-site scripting (XSS) attacks via the page_title parameter to admin/content_pages_edit.php; the (3) category_name[] parameter to admin/products_category.php; the (4) site_name, (5) seo_title, or (6) meta_keywords parameter to admin/settings_siteinfo.php; the (7) company_name, (8) address1, (9) address2, (10) city, (11) state, (12) country, (13) author_first_name, (14) author_last_name, (15) author_email, (16) contact_first_name, (17) contact_last_name, (18) contact_email, (19) general_email, (20) general_phone, (21) general_fax, (22) sales_email, (23) sales_phone, (24) support_email, or (25) support_phone parameter to admin/settings_company.php; or the (26) system_email, (27) sender_name, (28) smtp_server, (29) smtp_username, (30) smtp_password, or (31) order_notice_email parameter to admin/settings_email.php.
|
[] |
|
GHSA-c7v8-6m32-34m3
|
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party.
|
[] |
|
CVE-2021-23495
|
Open Redirect
|
The package karma before 6.3.16 are vulnerable to Open Redirect due to missing validation of the return_url query parameter.
|
[
"cpe:2.3:a:karma_project:karma:*:*:*:*:*:node.js:*:*"
] |
GHSA-2wcr-87wf-cf9j
|
Kiwi TCMS Stored Cross-site Scripting via SVG file
|
ImpactKiwi TCMS accepts SVG files uploaded by users which could potentially contain JavaScript code. If SVG images are viewed directly, i.e. not rendered in an HTML page, this JavaScript code could execute.PatchesThis vulnerability has been fixed by configuring Kiwi TCMS to serve with the Content-Security-Policy HTTP header which blocks inline JavaScript in all modern browsers.WorkaroundsConfigure Content-Security-Policy header, see [commit 6617cee0](https://github.com/kiwitcms/Kiwi/commit/6617cee0fb70cc394b7be6bbc86ef84e6e9de077).ReferencesYou can visit https://digi.ninja/blog/svg_xss.php for more technical details.Independently disclosed by [Antonio Spataro](https://huntr.dev/bounties/bf99001b-a0a2-4f7d-98cd-983bc7f14a69/) and [@1d8](https://huntr.dev/bounties/f8c73bcc-02f3-4c65-a92b-1caa4d67c2fd/).
|
[] |
GHSA-pvqh-87f4-9m84
|
The Media Snapshot implementation on Cisco TelePresence Multipoint Switch (CTMS) devices allows remote authenticated users to cause a denial of service (device reload) by sending many Media Snapshot requests at the time of a meeting termination, aka Bug ID CSCuh44796.
|
[] |
|
GHSA-pq67-9jf9-hc3c
|
JDBC URL bypassing by allowLoadLocalInfileInPath param
|
Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0.The attacker could bypass the current logic and achieve arbitrary file reading. To solve it, users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8130 .
|
[] |
CVE-2017-12317
|
The Cisco AMP For Endpoints application allows an authenticated, local attacker to access a static key value stored in the local application software. The vulnerability is due to the use of a static key value stored in the application used to encrypt the connector protection password. An attacker could exploit this vulnerability by gaining local, administrative access to a Windows host and stopping the Cisco AMP for Endpoints service. Cisco Bug IDs: CSCvg42904.
|
[
"cpe:2.3:a:cisco:advanced_malware_protection:3.1\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:3.1\\(15\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.1\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.2\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.3\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.4\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:4.4\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.0\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.0\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.1\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.1\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.1\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:5.1\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:advanced_malware_protection:6.0\\(1\\):*:*:*:*:*:*:*"
] |
|
CVE-2021-1398
|
Cisco IOS XE Software Arbitrary Code Execution Vulnerability
|
A vulnerability in the boot logic of Cisco IOS XE Software could allow an authenticated, local attacker with level 15 privileges or an unauthenticated attacker with physical access to execute arbitrary code on the underlying Linux operating system of an affected device. This vulnerability is due to incorrect validations of specific function arguments that are passed to the boot script. An attacker could exploit this vulnerability by tampering with a specific file, which an affected device would process during the initial boot process. On systems that are protected by the Unified Extensible Firmware Interface (UEFI) secure boot feature, a successful exploit could allow the attacker to execute unsigned code at boot time and bypass the image verification check in the secure boot process of the affected device.
|
[
"cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.0xas:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.0xbs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.0xas:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1xbs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1xcs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.10s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.10as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.8sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1za:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*"
] |
CVE-2025-23448
|
WordPress visualslider Sldier plugin <= 1.1.1 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dastan800 visualslider Sldier allows Reflected XSS. This issue affects visualslider Sldier: from n/a through 1.1.1.
|
[] |
GHSA-w5w3-5g8c-cmq9
|
Adobe Bridge versions 10.0.3 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] |
|
GHSA-rxhx-m8c2-3qx9
|
Unspecified vulnerability in IBM Tivoli Storage Manager for Space Management (aka TSM HSM) before 6.2.5.0 and 6.3.x before 6.3.1.0 allows local users to read or modify file system objects via unknown vectors.
|
[] |
|
CVE-2015-6548
|
Multiple SQL injection vulnerabilities in a PHP script in the management console on Symantec Web Gateway (SWG) appliances with software before 5.2.2 DB 5.0.0.1277 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
|
[
"cpe:2.3:a:symantec:web_gateway:*:*:*:*:*:*:*:*"
] |
|
GHSA-995r-hfcw-r5pv
|
A reflected cross-site scripting (XSS) vulnerability exists in Brocade Webtools PortSetting.html of Brocade Fabric OS version before Brocade Fabric OS v9.2.0 that could allow a remote unauthenticated attacker to execute arbitrary JavaScript code in a target user’s session with the Brocade Webtools application.
|
[] |
|
GHSA-754f-8gm6-c4r2
|
Ruby SAML allows a SAML authentication bypass due to namespace handling (parser differential)
|
SummaryAn authentication bypass vulnerability was found in ruby-saml due to a parser differential.
ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack.ImpactThis issue may lead to authentication bypass.
|
[] |
CVE-2016-4412
|
An issue was discovered in phpMyAdmin. A user can be tricked into following a link leading to phpMyAdmin, which after authentication redirects to another malicious site. The attacker must sniff the user's valid phpMyAdmin token. All 4.0.x versions (prior to 4.0.10.16) are affected.
|
[
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.10.15:*:*:*:*:*:*:*"
] |
|
GHSA-9prh-257w-9277
|
Cross-Site Scripting in handlebars
|
Versions of `handlebars` prior to 4.0.0 are affected by a cross-site scripting vulnerability when attributes in handlebar templates are not quoted.Proof of ConceptTemplate:
```<a href={{foo}}/>```Input:
```{ 'foo' : 'test.com onload=alert(1)'}```Rendered result:
```<a href=test.com onload=alert(1)/>```RecommendationUpdate to version 4.0.0 or later.
Alternatively, ensure that all attributes in handlebars templates are encapsulated with quotes.
|
[] |
CVE-2017-9416
|
Directory traversal vulnerability in tools.file_open in Odoo 8.0, 9.0, and 10.0 allows remote authenticated users to read arbitrary local files readable by the Odoo service.
|
[
"cpe:2.3:a:odoo:odoo:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:odoo:odoo:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:odoo:odoo:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-26rx-x3cw-r9p9
|
Multiple SQL injection vulnerabilities in index.php and other pages in Beehive Forum allow remote attackers to execute arbitrary SQL commands via the webtag parameter.
|
[] |
|
GHSA-rjwx-m7rg-3cgx
|
Multiple unspecified vulnerabilities in IBM WebSphere Application Server before 6.1.0.1 have unspecified impact and attack vectors involving (1) "SOAP requests and responses", (2) mbean, (3) ThreadIdentitySupport, and possibly others.
|
[] |
|
CVE-2025-23151
|
bus: mhi: host: Fix race between unprepare and queue_buf
|
In the Linux kernel, the following vulnerability has been resolved:
bus: mhi: host: Fix race between unprepare and queue_buf
A client driver may use mhi_unprepare_from_transfer() to quiesce
incoming data during the client driver's tear down. The client driver
might also be processing data at the same time, resulting in a call to
mhi_queue_buf() which will invoke mhi_gen_tre(). If mhi_gen_tre() runs
after mhi_unprepare_from_transfer() has torn down the channel, a panic
will occur due to an invalid dereference leading to a page fault.
This occurs because mhi_gen_tre() does not verify the channel state
after locking it. Fix this by having mhi_gen_tre() confirm the channel
state is valid, or return error to avoid accessing deinitialized data.
[mani: added stable tag]
|
[] |
CVE-2023-23501
|
The issue was addressed with improved memory handling This issue is fixed in macOS Ventura 13.2. An app may be able to disclose kernel memory.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-26037
|
[20210703] - Core - Lack of enforced session termination
|
An issue was discovered in Joomla! 2.5.0 through 3.9.27. CMS functions did not properly termine existing user sessions when a user's password was changed or the user was blocked.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
GHSA-vg3g-97mm-4p4w
|
In Silex SX-500 all versions and GE MobileLink(GEH-500) version 1.54 and prior, authentication is not verified when making certain POST requests, which may allow attackers to modify system settings.
|
[] |
|
GHSA-8q69-632c-rphr
|
Beck GmbH IPC@Chip TelnetD service supports only one connection and does not disconnect a user who does not complete the login process, which allows remote attackers to lock out the administrator account by connecting to the service.
|
[] |
|
CVE-2003-0117
|
Buffer overflow in the HTTP receiver function (BizTalkHTTPReceive.dll ISAPI) of Microsoft BizTalk Server 2002 allows attackers to execute arbitrary code via a certain request to the HTTP receiver.
|
[
"cpe:2.3:a:microsoft:biztalk_server:2002:*:developer:*:*:*:*:*",
"cpe:2.3:a:microsoft:biztalk_server:2002:*:enterprise:*:*:*:*:*"
] |
|
CVE-2020-4951
|
IBM Cognos Analytics 11.1.7 and 11.2.0 contains locally cached browser data, that could allow a local attacker to obtain sensitive information.
|
[
"cpe:2.3:a:ibm:cognos_analytics:11.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_analytics:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] |
|
GHSA-2h84-2j8q-rcf8
|
The User Email Verification for WooCommerce plugin for WordPress is vulnerable to authentication bypass via authenticate_user_by_email in versions up to, and including, 3.5.0. This is due to a random token generation weakness in the resend_verification_email function. This allows unauthenticated attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Allow Automatic Login After Successful Verification setting to be enabled, which it is not by default.
|
[] |
|
CVE-2024-23614
|
Symantec Messaging Gateway Buffer Overflow
|
A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.
|
[
"cpe:2.3:a:broadcom:symantec_messaging_gateway:*:*:*:*:*:*:*:*"
] |
GHSA-6frf-vfxm-qwfx
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in primersoftware Primer MyData for Woocommerce allows Reflected XSS. This issue affects Primer MyData for Woocommerce: from n/a through n/a.
|
[] |
|
CVE-2022-43074
|
AyaCMS v3.1.2 was discovered to contain an arbitrary file upload vulnerability via the component /admin/fst_upload.inc.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
|
[
"cpe:2.3:a:ayacms_project:ayacms:3.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2024-49597
|
Dell Wyse Management Suite, versions WMS 4.4 and prior, contain an Improper Restriction of Excessive Authentication Attempts vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass.
|
[] |
|
GHSA-486g-47cc-8wxf
|
aiocpa contains credential harvesting code
|
aiocpa is a user-facing library for generating color gradients of text. Version 0.1.13 introduced obfuscated, malicious code targeting Crypto Pay users, forwarding client credentials to a remote Telegram bot. All versions have been removed from PyPI.
|
[] |
CVE-2003-0562
|
Buffer overflow in the CGI2PERL.NLM PERL handler in Novell Netware 5.1 and 6.0 allows remote attackers to cause a denial of service (ABEND) via a long input string.
|
[
"cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:5.1:sp4:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:5.1:sp6:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.0:sp2:*:*:*:*:*:*"
] |
|
GHSA-6crj-4242-77vf
|
Cisco NX-OS 6.1(2)I2(1) on Nexus 9000 switches does not properly process packet-drop policy checks for logged packets, which allows remote attackers to bypass intended access restrictions via a flood of packets matching a policy that contains the log keyword, aka Bug ID CSCuo02489.
|
[] |
|
GHSA-c32v-87jx-j2pr
|
The Guitar Tuner Free - GuitarTuna (aka com.ovelin.guitartuna) application 2.4.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] |
|
GHSA-6pvp-9849-7r9r
|
Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Database Server 11.1.0.7, 11.2.0.2, and 11.2.0.3, and Oracle Enterprise Manager Grid Control 10.2.0.5 and 11.1.0.1, allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Enterprise Config Management.
|
[] |
|
GHSA-rmp7-f2vp-3rq4
|
Cross-site scripting in SiCKRAGE
|
in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.
|
[] |
GHSA-7h23-q895-993p
|
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, Possible buffer overflow in WLAN function due to lack of input validation in values received from firmware.
|
[] |
|
CVE-2015-3813
|
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
|
[
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*"
] |
|
CVE-2014-8010
|
The web framework in Cisco Unified Communications Domain Manager 8 allows remote authenticated administrators to execute arbitrary OS commands via crafted values, aka Bug ID CSCuq50205.
|
[
"cpe:2.3:a:cisco:unified_communications_domain_manager:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-3858
|
Cross-Site Request Forgery (CSRF) in snipe/snipe-it
|
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
|
[
"cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*"
] |
GHSA-r2x4-9wvq-fqx2
|
IBM Cloud Orchestrator could allow a local authenticated attacker to cause the server to slow down for a short period of time by using a specially crafted and malformed URL.
|
[] |
|
CVE-2024-4638
|
OnCell G3470A-LTE Series: Authenticated Command Injection via webUploadKey
|
OnCell G3470A-LTE Series firmware versions v1.7.7 and prior have been identified as vulnerable due to a lack of neutralized inputs in the web key upload function. An attacker could modify the intended commands sent to target functions, which could cause malicious users to execute unauthorized commands.
|
[
"cpe:2.3:h:moxa:oncell_g3470a-lte-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3470a-lte-eu-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3470a-lte-eu-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3470a-lte-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3470a-lte-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3470a-lte-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:oncell_g3470a-lte-us-t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3470a-lte-us-t:-:*:*:*:*:*:*:*"
] |
CVE-2013-6276
|
QNAP F_VioCard 2312 and F_VioGate 2308 have hardcoded entries in authorized_keys files. NOTE: 1. All active models are not affected. The last affected model was EOL since 2010. 2. The legacy authorization mechanism is no longer adopted in all active models
|
[
"cpe:2.3:o:qnap:viocard-30_firmware:2312_2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:qnap:viocard-30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:viocard-100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qnap:viocard-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:viocard-300_firmware:rc_b3722:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:viocard-300_firmware:rs_b4631:*:*:*:*:*:*:*",
"cpe:2.3:h:qnap:viocard-300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:viogate-340a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qnap:viogate-340a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qnap:viogate-340_firmware:2308_2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:qnap:viogate-340:-:*:*:*:*:*:*:*"
] |
|
GHSA-vvw2-8cx5-fgfv
|
Ecovacs Home Android and iOS Mobile Applications up to version 3.3.0 contained embedded access keys and secrets for Alibaba Object Storage Service (OSS), leading to sensitive data disclosure.
|
[] |
|
GHSA-h7jr-j6p8-85m6
|
In the Linux kernel, the following vulnerability has been resolved:nfc: nci: assert requested protocol is validThe protocol is used in a bit mask to determine if the protocol is
supported. Assert the provided protocol is less than the maximum
defined so it doesn't potentially perform a shift-out-of-bounds and
provide a clearer error for undefined protocols vs unsupported ones.
|
[] |
|
GHSA-66cp-42qw-2cw2
|
Cross Site Scripting (XSS) vulnerability in Name Input Field in Contact Us form in Laborator Kalium before 3.0.4, allows remote attackers to execute arbitrary code.
|
[] |
|
GHSA-w4v2-45q6-wrv6
|
Remote Procedure Call Runtime Remote Code Execution Vulnerability
|
[] |
|
CVE-2022-24003
|
Exposure of Sensitive Information vulnerability in Bixby Vision prior to version 3.7.50.6 allows attackers to access internal data of Bixby Vision via unprotected intent.
|
[
"cpe:2.3:a:samsung:bixby_vision:*:*:*:*:*:*:*:*"
] |
|
GHSA-289c-grq2-86fp
|
In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09121847; Issue ID: MSV-1821.
|
[] |
|
GHSA-ggpm-9q87-cq9w
|
A vulnerability was found in D-Link DI-8100 1.0. It has been declared as critical. Affected by this vulnerability is the function sprintf of the file /ddns.asp?opt=add of the component jhttpd. The manipulation of the argument mx leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
CVE-2013-2412
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.
|
[
"cpe:2.3:a:oracle:jre:*:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update43:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*"
] |
|
CVE-2022-3831
|
reCAPTCHA <= 1.6 - Admin+ Stored XSS
|
The reCAPTCHA WordPress plugin through 1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[
"cpe:2.3:a:recaptcha_project:recaptcha:*:*:*:*:*:wordpress:*:*"
] |
CVE-2012-2273
|
Comodo Internet Security before 5.10.228257.2253 on Windows 7 x64 allows local users to cause a denial of service (system crash) via a crafted 32-bit Portable Executable (PE) file with a kernel ImageBase value.
|
[
"cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.4.189822.1355:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.5.195786.1383:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.8.211697.2124:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.8.213334.2131:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.9.219863.2196:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-31875
|
WordPress FancyPost plugin <= 6.0.1 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pluginic FancyPost allows DOM-Based XSS. This issue affects FancyPost: from n/a through 6.0.1.
|
[] |
GHSA-69j5-58xf-9g4v
|
System command injection in formAliasIp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "ipAddr" POST parameter.
|
[] |
|
CVE-2020-2813
|
Vulnerability in the Oracle Email Center product of Oracle E-Business Suite (component: KB Search). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Email Center accessible data as well as unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[
"cpe:2.3:a:oracle:email_center:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-2989
|
The file-copying functionality in IBM Sterling Connect:Direct 3.8.00, 4.0.00, and 4.1.0 for UNIX on AIX 6.1 through 7.1 uses incorrect privileges, which allows local users to bypass filesystem read permissions and write permissions by leveraging authentication to the Connect:Direct product.
|
[
"cpe:2.3:a:ibm:sterling_connect:3.8.00:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_connect:4.0.00:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_connect:4.1.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2005-3355
|
Directory traversal vulnerability in GNU Gnump3d before 2.9.8 has unknown impact via "CGI parameters, and cookie values".
|
[
"cpe:2.3:a:gnu:gnump3d:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.7:*:*:*:*:*:*:*"
] |
|
CVE-2018-13039
|
OpenSID 18.06-pasca has reflected Cross Site Scripting (XSS) via the cari parameter, aka an index.php/first?cari= URI.
|
[
"cpe:2.3:a:opendesa:opensid:18.06-pasca:*:*:*:*:*:*:*"
] |
|
GHSA-m4xv-qghp-87pg
|
The mintToken function of a smart contract implementation for MVGcoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[] |
|
GHSA-676m-3h9r-639c
|
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0754.
|
[] |
|
CVE-2021-44465
|
Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows authenticated attackers to subscribe to receive future notifications and comments related to arbitrary business records in the system, via crafted RPC requests.
|
[
"cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*"
] |
|
GHSA-fvm6-5hp4-h63x
|
Cross-site scripting (XSS) vulnerability in vbugs.php in Dark_Wizard vBug Tracker 3.5.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the sortorder parameter.
|
[] |
|
GHSA-2r6v-6pxx-64x8
|
A uncontrolled search path element issue was discovered in Vyaire Medical CareFusion Upgrade Utility used with Windows XP systems, Versions 2.0.2.2 and prior versions. A successful exploit of this vulnerability requires the local user to install a crafted DLL on the target machine. The application loads the DLL and gives the attacker access at the same privilege level as the application.
|
[] |
|
GHSA-2gh8-q6wj-fwpq
|
Cross-site scripting (XSS) vulnerability in the Devel module before 5.x-0.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via a site variable, related to lack of escaping of the variable table.
|
[] |
|
CVE-2019-19791
|
In LemonLDAP::NG (aka lemonldap-ng) before 2.0.7, the default Apache HTTP Server configuration does not properly restrict access to SOAP/REST endpoints (when some LemonLDAP::NG setup options are used). For example, an attacker can insert index.fcgi/index.fcgi into a URL to bypass a Require directive.
|
[
"cpe:2.3:a:lemonldap-ng:lemonldap\\:\\:ng:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-43814
|
goTenna Pro ATAK Plugin Insertion of Sensitive Information Into Sent Data
|
The goTenna Pro ATAK Plugin's default settings are to share Automatic
Position, Location, and Information (PLI) updates every 60 seconds once
the plugin is active and goTenna is connected. Users that are unaware of
their settings and have not activated encryption before a mission may
accidentally broadcast their location unencrypted. It is advised to
verify PLI settings are the desired rate and activate encryption prior
to mission. Update to the latest Plugin to disable this default setting.
|
[
"cpe:2.3:a:gotenna:gotenna:*:*:*:*:*:atak:*:*"
] |
GHSA-gp6g-hx5f-3rj3
|
In JetBrains YouTrack before 2025.1.74704 restricted attachments could become visible after issue cloning
|
[] |
|
GHSA-8cpf-6gm8-536g
|
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5. A remote attacker may be able to leak memory.
|
[] |
|
GHSA-rg59-mcvr-3whr
|
H3C N12 V100R005 contains a buffer overflow vulnerability due to the lack of length verification in the 2.4G wireless network processing function. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands by sending a POST request to /bin/webs.
|
[] |
|
CVE-2020-12707
|
An XSS vulnerability exists in modules/wysiwyg/save.php of LeptonCMS 4.5.0. This can be exploited because the only security measure used against XSS is the stripping of SCRIPT elements. A malicious actor can use HTML event handlers to run JavaScript instead of using SCRIPT elements.
|
[
"cpe:2.3:a:lepton-cms:lepton_cms:4.5.0:*:*:*:*:*:*:*"
] |
|
CVE-2013-4414
|
Cross-site scripting (XSS) vulnerability in the web interface for cumin in Red Hat Enterprise MRG Grid 2.4 allows remote attackers to inject arbitrary web script or HTML via the "Max allowance" field in the "Set limit" form.
|
[
"cpe:2.3:o:redhat:enterprise_mrg:2.4:*:*:*:*:*:*:*"
] |
|
GHSA-gj77-59wh-66hg
|
Regular Expression Denial of Service (ReDoS) in Prism
|
Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS).ImpactWhen Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. Do not use the following languages to highlight untrusted text.ASCIIDocERBOther languages are __not__ affected and can be used to highlight untrusted text.PatchesThis problem has been fixed in Prism v1.24.ReferencesPrismJS/prism#2774PrismJS/prism#2688
|
[] |
CVE-2011-4218
|
Investintech.com SlimPDF Reader does not prevent faulting-instruction data from affecting write operations, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document.
|
[
"cpe:2.3:a:investintech:slimpdf_reader:*:*:*:*:*:*:*:*"
] |
|
GHSA-vg3q-rcxr-8qqv
|
Ubiquiti UCRM versions 2.3.0 to 2.7.7 allow an authenticated user to read arbitrary files in the local file system. Note that by default, the local file system is isolated in a docker container. Successful exploitation requires valid credentials to an account with "Edit" access to "System Customization".
|
[] |
|
CVE-2021-45715
|
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_window_function has a use-after-free.
|
[
"cpe:2.3:a:rusqlite_project:rusqlite:*:*:*:*:*:rust:*:*"
] |
|
GHSA-4whf-mx4r-v53w
|
IBM Spectrum Scale 4.2 and 5.0 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 172093.
|
[] |
|
CVE-2014-0625
|
The SSLSocket implementation in the (1) JSAFE and (2) JSSE APIs in EMC RSA BSAFE SSL-J 5.x before 5.1.3 and 6.x before 6.0.2 allows remote attackers to cause a denial of service (memory consumption) by triggering application-data processing during the TLS handshake, a time at which the data is internally buffered.
|
[
"cpe:2.3:a:dell:bsafe_ssl-j:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:bsafe_ssl-j:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_bsafe_ssl-j:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_bsafe_ssl-j:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_bsafe_ssl-j:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_bsafe_ssl-j:6.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-6gv9-qq2x-7jw6
|
Open Ticket Request System (OTRS) before 2.4.10, and 3.x before 3.0.3, does not present warnings about incoming encrypted e-mail messages that were based on revoked PGP or GPG keys, which makes it easier for remote attackers to spoof e-mail communication by leveraging a key that has a revocation signature.
|
[] |
|
CVE-2022-43104
|
Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the wpapsk_crypto parameter in the fromSetWirelessRepeat function.
|
[
"cpe:2.3:o:tenda:ac23_firmware:16.03.07.45_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac23:-:*:*:*:*:*:*:*"
] |
|
GHSA-68g3-xvmv-w62w
|
Insufficient control flow management for some Intel(R) Xeon Processors may allow an authenticated user to potentially enable denial of service via local access.
|
[] |
|
CVE-2002-0685
|
Heap-based buffer overflow in the message decoding functionality for PGP Outlook Encryption Plug-In, as used in NAI PGP Desktop Security 7.0.4, Personal Security 7.0.3, and Freeware 7.0.3, allows remote attackers to modify the heap and gain privileges via a large, malformed mail message.
|
[
"cpe:2.3:a:pgp:desktop_security:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pgp:freeware:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pgp:personal_security:7.0.3:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.