id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2020-14316
A flaw was found in kubevirt 0.29 and earlier. Virtual Machine Instances (VMIs) can be used to gain access to the host's filesystem. Successful exploitation allows an attacker to assume the privileges of the VM process on the host system. In worst-case scenarios an attacker can read and modify any file on the system where the VMI is running. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[ "cpe:2.3:a:kubevirt:kubevirt:*:*:*:*:*:kubernetes:*:*", "cpe:2.3:a:redhat:openshift_virtualization:1:*:*:*:*:*:*:*" ]
null
9.9
null
6.5
null
CVE-2012-0659
Integer overflow in QuickTime in Apple Mac OS X before 10.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted MPEG file.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.7.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2022-40692
WordPress Sunshine Photo Cart Plugin <= 2.9.13 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in WP Sunshine Sunshine Photo Cart plugin <= 2.9.13 versions.
[ "cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-wc5h-vpgx-mqjw
u'Lack of check to ensure that the TX read index & RX write index that are read from shared memory are less than the FIFO size results into memory corruption and potential information leakage' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, Bitra, IPQ6018, IPQ8074, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCA8081, QCM2150, QCN7605, QCS404, QCS405, QCS605, QCS610, QM215, Rennell, SA415M, SA6155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
[]
null
null
null
null
null
GHSA-g7wj-h75w-2cr7
Due to an insecure direct object reference vulnerability in Gitlab EE/CE affecting all versions from 11.0 prior to 14.8.6, 14.9 prior to 14.9.4, and 14.10 prior to 14.10.1, an endpoint may reveal the issue title to a user who crafted an API call with the ID of the issue from a public project that restricts access to issue only to project members.
[]
null
5.3
null
null
null
CVE-2017-17305
Some Huawei Firewall products USG2205BSR V300R001C10SPC600; USG2220BSR V300R001C00; USG5120BSR V300R001C00; USG5150BSR V300R001C00 have a Bleichenbacher Oracle vulnerability in the IPSEC IKEv1 implementations. Remote attackers can decrypt IPSEC tunnel ciphertext data by leveraging a Bleichenbacher RSA padding oracle. Cause a Bleichenbacher oracle attack. Successful exploit this vulnerability can impact IPSec tunnel security.
[ "cpe:2.3:o:huawei:usg2205bsr_firmware:v300r001c10spc600:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg2205bsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg2220bsr_firmware:v300r001c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg2220bsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg5120bsr_firmware:v300r001c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg5120bsr:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg5150bsr_firmware:v300r001c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg5150bsr:-:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
CVE-2023-3730
Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-x584-8853-j9mg
categorie.php3 in Black Tie Project (BTP) 0.4b through 0.5b allows remote attackers to determine the absolute path of the web server via an invalid category ID (cid) parameter, which leaks the pathname in an error message.
[]
null
null
null
null
null
RHSA-2021:1031
Red Hat Security Advisory: kpatch-patch security update
kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free
[ "cpe:/o:redhat:rhel_eus:7.7::server" ]
null
7.8
null
null
null
GHSA-29gj-xrph-g435
A denial of service exists in Microsoft IIS Server when the optional request filtering feature improperly handles requests, aka 'Microsoft IIS Server Denial of Service Vulnerability'.
[]
null
4.4
null
null
null
GHSA-9268-6mh2-4xfg
A buffer overflow vulnerability exists in the qos.cgi qos_sta_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[]
null
9.1
null
null
null
PYSEC-2022-43074
null
The d8s-archives for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0.
[]
null
9.8
null
null
null
GHSA-5q5m-mjqc-gj8w
Static code injection vulnerability in process.php in AimStats 3.2 allows remote attackers to inject PHP code into config.php via the number parameter in an update action.
[]
null
null
null
null
null
GHSA-ffm3-7v29-m7x8
The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h.
[]
null
null
8.8
null
null
RHSA-2016:1551
Red Hat Security Advisory: firefox security update
Mozilla: Favicon network connection persists when page is closed (MFSA 2016-62) Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62) Mozilla: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback (MFSA 2016-77) Mozilla: Buffer overflow rendering SVG with bidirectional content (MFSA 2016-64) Mozilla: Stack underflow during 2D graphics rendering (MFSA 2016-67) Mozilla: Use-after-free when using alt key and toplevel menus (MFSA 2016-70) Mozilla: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72) Mozilla: Use-after-free in service workers with nested sync events (MFSA 2016-73) Mozilla: Scripts on marquee tag can execute in sandboxed iframes (MFSA 2016-76) Mozilla: Type confusion in display transformation (MFSA 2016-78) Mozilla: Use-after-free when applying SVG effects (MFSA 2016-79) Mozilla: Same-origin policy violation using local HTML file and saved shortcut file (MFSA 2016-80)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.3
null
null
CVE-2022-31086
Incorrect Regular Expressions in ldap-account-manager
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 incorrect regular expressions allow to upload PHP scripts to config/templates/pdf. This vulnerability could lead to a Remote Code Execution if the /config/templates/pdf/ directory is accessible for remote users. This is not a default configuration of LAM. This issue has been fixed in version 8.0. There are no known workarounds for this issue.
[ "cpe:2.3:a:ldap-account-manager:ldap_account_manager:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
null
6.6
null
null
CVE-2020-24640
There is a vulnerability caused by insufficient input validation that allows for arbitrary command execution in a containerized environment within Airwave Glass before 1.3.3. Successful exploitation can lead to complete compromise of the underlying host operating system.
[ "cpe:2.3:a:arubanetworks:airwave_glass:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2013-2617
lib/curl.rb in the Curl Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
[ "cpe:2.3:a:curl_project:curl:-:*:*:*:*:ruby:*:*" ]
null
null
null
7.5
null
RHBA-2015:1659
Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform Bug Fix and Enhancement Advisory
mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015) mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015) mysql: unspecified vulnerability related to Server:DDL (CPU April 2015)
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
null
GHSA-mwwc-9v58-7m9j
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.
[]
null
null
null
null
null
GHSA-h227-99rx-p82j
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
[]
null
6.7
null
null
null
CVE-2007-5585
xscreensaver 5.03 and earlier, when running without xscreensaver-gl-extras (GL extras) installed, crashes when /usr/bin/xscreensaver-gl-helper does not exist and a user attempts to unlock the screen, which allows attackers with physical access to gain access to the locked session.
[ "cpe:2.3:a:xscreensaver:xscreensaver:5.03:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2006-2041
PhpWebGallery before 1.6.0RC1 allows remote attackers to obtain arbitrary pictures via a request to picture.php without specifying the cat parameter. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[ "cpe:2.3:a:phpwebgallery:phpwebgallery:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpwebgallery:phpwebgallery:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpwebgallery:phpwebgallery:1.5.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
cisco-sa-20180117-elm
Cisco Enterprise License Manager Information Disclosure Vulnerability
A vulnerability in the web framework of Cisco Enterprise License Manager could allow an unauthenticated, remote attacker to view sensitive data. The vulnerability is due to insufficient protection of database tables. An attacker could exploit this vulnerability by browsing to a specific URL. An exploit could allow the attacker to view data library information. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-elm ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-elm"]
[]
null
null
6.5
null
null
GHSA-7w2x-xg3m-6rhw
Server-Side Request Forgery (SSRF) vulnerability in Firsh Justified Image Grid allows Server Side Request Forgery.This issue affects Justified Image Grid: from n/a through 4.6.1.
[]
null
7.5
null
null
null
CVE-2015-6362
The web GUI in Cisco Connected Grid Network Management System (CG-NMS) 3.0(0.35) and 3.0(0.54) allows remote authenticated users to bypass intended access restrictions and modify the configuration by leveraging the Monitor-Only role, aka Bug ID CSCuw42640.
[ "cpe:2.3:a:cisco:connected_grid_network_management_system:3.0\\(0.35\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:connected_grid_network_management_system:3.0\\(0.54\\):*:*:*:*:*:*:*" ]
null
null
null
4
null
CVE-2017-17721
CWEBNET/WOSummary/List in ZUUSE BEIMS ContractorWeb .NET 5.18.0.0 allows SQL injection via the tradestatus, assetno, assignto, building, domain, jobtype, site, trade, woType, workorderno, or workorderstatus parameter.
[ "cpe:2.3:a:zuuse:beims_contractorweb_.net:5.18.0.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2017-1000031
SQL injection vulnerability in graph_templates_inputs.php in Cacti 0.8.8b allows remote attackers to execute arbitrary SQL commands via the graph_template_input_id and graph_template_id parameters.
[ "cpe:2.3:a:cacti:cacti:0.8.8b:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
null
GHSA-59f6-jgp4-8r4h
Windows Search in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows server, version 1709 allows an unauthenticated attacker to remotely send specially crafted messages that could cause a denial of service against the system due to improperly handing objects in memory, aka "Windows Search Denial of Service Vulnerability".
[]
null
null
7.5
null
null
GHSA-8vjc-vph9-rg4j
VISAM VBASE version 11.6.0.6 does not neutralize or incorrectly neutralizes user-controllable input before the data is placed in output used as a public-facing webpage.
[]
null
6.1
null
null
null
GHSA-3x28-h2m6-h5pv
The Form Maker by 10Web WordPress plugin before 1.15.32 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
null
CVE-2024-12990
ruifang-tech Rebuild Admin Verification Page admin-verify redirect
A vulnerability was found in ruifang-tech Rebuild 3.8.6. It has been classified as problematic. This affects an unknown part of the file /user/admin-verify of the component Admin Verification Page. The manipulation of the argument nexturl with the input http://localhost/evil.html leads to open redirect. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
4.3
4.3
4
null
GHSA-qj88-9fvw-xw2m
Cross-Site Request Forgery (CSRF) vulnerability in Help Center Live allows remote attackers to perform actions as the administrator via a link or IMG tag to view.php.
[]
null
6.5
null
null
null
GHSA-2j9w-mc69-3577
MySQL allows local users to modify passwords for arbitrary MySQL users via the GRANT privilege.
[]
null
null
null
null
null
CVE-2017-8294
libyara/re.c in the regex component in YARA 3.5.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted rule that is mishandled in the yr_re_exec function.
[ "cpe:2.3:a:virustotal:yara:3.5.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-m2cp-52xf-7gwp
An issue was discovered in XYHCMS 3.5. It has CSRF via an index.php?g=Manage&m=Rbac&a=addUser request, resulting in addition of an account with the administrator role.
[]
null
null
8.8
null
null
GHSA-h32q-f4qx-3487
In TrustZone in all Android releases from CAF using the Linux kernel, a Time-of-Check Time-of-Use Race Condition vulnerability could potentially exist.
[]
null
null
7
null
null
CVE-2013-6284
Unspecified vulnerability in the Statutory Reporting for Insurance (FS_SR) component in the Financial Services module for SAP ERP Central Component (ECC) allows attackers to execute arbitrary code via unspecified vectors, related to a "code injection vulnerability."
[ "cpe:2.3:a:sap:erp_central_component:-:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-45w9-p29f-hp8r
Improper input validation in firmware for some Intel(R) Server M20NTP Family UEFI may allow a privileged user to potentially enable escalation of privilege via local access.
[]
5.4
6.3
null
null
null
RHSA-2024:5402
Red Hat Security Advisory: thunderbird security update
mozilla: Fullscreen notification dialog can be obscured by document content mozilla: Out of bounds memory access in graphics shared memory handling mozilla: Type confusion in WebAssembly mozilla: Incomplete WebAssembly exception handing mozilla: Out of bounds read in editor component mozilla: Missing permission check when creating a StreamFilter mozilla: Uninitialized memory used by WebGL mozilla: Use-after-free in JavaScript garbage collection mozilla: Use-after-free in IndexedDB mozilla: Document content could partially obscure security prompts
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
6.1
null
null
null
GHSA-7cpf-9rpm-3gq2
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. The vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device.
[]
null
null
null
null
null
GHSA-g6ww-2x43-h963
Cross-site scripting in Apache JSPWiki
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the plain editor, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
[]
null
6.1
null
null
null
CVE-2025-46482
WordPress WP Quiz plugin <= 2.0.10 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MyThemeShop WP Quiz allows Stored XSS.This issue affects WP Quiz: from n/a through 2.0.10.
[]
null
6.5
null
null
null
CVE-2025-44904
hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5VM_memcpyvv function.
[]
null
8.8
null
null
null
GHSA-x24x-32q2-mhm4
Multiple stack-based buffer overflows in FSD 2.052 d9 and earlier, and FSFDT FSD 3.000 d9 and earlier, allow (1) remote attackers to execute arbitrary code via a long HELP command on TCP port 3010 to the sysuser::exechelp function in sysuser.cc and (2) remote authenticated users to execute arbitrary code via long commands on TCP port 6809 to the servinterface::sendmulticast function in servinterface.cc, as demonstrated by a PIcallsign command.
[]
null
null
null
null
null
CVE-2018-5806
An error within the "leaf_hdr_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a NULL pointer dereference.
[ "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
GHSA-g2mv-fq56-3w42
A cryptographic authentication bypass vulnerability exists in OneLogin AD Connector prior to 6.1.5 due to the exposure of a tenant’s SSO JWT signing key via the /api/adc/v4/configuration endpoint. An attacker in possession of the signing key can craft valid JWT tokens impersonating arbitrary users within a OneLogin tenant. The tokens allow authentication to the OneLogin SSO portal and all downstream applications federated via SAML or OIDC. This allows full unauthorized access across the victim’s SaaS environment.
[]
10
null
null
null
null
GHSA-qwpx-5prv-xmxx
Authentication Bypass Using an Alternate Path or Channel vulnerability in Najeeb Ahmad Simple User Registration allows Authentication Bypass.This issue affects Simple User Registration: from n/a through 5.5.
[]
null
9.8
null
null
null
GHSA-6cvm-432m-8w2x
Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35825, CVE-2022-35826, CVE-2022-35827.
[]
null
8.8
null
null
null
CVE-2009-1460
razorCMS before 0.4 uses weak permissions for (1) admin/core/admin_config.php, which allows local users to obtain the administrator's password hash and FTP user credentials; and (2) the root directory, (3) datastore/, and (4) admin/core/, which allows local users to have an unspecified impact.
[ "cpe:2.3:a:razorcms:razorcms:*:*:*:*:*:*:*:*", "cpe:2.3:a:razorcms:razorcms:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:razorcms:razorcms:0.3:rc2:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-6q4v-vwc9-rgq7
In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185235454
[]
null
null
null
null
null
CVE-2022-49482
ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe
In the Linux kernel, the following vulnerability has been resolved: ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe of_parse_phandle() returns a node pointer with refcount incremented, we should use of_node_put() on it when done.
[]
null
5.5
null
null
null
CVE-2024-38687
WordPress Sky Addons for Elementor plugin <= 2.5.5 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Techfyd Sky Addons for Elementor allows Stored XSS.This issue affects Sky Addons for Elementor: from n/a through 2.5.5.
[]
null
6.5
null
null
null
GHSA-rg97-f569-fgwp
Heap-based buffer overflow in the IAManager ActiveX control in IAManager.dll in Roxio CinePlayer 3.2 allows remote attackers to execute arbitrary code via a long argument to the SetIAPlayerName method.
[]
null
null
null
null
null
GHSA-v36f-7mqc-rg36
Unspecified vulnerability in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to execute arbitrary code via unknown vectors that trigger memory corruption. NOTE: due to conflicting information and use of the same CVE identifier by the vendor, ZDI, and TippingPoint, it is not clear whether this issue is related to use of an uninitialized pointer, an incorrect pointer offset calculation, or both.
[]
null
null
null
null
null
CVE-2012-2893
Double free vulnerability in libxslt, as used in Google Chrome before 22.0.1229.79, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XSL transforms.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.63:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.65:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.67:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:22.0.1229.76:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-46j6-8982-6xcv
BitLocker Security Feature Bypass Vulnerability
[]
null
6.8
null
null
null
CVE-2024-7007
Authentication Bypass Using an Alternate Path or Channel in Positron Broadcast Signal Processor TRA7005
Positron Broadcast Signal Processor TRA7005 v1.20 is vulnerable to an authentication bypass exploit that could allow an attacker to have unauthorized access to protected areas of the application.
[ "cpe:2.3:h:positronsrl:broadcast_signal_processor_tra7005:*:*:*:*:*:*:*:*", "cpe:2.3:o:positron:tra7005_firmware:1.20:*:*:*:*:*:*:*", "cpe:2.3:h:positron:tra7005:*:*:*:*:*:*:*:*" ]
8.7
null
null
null
null
GHSA-2qfv-hf75-cqrh
Format string vulnerability in HylaFAX faxgetty before 4.1.3 allows remote attackers to cause a denial of service (crash) via the TSI data element.
[]
null
null
null
null
null
CVE-2023-43856
Dreamer CMS v4.1.3 was discovered to contain an arbitrary file read vulnerability via the component /admin/TemplateController.java.
[ "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-2xxh-xxr9-5c4q
Multiple cross-site scripting (XSS) vulnerabilities in assets/misc/fallback-page.php in the Profile Builder plugin before 2.0.3 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) site_name, (2) message, or (3) site_url parameter.
[]
null
null
6.1
null
null
GHSA-hwcx-3vrw-26jm
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in miniOrange miniOrange's Google Authenticator – WordPress Two Factor Authentication – 2FA , Two Factor, OTP SMS and Email | Passwordless login.This issue affects miniOrange's Google Authenticator – WordPress Two Factor Authentication – 2FA , Two Factor, OTP SMS and Email | Passwordless login: from n/a through 5.6.1.
[]
null
8.1
null
null
null
CVE-2021-3594
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
[ "cpe:2.3:a:libslirp_project:libslirp:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
3.8
null
2.1
null
GHSA-fm86-f4f4-x6vm
A specially crafted TCP/IP packet may cause the camera recovery image web interface to crash. It may also cause a buffer overflow which could enable remote code execution. The recovery image can only be booted with administrative rights or with physical access to the camera and allows the upload of a new firmware in case of a damaged firmware.
[]
null
7.2
null
null
null
GHSA-2pm5-c2hr-7xg4
Remote Desktop Protocol Remote Code Execution Vulnerability.
[]
null
8
null
null
null
CVE-2024-49017
SQL Server Native Client Remote Code Execution Vulnerability
SQL Server Native Client Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*" ]
null
8.8
null
null
null
CVE-2016-6637
Multiple cross-site request forgery (CSRF) vulnerabilities in Pivotal Cloud Foundry (PCF) before 242; UAA 2.x before 2.7.4.7, 3.x before 3.3.0.5, and 3.4.x before 3.4.4; UAA BOSH before 11.5 and 12.x before 12.5; Elastic Runtime before 1.6.40, 1.7.x before 1.7.21, and 1.8.x before 1.8.2; and Ops Manager 1.7.x before 1.7.13 and 1.8.x before 1.8.1 allow remote attackers to hijack the authentication of unspecified victims for requests that approve or deny a scope via a profile or authorize approval page.
[ "cpe:2.3:a:cloudfoundry:cloud_foundry_uaa_bosh:*:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry:*:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.15:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.17:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.18:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.19:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.20:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.21:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.22:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.23:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.25:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.26:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.27:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.28:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.29:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.30:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.31:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.32:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.33:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.34:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.35:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.36:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.37:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.38:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.6.39:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.14:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.15:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.16:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.17:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.18:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.19:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.7.20:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_elastic_runtime:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_ops_manager:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:2.7.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:cloud_foundry_uaa:3.4.2:*:*:*:*:*:*:*" ]
null
null
9.6
6.8
null
CVE-2015-7623
The ANAuthenticateResource method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, and CVE-2015-7620.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-89vc-7frq-2rfj
Jenkins has Local File Inclusion Vulnerability
Directory traversal vulnerability in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to list directory contents and read arbitrary files in the Jenkins servlet resources via directory traversal sequences in a request to jnlpJars/.
[]
6.9
null
null
null
null
GHSA-prm4-7jr7-cm97
LB-LINK BL-WR 1300H v.1.0.4 contains hardcoded credentials stored in /etc/shadow which are easily guessable.
[]
null
9.8
null
null
null
CVE-2025-29959
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
[]
null
6.5
null
null
null
CVE-2011-1474
A locally locally exploitable DOS vulnerability was found in pax-linux versions 2.6.32.33-test79.patch, 2.6.38-test3.patch, and 2.6.37.4-test14.patch. A bad bounds check in arch_get_unmapped_area_topdown triggered by programs doing an mmap after a MAP_GROWSDOWN mmap will create an infinite loop condition without releasing the VM semaphore eventually leading to a system crash.
[ "cpe:2.3:o:linux:linux_kernel:2.6.32.33:test79:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.37.4:test14:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:2.6.38:test3:*:*:*:*:*:*" ]
null
5.5
null
4.9
null
CVE-2025-27073
Reachable Assertion in WLAN Firmware
Transient DOS while creating NDP instance.
[]
null
7.5
null
null
null
CVE-2017-7290
SQL injection vulnerability in XOOPS 2.5.7.2 and other versions before 2.5.8.1 allows remote authenticated administrators to execute arbitrary SQL commands via the url parameter to findusers.php. An example attack uses "into outfile" to create a backdoor program.
[ "cpe:2.3:a:xoops:xoops:2.5.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:xoops:xoops:2.5.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:xoops:xoops:2.5.8.1:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
null
CVE-2020-11491
Monitoring::Logs in Zen Load Balancer 3.10.1 allows remote authenticated admins to conduct absolute path traversal attacks, as demonstrated by a filelog=/etc/shadow request to index.cgi.
[ "cpe:2.3:a:zevenet:zen_load_balancer:3.10.1:*:*:*:*:*:*:*" ]
null
4.9
null
4
null
GHSA-c5vh-fhpc-wg5w
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/keyWord_deal.php?mudi=add.
[]
null
3.8
null
null
null
CVE-2021-22156
An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerry® QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.
[ "cpe:2.3:a:blackberry:qnx_software_development_platform:*:*:*:*:*:*:*:*", "cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:-:*:*:*:*:*:*", "cpe:2.3:a:blackberry:qnx_software_development_platform:6.5.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:blackberry:qnx_os_for_medical:*:*:*:*:*:*:*:*", "cpe:2.3:o:blackberry:qnx_os_for_safety:*:*:*:*:*:*:*:*" ]
null
9.8
null
6.8
null
CVE-2021-1248
Cisco Data Center Network Manager SQL Injection Vulnerabilities
Multiple vulnerabilities in certain REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to execute arbitrary SQL commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2021-21132
Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*" ]
null
9.6
null
6.8
null
GHSA-mjv5-g7c5-w9hq
WebExtension scripts can use the "data:" protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR < 45.7 and Firefox < 51.
[]
null
null
7.3
null
null
CVE-2024-47009
Path Traversal in Ivanti Avalanche before version 6.4.5 allows a remote unauthenticated attacker to bypass authentication.
[ "cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*", "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*" ]
null
7.3
null
null
null
CVE-2008-6966
AJ Square AJ Auction Pro Platinum Skin #1 sends a redirect but does not exit when it is called directly, which allows remote attackers to bypass authentication via a direct request to admin/user.php.
[ "cpe:2.3:a:aj_square:aj_auction:1.0:*:pro_platinum_skin:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-45828
WordPress RumbleTalk Live Group Chat plugin <= 6.2.5 - Broken Access Control vulnerability
Missing Authorization vulnerability in RumbleTalk Ltd RumbleTalk Live Group Chat allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects RumbleTalk Live Group Chat: from n/a through 6.2.5.
[]
null
5.4
null
null
null
GHSA-g266-3vhm-gj23
The web interface of the Compal Broadband CH7465LG modem (version CH7465LG-NCIP-6.12.18.25-2p6-NOSH) is vulnerable to a /%2f/ path traversal attack, which can be exploited in order to test for the existence of a file pathname outside of the web root directory. If a file exists but is not part of the product, there is a 404 error. If a file does not exist, there is a 302 redirect to index.html.
[]
null
5.3
null
null
null
GHSA-2fcg-hwv9-g767
A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM privileges. Standard users may use this to gain arbitrary code execution as SYSTEM.
[]
null
7.8
null
null
null
CVE-2015-6098
Buffer overflow in the Network Driver Interface Standard (NDIS) implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "Windows NDIS Elevation of Privilege Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-7jh7-wvrp-g29x
ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted MIFF file.
[]
null
6.5
null
null
null
CVE-2006-2690
An unspecified script in EVA-Web 2.1.2 and earlier, probably index.php, allows remote attackers to obtain the full path of the web server via invalid (1) perso or (2) aide parameters.
[ "cpe:2.3:a:eva-web:eva-web:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
CVE-2024-4122
Tenda W15E setDebugCfg formSetDebugCfg stack-based overflow
A vulnerability classified as critical was found in Tenda W15E 15.11.0.14. Affected by this vulnerability is the function formSetDebugCfg of the file /goform/setDebugCfg. The manipulation of the argument enable/level/module leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261865 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:h:tenda:w15e:-:*:*:*:*:*:*:*" ]
null
8.8
8.8
9
null
GHSA-6pr8-g9pq-xmj3
Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page parameter in the fromSafeUrlFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
[]
null
7.5
null
null
null
CVE-2023-28799
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
[ "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:linux:*:*", "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:chrome_os:*:*", "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:android:*:*", "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:windows:*:*", "cpe:2.3:a:zscaler:client_connector:*:*:*:*:*:macos:*:*" ]
null
8.2
null
null
null
GHSA-g8xm-p2h4-v6jp
OpenShift Assisted Installer leaks image pull secrets as plaintext in installation logs
A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the registry as the associated user.
[]
null
5.5
null
null
null
GHSA-95hg-vx6x-rj95
A vulnerability was found in 115cms up to 20240807. It has been classified as problematic. Affected is an unknown function of the file /index.php/admin/web/file.html. The manipulation of the argument ks leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
3.5
null
null
null
CVE-2022-37018
A potential vulnerability has been identified in the system BIOS for certain HP PC products which may allow escalation of privileges and code execution. HP is releasing firmware updates to mitigate the potential vulnerability.
[ "cpe:2.3:o:hp:z1_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_mini_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_mini_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z238_microtower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z238_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z240_sff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z240_sff:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z240_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z240_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_one_aio_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_one_aio_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mp9_g2_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mp9_g2_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:rp9_g1_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:rp9_g1_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_slice_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_slice:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g2_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g2_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g2_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g2_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g2_sff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g2_sff:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g2_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g2_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g3_dm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g3_dm:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_microtower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_sff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_sff:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g4_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g2_dm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g2_dm:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g2_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g2_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g2_sff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g2_sff:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_desktop_mini_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_sff_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_sff:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g2_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g2_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g3_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g3_microtower_pc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g2_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g2_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g3_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g3_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_480_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_480_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g2_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g2_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1012_g1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1012_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1012_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1012_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1030_g1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1030_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_820_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_820_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_820_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_820_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_828_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_828_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_828_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_828_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_848_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_848_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_848_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_848_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_folio_g1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_folio_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1020_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1020_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_11_g2_firmware:*:*:*:*:education:*:*:*", "cpe:2.3:h:hp:probook_11_g2:-:*:*:*:education:*:*:*", "cpe:2.3:o:hp:pro_x2_612_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x2_612_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_446_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_446_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_470_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_470_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_470_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_470_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g2_firmware:*:*:*:*:education:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g2:-:*:*:*:education:*:*:*", "cpe:2.3:o:hp:zbook_14u_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_x2_g4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_x2_g4:-:*:*:*:*:*:*:*" ]
null
8.4
null
null
null
GHSA-79mv-qv9r-5fvw
Buffer overflow in OpenPegasus Management server, when compiled to use PAM and with PEGASUS_USE_PAM_STANDALONE_PROC defined, as used in VMWare ESX Server 3.0.1 and 3.0.2, might allow remote attackers to execute arbitrary code via vectors related to PAM authentication, a different vulnerability than CVE-2008-0003.
[]
null
null
null
null
null
GHSA-vvvr-4847-2p4f
Use of a hard-coded cryptographic key pair by the telnetd_startup service allows an attacker on the local area network to obtain a root shell on the device over telnet. The builds of telnetd_startup included in the version 22.5.9.163 of the K2 firmware, and version 32.1.15.93 of the K3C firmware (possibly amongst many other releases) included both the private and public RSA keys. The remaining versions cited here redacted the private key, but left the public key unchanged. An attacker in possession of the leaked private key may, through a scripted exchange of UDP packets, instruct telnetd_startup to spawn an unauthenticated telnet shell as root, by means of which they can then obtain complete control of the device. A consequence of the limited availablility of firmware images for testing is that models and versions not listed here may share this vulnerability.
[]
null
7.8
null
null
null
GHSA-4vv7-8gg7-f95h
VMware Workstation 8.x before 8.0.2, VMware Player 4.x before 4.0.2, VMware Fusion 4.x before 4.1.2, VMware ESXi 3.5 through 5.0, and VMware ESX 3.5 through 4.1 use an incorrect ACL for the VMware Tools folder, which allows guest OS users to gain guest OS privileges via unspecified vectors.
[]
null
null
null
null
null
CVE-2023-27871
IBM Aspera Faspex information disclosure
IBM Aspera Faspex 4.4.2 could allow a remote attacker to obtain sensitive credential information for an external user, using a specially crafted SQL query. IBM X-Force ID: 249613.
[ "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_faspex:4.4.2:patch_level_1:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_faspex:4.4.2:patch_level_2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-86g9-4xm6-2vw3
The Linux kernel through 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that is more restrictive than the entry for the other category, aka a "negative groups" issue, related to kernel/groups.c, kernel/uid16.c, and kernel/user_namespace.c.
[]
null
null
null
null
null
CVE-2022-50007
xfrm: fix refcount leak in __xfrm_policy_check()
In the Linux kernel, the following vulnerability has been resolved: xfrm: fix refcount leak in __xfrm_policy_check() The issue happens on an error path in __xfrm_policy_check(). When the fetching process of the object `pols[1]` fails, the function simply returns 0, forgetting to decrement the reference count of `pols[0]`, which is incremented earlier by either xfrm_sk_policy_lookup() or xfrm_policy_lookup(). This may result in memory leaks. Fix it by decreasing the reference count of `pols[0]` in that path.
[]
null
null
null
null
null