id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
GHSA-h97c-73pq-vfhg
The datamover module in the Linux version of NovaBACKUP DataCenter before 09.06.03.0353 is vulnerable to remote command execution via unspecified attack vectors.
[]
GHSA-6p6f-fgwm-2pr9
The WP Video Lightbox WordPress plugin before 1.9.3 does not escape the attributes of its shortcodes, allowing users with a role as low as contributor to perform Cross-Site Scripting attacks
[]
GHSA-2g3q-pfmx-p47f
A reflected Cross-Site-Scripting (XSS) vulnerability in Fortinet FortiSandbox before 3.0 may allow an attacker to execute unauthorized code or commands via the back_url parameter in the file scan component.
[]
CVE-2021-41140
Reactions leak for secure category topics and private messages
Discourse-reactions is a plugin for the Discourse platform that allows user to add their reactions to the post. In affected versions reactions given by user to secure topics and private messages are visible. This issue is patched in version 0.2 of discourse-reaction. Users who are unable to update are advised to disable the Discourse-reactions plugin in admin panel.
[ "cpe:2.3:a:discourse:discourse_reactions:*:*:*:*:*:discourse:*:*" ]
GHSA-r9w9-5fvc-mjjw
Information exposure vulnerability in /usr/syno/etc/mount.conf in Synology DiskStation Manager (DSM) before 6.2.1-23824 allows remote authenticated users to obtain sensitive information via the world readable configuration.
[]
CVE-2009-4856
Cross-site scripting (XSS) vulnerability in subitems.php in PHP Easy Shopping Cart 3.1R allows remote attackers to inject arbitrary web script or HTML via the name parameter.
[ "cpe:2.3:a:ecomstudio:php_easy_shopping_cart:3.1r:*:*:*:*:*:*:*" ]
CVE-2021-30938
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.1, Security Update 2021-008 Catalina, macOS Big Sur 11.6.2. A local user may be able to cause unexpected system termination or read kernel memory.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
GHSA-22m6-3h9c-gw7v
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
CVE-2024-32536
WordPress WP TradingView plugin <= 1.7 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Trade Pips WP TradingView allows Stored XSS.This issue affects WP TradingView: from n/a through 1.7.
[]
CVE-2018-8500
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore.
[ "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*" ]
GHSA-xm5g-27h5-6568
Insufficient boundary checks when processing the JPEG APP12 block marker in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.
[]
CVE-2021-26732
spx_restservice First_network_func Broken Access Control
A broken access control vulnerability in the First_network_func function of spx_restservice allows an attacker to arbitrarily change the network configuration of the BMC. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
[ "cpe:2.3:o:lannerinc:iac-ast2500a_firmware:1.10.0:*:*:*:*:*:*:*", "cpe:2.3:h:lannerinc:iac-ast2500a:-:*:*:*:*:*:*:*" ]
CVE-2008-6208
Cross-site scripting (XSS) vulnerability in submitnews.php in e107 CMS 0.7.11 allows remote attackers to inject arbitrary web script or HTML via the (1) author_name, (2) itemtitle, and (3) item parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*" ]
CVE-2023-40273
Session fixation in Apache Airflow web interface
The session fixation vulnerability allowed the authenticated user to continue accessing Airflow webserver even after the password of the user has been reset by the admin - up until the expiry of the session of the user. Other than manually cleaning the session database (for database session backend), or changing the secure_key and restarting the webserver, there were no mechanisms to force-logout the user (and all other users with that). With this fix implemented, when using the database session backend, the existing sessions of the user are invalidated when the password of the user is reset. When using the securecookie session backend, the sessions are NOT invalidated and still require changing the secure key and restarting the webserver (and logging out all other users), but the user resetting the password is informed about it with a flash message warning displayed in the UI. Documentation is also updated explaining this behaviour. Users of Apache Airflow are advised to upgrade to version 2.7.0 or newer to mitigate the risk associated with this vulnerability.
[ "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*" ]
CVE-2007-2029
File descriptor leak in the PDF handler in Clam AntiVirus (ClamAV) allows remote attackers to cause a denial of service via a crafted PDF file.
[ "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:s-390:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*", "cpe:2.3:a:clam_anti-virus:clamav:0.84_rc2:*:*:*:*:*:*:*" ]
GHSA-hvw3-p9px-gpc9
Gophish before 0.12.0 vulnerable to Open Redirect
This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue("next")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\\\\example.com, browser will redirect user to http://example.com.
[]
GHSA-8jxr-mccc-mwg8
OpenC3 Path Traversal via screen controller (`GHSL-2024-127`)
SummaryA path traversal vulnerability inside of `LocalMode`'s `open_local_file` method allows an authenticated user with adequate permissions to download any `.txt` via the `ScreensController#show` on the web server COSMOS is running on (depending on the file permissions).Note: This CVE affects all OpenC3 COSMOS EditionsImpactThis issue may lead to Information Disclosure.
[]
GHSA-whxp-g4qm-8ppv
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4095, CVE-2014-4096, and CVE-2014-4101.
[]
CVE-2013-0902
Use-after-free vulnerability in the frame-loader implementation in Google Chrome before 25.0.1364.152 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.66:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.68:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.70:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.72:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.73:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.74:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.75:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.76:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.77:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.78:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.79:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.80:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.81:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.82:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.87:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.90:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.95:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.98:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.99:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.108:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.110:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.112:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.113:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.114:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.115:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.116:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.117:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.118:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.119:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.120:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.121:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.122:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.123:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.124:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:25.0.1364.125:*:*:*:*:*:*:*" ]
CVE-2019-15628
Trend Micro Security (Consumer) 2020 (v16.0.1221 and below) is affected by a DLL hijacking vulnerability that could allow an attacker to use a specific service as an execution and/or persistence mechanism which could execute a malicious program each time the service is started.
[ "cpe:2.3:a:trendmicro:antivirus_\\+_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:internet_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:maximum_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:a:trendmicro:premium_security_2020:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2012-6431
Symfony 2.0.x before 2.0.20 does not process URL encoded data consistently within the Routing and Security components, which allows remote attackers to bypass intended URI restrictions via a doubly encoded string.
[ "cpe:2.3:a:sensiolabs:symfony:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:sensiolabs:symfony:2.0.19:*:*:*:*:*:*:*" ]
CVE-2020-29373
An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-g7jw-cx45-fr8v
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
[]
GHSA-m5p3-mj92-rxf2
The runtime WS component in the server in EMC RSA Access Manager 6.1.3 before 6.1.3.39, 6.1.4 before 6.1.4.22, 6.2.0 before 6.2.0.11, and 6.2.1 before 6.2.1.03, when INFO logging is enabled, allows local users to discover cleartext passwords by reading log files.
[]
CVE-2014-6482
Unspecified vulnerability in the PeopleSoft Enterprise PT PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote authenticated users to affect integrity via unknown vectors related to Updates Change Assistant.
[ "cpe:2.3:a:oracle:peoplesoft_products:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_products:8.54:*:*:*:*:*:*:*" ]
GHSA-h983-5xhq-c3g4
SQL injection vulnerability in index.php in the gallery module in Easy-Clanpage 2.2 allows remote attackers to execute arbitrary SQL commands via the id parameter in a kate action.
[]
GHSA-vqvc-vrx3-5hgj
Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
[]
GHSA-32w9-2qpc-5f9v
Docker image code execution with Apache Mesos
A specifically crafted Docker image running under the root user can overwrite the init helper binary of the container runtime and/or the command executor in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.2, 1.6.0 to 1.6.1, and 1.7.0 to 1.7.1. A malicious actor can therefore gain root-level code execution on the host.
[]
CVE-2024-37768
14Finger v1.1 was discovered to contain an arbitrary user deletion vulnerability via the component /api/admin/user?id.
[ "cpe:2.3:a:b1ackc4t:14finger:1.1:*:*:*:*:*:*:*" ]
CVE-2022-49246
ASoC: atmel: Fix error handling in snd_proto_probe
In the Linux kernel, the following vulnerability has been resolved: ASoC: atmel: Fix error handling in snd_proto_probe The device_node pointer is returned by of_parse_phandle() with refcount incremented. We should use of_node_put() on it when done. This function only calls of_node_put() in the regular path. And it will cause refcount leak in error paths. Fix this by calling of_node_put() in error handling too.
[]
GHSA-c8c9-8hjq-h3jw
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, CVE-2016-4104, and CVE-2016-4105.
[]
GHSA-34rf-vmxr-2fgx
The Happyforms WordPress plugin before 1.22.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[]
GHSA-34v3-rp23-947c
A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[]
CVE-2025-6839
Conjure Position Department Service Quality Evaluation System head.php eval backdoor
A vulnerability, which was classified as critical, has been found in Conjure Position Department Service Quality Evaluation System up to 1.0.11. Affected by this issue is the function eval of the file public/assets/less/bootstrap-less/mixins/head.php. The manipulation of the argument payload leads to backdoor. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-7859-hq37-wvr5
Cross-site request forgery (CSRF) vulnerability in Elasticsearch Kibana before 4.1.3 and 4.2.x before 4.2.1 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
[]
GHSA-pc3x-h9m3-qrcq
The software performs an operation at a privilege level higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses on the Reason DR60 (all firmware versions prior to 02A04.1).
[]
CVE-2012-4110
run-script in the fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to gain privileges by embedding commands in an unspecified parameter, aka Bug ID CSCtq86560.
[ "cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*" ]
GHSA-jj7w-f4w9-4fw7
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4080, CVE-2014-4089, and CVE-2014-4102.
[]
CVE-2024-8388
Multiple prompts and panels from both Firefox and the Android OS could be used to obscure the notification announcing the transition to fullscreen mode after the fix for CVE-2023-6870 in Firefox 121. This could lead to spoofing the browser UI if the sudden appearance of the prompt distracted the user from noticing the visual transition happening behind the prompt. These notifications now use the Android Toast feature. *This bug only affects Firefox on Android. Other operating systems are unaffected.* This vulnerability affects Firefox < 130.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
GHSA-cpgg-vc4m-4j8x
Vulnerability in the Enterprise Manager Ops Center component of Oracle Enterprise Manager Products Suite (subcomponent: Networking). The supported version that is affected is 12.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Enterprise Manager Ops Center. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Ops Center accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Ops Center accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).
[]
CVE-2014-0853
Multiple cross-site scripting (XSS) vulnerabilities in the (1) ForwardController and (2) AttributeEditor scripts in IBM Rational Focal Point 6.4.x and 6.5.x before 6.5.2.3 and 6.6.x before 6.6.1 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:ibm:rational_focal_point:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_focal_point:6.6.0.1:*:*:*:*:*:*:*" ]
GHSA-f35j-c9wq-qjhp
Vulnerability in cvconnect in SGI IRIX WorkShop allows local users to overwrite arbitrary files.
[]
CVE-2024-36401
Remote Code Execution (RCE) vulnerability in evaluating property name expressions in Geoserver
GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.
[ "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*", "cpe:2.3:a:geoserver:geoserver:2.24.0:-:*:*:*:*:*:*", "cpe:2.3:a:geoserver:geoserver:2.25.0:-:*:*:*:*:*:*", "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*" ]
CVE-2018-3311
Vulnerability in the Oracle Retail Xstore Payment component of Oracle Retail Applications (subcomponent: Security). The supported version that is affected is 3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Payment. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Retail Xstore Payment accessible data as well as unauthorized update, insert or delete access to some of Oracle Retail Xstore Payment accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Retail Xstore Payment. CVSS 3.0 Base Score 8.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L).
[ "cpe:2.3:a:oracle:retail_xstore_payment:3.3:*:*:*:*:*:*:*" ]
GHSA-mp4f-9pjq-jgc3
Buffer overflow in BarCodeWiz BarCode 3.29 ActiveX control (BarcodeWiz.dll) allows remote attackers to execute arbitrary code via a long argument to the LoadProperties method.
[]
CVE-2018-20249
In Foxit Quick PDF Library (all versions prior to 16.12), issue where loading a malformed or malicious PDF containing invalid xref entries using the DAOpenFile or DAOpenFileReadOnly functions may result in an access violation caused by out of bounds memory access.
[ "cpe:2.3:a:foxitsoftware:quick_pdf_library:*:*:*:*:*:*:*:*" ]
CVE-2022-22544
Solution Manager (Diagnostics Root Cause Analysis Tools) - version 720, allows an administrator to execute code on all connected Diagnostics Agents and browse files on their systems. An attacker could thereby control the managed systems. It is considered that this is a missing segregation of duty for the SAP Solution Manager administrator. Impacts of unauthorized execution of commands can lead to sensitive information disclosure, loss of system integrity and denial of service.
[ "cpe:2.3:a:sap:solution_manager:7.20:*:*:*:*:*:*:*" ]
GHSA-68hv-qf49-hr4m
Some Dahua software products have a vulnerability of unauthenticated traceroute host from remote DSS Server. After bypassing the firewall access control policy, by sending a specific crafted packet to the vulnerable interface, an attacker could get the traceroute results.
[]
GHSA-5c57-5xxh-xxwp
A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748. Affected by this vulnerability is the function clearPairCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2025-27417
WeGIA Contains a Stored Cross-Site Scripting (XSS) in 'adicionar_status_atendido.php' via the 'status' parameter
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A Stored Cross-Site Scripting (XSS) vulnerability was identified in the adicionar_status_atendido.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts into the status parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk. This vulnerability is fixed in 3.2.16.
[]
GHSA-2c88-8r97-2vcx
Substance3D - Stager versions 3.1.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2025-30983
WordPress Card flip image slideshow plugin <= 1.5 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gopiplus Card flip image slideshow allows DOM-Based XSS. This issue affects Card flip image slideshow: from n/a through 1.5.
[]
CVE-2025-1381
code-projects Real Estate Property Management System ajax_city.php sql injection
A vulnerability was found in code-projects Real Estate Property Management System 1.0. It has been classified as critical. This affects an unknown part of the file /ajax_city.php. The manipulation of the argument CityName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2025-25891
A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01, triggered by the destination, netmask and gateway parameters. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
[]
GHSA-c9vq-pfm9-7pjp
Cross Site Scripting (XSS) vulnerability in contactus.php in Doctor Appointment System 1.0 allows remote attackers to inject arbitrary web script or HTML via the lastname parameter.
[]
CVE-2003-1326
Microsoft Internet Explorer 5.5 and 6.0 allows remote attackers to bypass the cross-domain security model to run malicious script or arbitrary programs via dialog boxes, aka "Improper Cross Domain Security Validation with dialog box."
[ "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*" ]
GHSA-rcw5-8m8m-5jcg
The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it's not.
[]
GHSA-4v8w-gmwj-mqp6
Multiple vulnerabilities in Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system with elevated privileges, access sensitive information, intercept protected network traffic, or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
[]
GHSA-4fq8-68gc-cjqm
Vesta Control Panel (VestaCP) 0.9.7 through 0.9.8-23 is vulnerable to an authenticated command execution that can result in remote root access on the server. The platform works with PHP as the frontend language and uses shell scripts to execute system actions. PHP executes shell script through the dangerous command exec. This function can be dangerous if arguments passed to it are not filtered. Every user input in VestaCP that is used as an argument is filtered with the escapeshellarg function. This function comes from the PHP library directly and its description is as follows: &quot;escapeshellarg() adds single quotes around a string and quotes/escapes any existing single quotes allowing you to pass a string directly to a shell function and having it be treated as a single safe argument.&quot; It means that if you give Username, it will have &#39;Username&#39; as a replacement. This works well and protects users from exploiting this potentially dangerous exec function. Unfortunately, VestaCP uses this escapeshellarg function incorrectly in several places.
[]
GHSA-p575-cf9h-wv42
Mercurial Out-of-bounds Read vulnerability
`cext/manifest.c` in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a malformed manifest entry.
[]
CVE-2016-10421
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, and SDX20, key material is not always cleared properly.
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*" ]
GHSA-8ggf-hm8x-6hp7
Buffer overflow vulnerability in function SetFirewall in index.cgi in CIRCUTOR COMPACT DC-S BASIC smart metering concentrator Firwmare version CIR_CDC_v1.2.17, allows attackers to execute arbitrary code.
[]
GHSA-77pg-3832-hjf8
OS command injection affects Altenergy Power Control Software C1.2.5 via shell metacharacters in the index.php/management/set_timezone timezone parameter, because of set_timezone in models/management_model.php.
[]
CVE-2022-31090
CURLOPT_HTTPAUTH option not cleared on change of origin in Guzzle
Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are sensitive information. In affected versions when using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin (change in host, scheme or port), if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` option before continuing, stopping curl from appending the `Authorization` header to the new request. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. If you do not require or expect redirects to be followed, one should simply disable redirects all together. Alternatively, one can specify to use the Guzzle steam handler backend, rather than curl.
[ "cpe:2.3:a:guzzlephp:guzzle:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
CVE-2011-1419
Apache Tomcat 7.x before 7.0.11, when web.xml has no security constraints, does not follow ServletSecurity annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests to a web application. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1088.
[ "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*" ]
CVE-2022-42149
kkFileView 4.0 is vulnerable to Server-side request forgery (SSRF) via controller\OnlinePreviewController.java.
[ "cpe:2.3:a:keking:kkfileview:4.0.0:*:*:*:*:*:*:*" ]
GHSA-55vh-84h5-w3p4
A vulnerability was found in Campcodes Beauty Salon Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/edit_category.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235247.
[]
GHSA-g9jp-w3hv-m9rf
Cross-site scripting (XSS) vulnerability in IBM Rational Collaborative Lifecycle Management 3.0.1.6 before iFix8, 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; Rational Quality Manager 3.0.1.6 before iFix8, 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; Rational Team Concert 3.0.1.6 before iFix8, 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; Rational DOORS Next Generation 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; Rational Engineering Lifecycle Manager 4.x before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; Rational Rhapsody Design Manager 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5; and Rational Software Architect Design Manager 4.0 before 4.0.7 iFix11, 5.0 before 5.0.2 iFix18, and 6.0 before 6.0.2 iFix5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[]
GHSA-pj2v-wrvx-hgcc
SQL injection vulnerability in the TT_Products editor (ttpedit) extension 0.0.2 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
CVE-2005-3156
Directory traversal vulnerability in printfaq.php in EasyGuppy (Guppy for Windows) 4.5.4 and 4.5.5 allows remote attackers to read arbitrary files via ".." sequences in the pg parameter, which is cleansed for XSS but not directory traversal.
[ "cpe:2.3:a:easyguppy:easyguppy:4.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:easyguppy:easyguppy:4.5.5:*:*:*:*:*:*:*" ]
GHSA-gpqg-9388-qcwr
A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to escalate privileges and run arbitrary code in the context of root. Please note: an attacker must first obtain access to the target agent in an un-activated and unconfigured state in order to exploit this vulnerability.
[]
CVE-2013-5967
Multiple SQL injection vulnerabilities in AlienVault Open Source Security Information Management (OSSIM) 4.3 and earlier allow remote attackers to execute arbitrary SQL commands via the date_from parameter to (1) radar-iso27001-potential.php, (2) radar-iso27001-A12IS_acquisition-pot.php, (3) radar-iso27001-A11AccessControl-pot.php, (4) radar-iso27001-A10Com_OP_Mgnt-pot.php, or (5) radar-pci-potential.php in RadarReport/.
[ "cpe:2.3:a:alienvault:open_source_security_information_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-1:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-2:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:2.1.5-3:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:3.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:3.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:alienvault:open_source_security_information_management:4.2.3:*:*:*:*:*:*:*" ]
GHSA-45q8-6828-qghj
IBM MQ on HPE NonStop 8.0.4 and 8.1.0 is vulnerable to a privilege escalation attack when SharedBindingsUserId is set to effective. IBM X-ForceID: 211404.
[]
CVE-2019-11549
An issue was discovered in GitLab Community and Enterprise Edition 9.x, 10.x, and 11.x before 11.8.9, 11.9.x before 11.9.10, and 11.10.x before 11.10.2. Gitaly has allows an information disclosure issue where HTTP/GIT credentials are included in logs on connection errors.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
GHSA-w7cf-g3rh-q9hc
SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update allows a remote unauthenticated attacker to achieve remote code execution.
[]
GHSA-cmrv-5883-2m9p
Cross-Site Request Forgery (CSRF) vulnerability in Fatcat Apps Analytics Cat plugin <= 1.0.9 on WordPress allows Plugin Settings Change.
[]
CVE-2014-8089
SQL injection vulnerability in Zend Framework before 1.12.9, 2.2.x before 2.2.8, and 2.3.x before 2.3.3, when using the sqlsrv PHP extension, allows remote attackers to execute arbitrary SQL commands via a null byte.
[ "cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*" ]
GHSA-q9cq-mv8c-985j
Deserialization of Untrusted Data vulnerability in weDevs Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy.This issue affects Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy: from n/a through 3.7.19.
[]
GHSA-xx3g-89q2-w8hh
Cross-site scripting (XSS) vulnerability in the search functionality in Simon Brown Pebble 2.0.0 RC1 and RC2 allows remote attackers to inject arbitrary web script or HTML via the query string.
[]
CVE-2024-40830
This issue was addressed with improved data protection. This issue is fixed in iOS 18 and iPadOS 18. An app may be able to enumerate a user's installed apps.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
CVE-2024-0971
A SQL injection vulnerability exists where an authenticated, low-privileged remote attacker could potentially alter scan DB content.
[ "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*" ]
GHSA-488v-fwfj-656p
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: PIA Core Technology). Supported versions that are affected are 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
CVE-2020-2875
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:mysql_connector\\/j:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
GHSA-mpfr-43f5-3jjf
SQL injection vulnerability exists in the script Handler_CFG.ashx.
[]
GHSA-9gf3-h693-qh48
Buffer overflow in asnsp.dll in Aventail Connect 4.1.2.13 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a malformed DNS query.
[]
CVE-2022-46888
Multiple reflective cross-site scripting (XSS) vulnerabilities in NexusPHP before 1.7.33 allow remote attackers to inject arbitrary web script or HTML via the secret parameter in /login.php; q parameter in /user-ban-log.php; query parameter in /log.php; text parameter in /moresmiles.php; q parameter in myhr.php; or id parameter in /viewrequests.php.
[ "cpe:2.3:a:nexusphp:nexusphp:*:*:*:*:*:*:*:*" ]
GHSA-56h4-rrgp-r6px
The NetCloud Exchange client for Windows, version 1.110.50, contains an insecure file and folder permissions vulnerability. A normal (non-admin) user could exploit the weakness in file and folder permissions to escalate privileges, execute arbitrary code and maintain persistence on the compromised machine. It has been identified that full control permissions exist on the ‘Everyone’ group (i.e. any user who has local access to the operating system regardless of their privileges).
[]
CVE-2016-1144
Cross-site scripting (XSS) vulnerability in JOB-CUBE -JOB WEB SYSTEM before 1.2.2 and -JOB WEB SYSTEM High Income 1.0.6 and earlier allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:websquare:job-cube:*:*:*:*:high_income:*:*:*", "cpe:2.3:a:websquare:job-cube:*:*:*:*:-:*:*:*" ]
CVE-2017-0671
A remote code execution vulnerability in the Android libraries. Product: Android. Versions: 4.4.4. Android ID: A-34514762.
[ "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*" ]
CVE-2024-4977
Index WP MySQL For Speed < 1.4.18 - Admin+ Reflected XSS
The Index WP MySQL For Speed WordPress plugin before 1.4.18 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
[ "cpe:2.3:a:anynines:mysql:-:*:*:*:*:pivotal_cloud_foundry:*:*" ]
CVE-2022-29663
CSCMS Music Portal System v4.2 was discovered to contain a SQL injection vulnerability via the id parameter at /admin.php/pic/admin/type/hy.
[ "cpe:2.3:a:chshcms:cscms_music_portal_system:4.2:*:*:*:*:*:*:*" ]
CVE-2010-0600
Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 does not properly restrict network access to an unspecified configuration file, which allows remote attackers to read passwords and unspecified other account details via a (1) XML RPC or (2) XML RPC over HTTPS session, aka Bug ID CSCtb83512.
[ "cpe:2.3:a:cisco:mediator_framework:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:mediator_framework:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:mediator_framework:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:network_building_mediator_nbm-2400:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:network_building_mediator_nbm-4800:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:richards-zeta_mediator_2500:*:*:*:*:*:*:*:*" ]
CVE-2002-1937
Symantec Firewall/VPN Appliance 100 through 200R hardcodes the administrator's MAC address inside the firewall's configuration, which allows remote attackers to spoof the administrator's MAC address and perform an ARP poisoning man-in-the-middle attack to obtain the administrator's password.
[ "cpe:2.3:h:symantec:firewall_vpn_appliance_100:*:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:firewall_vpn_appliance_200:*:*:*:*:*:*:*:*", "cpe:2.3:h:symantec:firewall_vpn_appliance_200r:*:*:*:*:*:*:*:*" ]
GHSA-jq5x-f35w-xxr2
SSH Tectia Server 4.3.1 and earlier, and SSH Secure Shell for Windows Servers, uses insecure permissions when generating the Secure Shell host identification key, which allows local users to access the key and spoof the server.
[]
CVE-2024-23360
Improper Access Control in Graphics Windows
Memory corruption while creating a LPAC client as LPAC engine was allowed to access GPU registers.
[ "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sc8280xp-abbb_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sc8280xp-abbb:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*" ]
GHSA-chqh-f22c-h6qc
The Amelia WordPress plugin before 1.0.47 does not have CSRF check in place when deleting customers, which could allow attackers to make a logged in admin delete arbitrary customers via a CSRF attack
[]
CVE-2014-6101
Cross-site scripting (XSS) vulnerability in the redirect-login feature in IBM Business Process Manager (BPM) Advanced 7.5 through 8.5.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*", "cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*" ]
CVE-2005-3628
Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to modify memory and possibly execute arbitrary code via unknown attack vectors.
[ "cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*" ]
CVE-2022-45036
A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the No Results field.
[ "cpe:2.3:a:wbce:wbce_cms:1.5.4:*:*:*:*:*:*:*" ]
GHSA-vc5p-j8vw-mc6x
Permissions bypass in pleaser
Failure to normalize the umask in pleaser before 0.4.0 allows a local attacker to gain full root privileges if they are allowed to execute at least one command.
[]