id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2009-3876 | Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911. | [
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.3.1_25:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_02:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_03:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_3:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_4:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_04:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_5:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_05:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_6:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_06:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_7:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_07:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_8:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_08:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_9:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_09:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_10:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_11:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_12:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_13:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_14:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_15:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_16:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_17:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_18:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_19:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_20:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_21:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_22:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_23:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_24:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:sdk:1.3.1_25:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-1915 | Thumbnail carousel slider < 1.1.10 - Reflected XSS | The Thumbnail carousel slider WordPress plugin before 1.1.10 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting vulnerability which could be used against high privilege users such as admin. | [
"cpe:2.3:a:i13websolution:thumbnail_carousel_slider:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
CVE-2020-16907 | Win32k Elevation of Privilege Vulnerability | <p>An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.</p>
<p>The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.</p>
| [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
RHSA-2020:1054 | Red Hat Security Advisory: mailman security and bug fix update | mailman: Cross-site scripting vulnerability allows malicious listowners to inject scripts into listinfo pages mailman: Mishandled URLs in Utils.py:GetPathPieces() allows attackers to display arbitrary text on trusted sites | [
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
CVE-2013-3027 | Integer overflow in the DWA9W ActiveX control in iNotes in IBM Domino 9.0 before IF3 allows remote attackers to execute arbitrary code via a crafted web page, aka SPR PTHN97XHFW. | [
"cpe:2.3:a:ibm:lotus_domino:9.0.0.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2017-5704 | Platform sample code firmware included with 4th Gen Intel Core Processor, 5th Gen Intel Core Processor, 6th Gen Intel Core Processor, and 7th Gen Intel Core Processor potentially exposes password information in memory to a local attacker with administrative privileges. | [
"cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5820k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*"
] | null | null | 6.7 | 2.1 |
|
CVE-2016-7932 | The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum(). | [
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-w2jp-m4xr-vgr3 | Dell EMC NetWorker 19.2.1.x 19.3.x, 19.4.x, 19.5.x, 19.6.x and 19.7.0.0 contain an Improper Handling of Insufficient Permissions or Privileges vulnerability. Authenticated non admin user could exploit this vulnerability and gain access to restricted resources. | [] | null | 6.5 | null | null |
|
GHSA-593h-gxfm-rj8p | A vulnerability in the application data endpoints of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to gain access to sensitive information.
The vulnerability is due to improper validation of directory traversal character sequences within requests to application programmatic interfaces (APIs). An attacker could exploit this vulnerability by sending malicious requests to an API within the affected application. A successful exploit could allow the attacker to conduct directory traversal attacks and gain access to sensitive information including credentials or user tokens.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | [] | null | 7.5 | null | null |
|
CVE-2001-0145 | Buffer overflow in VCard handler in Outlook 2000 and 98, and Outlook Express 5.x, allows an attacker to execute arbitrary commands via a malformed vCard birthday field. | [
"cpe:2.3:a:microsoft:outlook:98:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook_express:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2025-32789 | EspoCRM Allows Potential Disclosure of Sensitive Information in the User Sorting Function | EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7. | [] | null | 3.1 | null | null |
GHSA-4rq8-fqpc-3h6r | Multiple SQL injection vulnerabilities in the Administration Web UI servlets in Citrix Command Center before 5.1 Build 36.7 and 5.2 before Build 44.11 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | [] | null | null | 8.1 | null |
|
CVE-2000-1085 | The xp_peekqueue function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability. | [
"cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-wf99-6gw6-9hpv | The s2Member Pro plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 250214 via the 'template' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution. | [] | null | 8.8 | null | null |
|
GHSA-xxwr-v6hc-32hm | Dell Storage Integration Tools for VMware (DSITV) 06.01.00.016 contain an information disclosure vulnerability. A local low-privileged malicious user could potentially exploit this vulnerability to retrieve an encryption key that could aid in further attacks. | [] | null | 7.8 | null | null |
|
CVE-2017-0509 | An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-32124445. References: B-RB#110688. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2018-20669 | An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2021-37746 | textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click. | [
"cpe:2.3:a:claws-mail:claws-mail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sylpheed_project:sylpheed:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
GHSA-xq9h-8fc9-wr6w | TUTOS 1.3 does not restrict access to php/admin/cmd.php, which allows remote attackers to execute arbitrary shell commands via the cmd parameter in a direct request. | [] | null | null | null | null |
|
GHSA-7cgg-v638-p3g3 | In linkturbo, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed | [] | null | 7.8 | null | null |
|
GHSA-x82j-j4jj-895h | Cross Site Scripting (XSS) vulnerability in sourcecodester Multi Restaurant Table Reservation System 1.0 via the Made field to /dashboard/menu-list.php. | [] | null | 5.4 | null | null |
|
GHSA-gv6g-j433-qjh3 | Multiple buffer overflows in the Wireless Manager ActiveX control 4.0.0.0 in WifiMan.dll in Sony VAIO PC Wireless LAN Wizard 1.0; VAIO Wireless Wizard 1.00, 1.00_64, 1.0.1, 2.0, and 3.0; SmartWi Connection Utility 4.7, 4.7.4, 4.8, 4.9, 4.10, and 4.11; and VAIO Easy Connect software 1.0.0 and 1.1.0 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the second argument of the (1) SetTmpProfileOption or (2) ConnectToNetwork method. | [] | null | null | null | null |
|
CVE-2022-35752 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-gv5p-g5h2-wjff | The Hearsay: A Social Party Game (aka air.com.lip.per) application 1.7.000 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2025-46511 | WordPress BeerXML Shortcode <= 0.71 - Server Side Request Forgery (SSRF) Vulnerability | Server-Side Request Forgery (SSRF) vulnerability in Derek Springer BeerXML Shortcode allows Server Side Request Forgery. This issue affects BeerXML Shortcode: from n/a through 0.71. | [] | null | 6.4 | null | null |
CVE-2024-8413 | Cross Site Scripting (XSS) in Raspcontrol | Cross Site Scripting (XSS) vulnerability through the action parameter in index.php. Affected product codebase https://github.com/Bioshox/Raspcontrol and forks such as https://github.com/harmon25/raspcontrol . An attacker could exploit this vulnerability by sending a specially crafted JavaScript payload to an authenticated user and partially hijacking their session details.
References list | [
"cpe:2.3:a:raspcontrol_project:raspcontrol:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-pcxq-28f6-m3fm | Firefly III vulnerable to image-based stored XSS | Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file content. The JavaScript code is executed during attachments/view/$file_id$ attachment viewing. | [] | null | null | 5.4 | null |
CVE-2017-0619 | An elevation of privilege vulnerability in the Qualcomm pin controller driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-35401152. References: QC-CR#826566. | [
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7 | 7.6 |
|
RHBA-2023:1037 | Red Hat Bug Fix Advisory: Red Hat build of MicroShift 4.12.6 bug fix and enhancement update | openshift/apiserver-library-go: Bypass of SCC seccomp profile restrictions | [
"cpe:/a:redhat:openshift:4.12::el8"
] | null | 6.3 | null | null |
GHSA-r987-86mv-x265 | Buffer overflow in the KSDWRTB function in the dbms_system package (dbms_system.ksdwrt) for Oracle 9i Database Server Release 2 9.2.0.3 and 9.2.0.4, 9i Release 1 9.0.1.4 and 9.0.1.5, and 8i Release 1 8.1.7.4, allows remote authorized users to execute arbitrary code via a long second argument. | [] | null | null | null | null |
|
GHSA-8hvp-h85w-jwq9 | The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896. | [] | null | null | null | null |
|
GHSA-2vhw-349f-2gq5 | An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication profile. A man-in-the-middle type of attacker with the ability to intercept communication between PAN-OS and KDC can login to PAN-OS as an administrator. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.0 versions earlier than 8.0.21; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6. | [] | null | null | null | null |
|
CVE-2022-1555 | DOM XSS in microweber ver 1.2.15 in microweber/microweber | DOM XSS in microweber ver 1.2.15 in GitHub repository microweber/microweber prior to 1.2.16. inject arbitrary js code, deface website, steal cookie... | [
"cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
CVE-2009-1035 | Cross-site scripting (XSS) vulnerability in the Tasklist module 5.x-1.x before 5.x-1.3 and 5.x-2.x before 5.x-2.0-alpha1, a module for Drupal, allows remote authenticated users to inject arbitrary web script or HTML via Cascading Style Sheets (CSS). | [
"cpe:2.3:a:jake_gordon:tasks:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:jake_gordon:tasks:5.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jake_gordon:tasks:5.x-2.x-dev:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-w3mc-69cg-f45j | The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to have unspecified impact via a crafted (1) commit or (2) confirm message, which triggers an out-of-bounds read. | [] | null | null | 8.1 | null |
|
GHSA-5q76-mqhx-jj3x | Microsoft Word Automation Services in SharePoint Server 2010 SP1, Word Web App 2010 SP1 in Office Web Apps 2010, Word 2003 SP3, Word 2007 SP3, Word 2010 SP1, Office Compatibility Pack SP3, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3848, CVE-2013-3849, and CVE-2013-3858. | [] | null | null | null | null |
|
GHSA-hgvj-q3gx-63jm | Trendnet AC2600 TEW-827DRU version 2.08B01 leaks information via the ftp web page. Usernames and passwords for all ftp users are revealed in plaintext on the ftpserver.asp page. | [] | null | null | null | null |
|
RHSA-2005:766 | Red Hat Security Advisory: squid security update | security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
GHSA-fqgj-2fx4-9h5g | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15399. | [] | null | null | null | null |
|
CVE-2022-37021 | Apache Geode deserialization of untrusted data flaw when using JMX over RMI on Java 8. | Apache Geode versions up to 1.12.5, 1.13.4 and 1.14.0 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 8. Any user still on Java 8 who wishes to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15 and Java 11. If upgrading to Java 11 is not possible, then upgrade to Apache Geode 1.15 and specify "--J=-Dgeode.enableGlobalSerialFilter=true" when starting any Locators or Servers. Follow the documentation for details on specifying any user classes that may be serialized/deserialized with the "serializable-object-filter" configuration option. Using a global serial filter will impact performance. | [
"cpe:2.3:a:apache:geode:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:geode:1.14.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
GHSA-4738-jwqc-6835 | Multiple SQL injection vulnerabilities in Develop It Easy News And Article System 1.4 allow remote attackers to execute arbitrary SQL commands via (1) the aid parameter to article_details.php, and the (2) username and (3) password to the admin panel (admin/index.php). | [] | null | null | null | null |
|
CVE-2019-1755 | Cisco IOS XE Software Command Injection Vulnerability | A vulnerability in the Web Services Management Agent (WSMA) function of Cisco IOS XE Software could allow an authenticated, remote attacker to execute arbitrary Cisco IOS commands as a privilege level 15 user. The vulnerability occurs because the affected software improperly sanitizes user-supplied input. An attacker could exploit this vulnerability by submitting crafted HTTP requests to the targeted application. A successful exploit could allow the attacker to execute arbitrary commands on the affected device. | [
"cpe:2.3:o:cisco:ios_xe:3.2.0ja:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
CVE-2005-0838 | Multiple buffer overflows in the XSL parser for IceCast 2.20 may allow attackers to cause a denial of service and possibly execute arbitrary code via (1) a long test value in an xsl:when tag, (2) a long test value in an xsl:if tag, or (3) a long select value in an xsl:value-of tag. | [
"cpe:2.3:a:icecast:icecast:2.20:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2018-7159 | The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of this flaw in a way that could not already be achieved by supplying an incorrect value for `Content-Length`. Vulnerabilities may exist in user-code that make incorrect assumptions about the potential accuracy of this value compared to the actual length of the data supplied. Node.js users crafting lower-level HTTP utilities are advised to re-check the length of any input supplied after parsing is complete. | [
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2024-37953 | WordPress MBE eShip plugin <= 2.1.2 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MBE Worldwide S.P.A. MBE eShip allows Reflected XSS.This issue affects MBE eShip: from n/a through 2.1.2. | [] | null | 7.1 | null | null |
CVE-2014-0041 | OpenStack Heat Templates (heat-templates), as used in Red Hat Enterprise Linux OpenStack Platform 4.0, sets sslverify to false for certain Yum repositories, which disables SSL protection and allows man-in-the-middle attackers to prevent updates via unspecified vectors. | [
"cpe:2.3:a:redhat:openstack:4.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-3571 | A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1. | [
"cpe:2.3:a:linuxptp_project:linuxptp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 7.1 | null | 5.5 |
|
CVE-2024-5636 | itsourcecode Bakery Online Ordering System index.php sql injection | A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file report/index.php. The manipulation of the argument procduct leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-267092. | [
"cpe:2.3:a:bakery_online_ordering_system_project:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2012-2241 | scripts/dget.pl in devscripts before 2.12.3 allows remote attackers to delete arbitrary files via a crafted (1) .dsc or (2) .changes file, probably related to a NULL byte in a filename. | [
"cpe:2.3:a:devscripts_devel_team:devscripts:*:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch1:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch2:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch4:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.26:etch5:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.17:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.19:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.20:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.21:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.22:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.23:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.24:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.25:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.26:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.27:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.28:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.29:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.30:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.31:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.32:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.33:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.34:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.35:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.36:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.38:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.39:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.40:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.41:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.42:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.43:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.44:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.45:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.46:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.47:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.48:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.49:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.53:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.54:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.55:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.56:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.57:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.58:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.59:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.60:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.61:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.62:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.63:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.64:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.65.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.66:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.67:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.10.68:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:devscripts_devel_team:devscripts:2.12.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-75m2-7vxw-jq93 | An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution. | [] | null | 8.8 | null | null |
|
RHSA-2016:0429 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: type confusion in Blink chromium-browser: use-after-free in Blink chromium-browser: out-of-bounds write in PDFium | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2014:0015 | Red Hat Security Advisory: openssl security update | openssl: client NULL dereference crash on malformed handshake packets openssl: crash when using TLS 1.2 caused by use of incorrect hash algorithm openssl: crash in DTLS renegotiation after packet loss | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2013:1199 | Red Hat Security Advisory: openstack-nova security and bug fix update | OpenStack: Nova private flavors resource limit circumvention OpenStack: Nova XML entities DoS OpenStack: Nova network source security groups denial of service OpenStack: openstack-nova-compute console-log DoS | [
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null |
RHSA-2018:0349 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: unsynchronized access to encryption key data (Libraries, 8172525) OpenJDK: LdapLoginModule insufficient username encoding in LDAP query (LDAP, 8178449) OpenJDK: DnsClient missing source port randomization (JNDI, 8182125) OpenJDK: loading of classes from untrusted locations (I18n, 8182601) OpenJDK: DerValue unbounded memory allocation (Libraries, 8182387) OpenJDK: insufficient strength of key agreement (JCE, 8185292) OpenJDK: GSS context use-after-free (JGSS, 8186212) OpenJDK: LDAPCertStore insecure handling of LDAP referrals (JNDI, 8186606) OpenJDK: use of global credentials for HTTP/SPNEGO (JGSS, 8186600) OpenJDK: SingleEntryRegistry incorrect setup of deserialization filter (JMX, 8186998) OpenJDK: GTK library loading use-after-free (AWT, 8185325) OpenJDK: ArrayBlockingQueue deserialization to an inconsistent state (Libraries, 8189284) OpenJDK: unbounded memory allocation during deserialization (AWT, 8190289) OpenJDK: unbounded memory allocation in BasicAttributes deserialization (JNDI, 8191142) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4.3 | null |
GHSA-jqpp-gxqw-fmwc | torrent_functions.php in RivetTracker 1.03 and earlier does not properly restrict access, which allows remote attackers to have an unspecified impact. | [] | null | null | null | null |
|
CVE-2020-10760 | A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2019-19897 | In IXP EasyInstall 6.2.13723, there is Remote Code Execution via the Agent Service. An unauthenticated attacker can communicate with the Agent Service over TCP port 20051, and execute code in the NT AUTHORITY\SYSTEM context of the target system by using the Execute Command Line function. | [
"cpe:2.3:a:ixpdata:easyinstall:6.2.13723:*:*:*:*:*:*:*"
] | null | null | 10 | null |
|
CVE-2024-54936 | A Stored Cross-Site Scripting (XSS) vulnerability was found in /send_message.php of Kashipara E-learning Management System v1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the my_message parameter. | [
"cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-6mjv-wqh3-98wq | Microsoft Access Denial of Service Vulnerability | [] | null | 3.3 | null | null |
|
GHSA-693m-3rmr-8fv4 | ** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h contains multiple boundary checks that are performed to prevent out-of-bounds memory read/write. However, two of these boundary checks contain an integer overflow that leads to a bypass of these checks, and out-of-bounds read/write. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [] | null | 7.8 | null | null |
|
RHSA-2021:0165 | Red Hat Security Advisory: libpq security update | postgresql: Reconnection can downgrade connection security settings postgresql: psql's \gset allows overwriting specially treated variables | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
GHSA-4jf5-rp58-78fp | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Johannes van Poelgeest Admin Options Pages allows Reflected XSS. This issue affects Admin Options Pages: from n/a through 0.9.7. | [] | null | 7.1 | null | null |
|
CVE-2023-5204 | The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid parameter in versions up to, and including, 4.8.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [
"cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
|
GHSA-8vj4-q4ww-8jf3 | An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one. | [] | null | null | 9.8 | null |
|
GHSA-78mg-v5p2-3xjr | Accellion Kiteworks before 7.4.0 allows an authenticated user to perform SQL Injection via LDAPGroup Search. | [] | null | null | null | null |
|
CVE-2018-16870 | It was found that wolfssl before 3.15.7 is vulnerable to a new variant of the Bleichenbacher attack to perform downgrade attacks against TLS. This may lead to leakage of sensible data. | [
"cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2014-5317 | Cross-site scripting (XSS) vulnerability in php365.com 365 Links 3.11 and earlier, 365 Links2 3.11 and earlier, 365 Links+ 2.10 and earlier, and 365 Links2+ 2.10 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:php365:365_links:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php365:365_links\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php365:365_links_2\\+:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php365:365_links2:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-rr45-4xhx-rxc8 | A flaw was found in ansible-tower. The default installation is vulnerable to Job Isolation escape allowing an attacker to elevate the privilege from a low privileged user to the awx user from outside the isolated environment. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [] | null | null | null | null |
|
CVE-2023-52151 | WordPress Uncanny Automator Plugin <= 5.1.0.2 is vulnerable to Sensitive Data Exposure | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Uncanny Automator, Uncanny Owl Uncanny Automator – Automate everything with the #1 no-code automation and integration plugin.This issue affects Uncanny Automator – Automate everything with the #1 no-code automation and integration plugin: from n/a through 5.1.0.2.
| [
"cpe:2.3:a:uncannyowl:uncanny_automator:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
GHSA-9jgq-4mjq-qcc9 | A vulnerability has been found in Netgear R6900P and R7000P 1.3.3.154 and classified as critical. Affected by this vulnerability is the function sub_16C4C of the component HTTP Header Handler. The manipulation of the argument Host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 6.9 | 7.3 | null | null |
|
GHSA-33gf-mr65-87rw | Unrestricted Upload of File with Dangerous Type vulnerability in Ajar Productions Ajar in5 Embed allows Upload a Web Shell to a Web Server.This issue affects Ajar in5 Embed: from n/a through 3.1.3. | [] | null | 10 | null | null |
|
CVE-2023-43645 | Denial of service from circular relationship definitions in OpenFGA | OpenFGA is an authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA is vulnerable to a denial of service attack when certain Check calls are executed against authorization models that contain circular relationship definitions. When the call is made, it's possible for the server to exhaust resources and die. Users are advised to upgrade to v1.3.2 and update any offending models. There are no known workarounds for this vulnerability. Note that for models which contained cycles or a relation definition that has the relation itself in its evaluation path, checks and queries that require evaluation will no longer be evaluated on v1.3.2+ and will return errors instead. Users who do not have cyclic models are unaffected. | [
"cpe:2.3:a:openfga:openfga:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2019-16714 | In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2014-7004 | The PETA (aka com.peta.android) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:peta:peta:1.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
CVE-2017-17986 | PHP Scripts Mall Muslim Matrimonial Script has XSS via the admin/caste_view.php comm_id parameter. | [
"cpe:2.3:a:muslim_matrimonial_script_project:muslim_matrimonial_script:3.0.3:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
GHSA-3g43-x7qr-96ph | Possible CSRF token fixation | ImpactWhen authenticating users PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enables `same-site attackers` to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation.PatchesThe problem is fixed in version 8.0.1 | [] | null | 5 | null | null |
CVE-2017-14640 | A NULL pointer dereference was discovered in AP4_AtomSampleTable::GetSample in Core/Ap4AtomSampleTable.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service. | [
"cpe:2.3:a:bento4:bento4:1.5.0-617:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-f6jc-wwhw-gpq7 | The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource Consumption, as demonstrated by a situation with a complex regular expression for the regex extension. | [] | null | 4.3 | null | null |
|
CVE-2024-57919 | drm/amd/display: fix divide error in DM plane scale calcs | In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: fix divide error in DM plane scale calcs
dm_get_plane_scale doesn't take into account plane scaled size equal to
zero, leading to a kernel oops due to division by zero. Fix by setting
out-scale size as zero when the dst size is zero, similar to what is
done by drm_calc_scale(). This issue started with the introduction of
cursor ovelay mode that uses this function to assess cursor mode changes
via dm_crtc_get_cursor_mode() before checking plane state.
[Dec17 17:14] Oops: divide error: 0000 [#1] PREEMPT SMP NOPTI
[ +0.000018] CPU: 5 PID: 1660 Comm: surface-DP-1 Not tainted 6.10.0+ #231
[ +0.000007] Hardware name: Valve Jupiter/Jupiter, BIOS F7A0131 01/30/2024
[ +0.000004] RIP: 0010:dm_get_plane_scale+0x3f/0x60 [amdgpu]
[ +0.000553] Code: 44 0f b7 41 3a 44 0f b7 49 3e 83 e0 0f 48 0f a3 c2 73 21 69 41 28 e8 03 00 00 31 d2 41 f7 f1 31 d2 89 06 69 41 2c e8 03 00 00 <41> f7 f0 89 07 e9 d7 d8 7e e9 44 89 c8 45 89 c1 41 89 c0 eb d4 66
[ +0.000005] RSP: 0018:ffffa8df0de6b8a0 EFLAGS: 00010246
[ +0.000006] RAX: 00000000000003e8 RBX: ffff9ac65c1f6e00 RCX: ffff9ac65d055500
[ +0.000003] RDX: 0000000000000000 RSI: ffffa8df0de6b8b0 RDI: ffffa8df0de6b8b4
[ +0.000004] RBP: ffff9ac64e7a5800 R08: 0000000000000000 R09: 0000000000000a00
[ +0.000003] R10: 00000000000000ff R11: 0000000000000054 R12: ffff9ac6d0700010
[ +0.000003] R13: ffff9ac65d054f00 R14: ffff9ac65d055500 R15: ffff9ac64e7a60a0
[ +0.000004] FS: 00007f869ea00640(0000) GS:ffff9ac970080000(0000) knlGS:0000000000000000
[ +0.000004] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ +0.000003] CR2: 000055ca701becd0 CR3: 000000010e7f2000 CR4: 0000000000350ef0
[ +0.000004] Call Trace:
[ +0.000007] <TASK>
[ +0.000006] ? __die_body.cold+0x19/0x27
[ +0.000009] ? die+0x2e/0x50
[ +0.000007] ? do_trap+0xca/0x110
[ +0.000007] ? do_error_trap+0x6a/0x90
[ +0.000006] ? dm_get_plane_scale+0x3f/0x60 [amdgpu]
[ +0.000504] ? exc_divide_error+0x38/0x50
[ +0.000005] ? dm_get_plane_scale+0x3f/0x60 [amdgpu]
[ +0.000488] ? asm_exc_divide_error+0x1a/0x20
[ +0.000011] ? dm_get_plane_scale+0x3f/0x60 [amdgpu]
[ +0.000593] dm_crtc_get_cursor_mode+0x33f/0x430 [amdgpu]
[ +0.000562] amdgpu_dm_atomic_check+0x2ef/0x1770 [amdgpu]
[ +0.000501] drm_atomic_check_only+0x5e1/0xa30 [drm]
[ +0.000047] drm_mode_atomic_ioctl+0x832/0xcb0 [drm]
[ +0.000050] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10 [drm]
[ +0.000047] drm_ioctl_kernel+0xb3/0x100 [drm]
[ +0.000062] drm_ioctl+0x27a/0x4f0 [drm]
[ +0.000049] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10 [drm]
[ +0.000055] amdgpu_drm_ioctl+0x4e/0x90 [amdgpu]
[ +0.000360] __x64_sys_ioctl+0x97/0xd0
[ +0.000010] do_syscall_64+0x82/0x190
[ +0.000008] ? __pfx_drm_mode_createblob_ioctl+0x10/0x10 [drm]
[ +0.000044] ? srso_return_thunk+0x5/0x5f
[ +0.000006] ? drm_ioctl_kernel+0xb3/0x100 [drm]
[ +0.000040] ? srso_return_thunk+0x5/0x5f
[ +0.000005] ? __check_object_size+0x50/0x220
[ +0.000007] ? srso_return_thunk+0x5/0x5f
[ +0.000005] ? srso_return_thunk+0x5/0x5f
[ +0.000005] ? drm_ioctl+0x2a4/0x4f0 [drm]
[ +0.000039] ? __pfx_drm_mode_createblob_ioctl+0x10/0x10 [drm]
[ +0.000043] ? srso_return_thunk+0x5/0x5f
[ +0.000005] ? srso_return_thunk+0x5/0x5f
[ +0.000005] ? __pm_runtime_suspend+0x69/0xc0
[ +0.000006] ? srso_return_thunk+0x5/0x5f
[ +0.000005] ? amdgpu_drm_ioctl+0x71/0x90 [amdgpu]
[ +0.000366] ? srso_return_thunk+0x5/0x5f
[ +0.000006] ? syscall_exit_to_user_mode+0x77/0x210
[ +0.000007] ? srso_return_thunk+0x5/0x5f
[ +0.000005] ? do_syscall_64+0x8e/0x190
[ +0.000006] ? srso_return_thunk+0x5/0x5f
[ +0.000006] ? do_syscall_64+0x8e/0x190
[ +0.000006] ? srso_return_thunk+0x5/0x5f
[ +0.000007] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ +0.000008] RIP: 0033:0x55bb7cd962bc
[ +0.000007] Code: 4c 89 6c 24 18 4c 89 64 24 20 4c 89 74 24 28 0f 57 c0 0f 11 44 24 30 89 c7 48 8d 54 24 08 b8 10 00 00 00 be bc 64
---truncated--- | [] | null | 5.5 | null | null |
CVE-2024-26061 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] | null | 5.4 | null | null |
RHSA-2023:2084 | Red Hat Security Advisory: libwebp security update | Mozilla: libwebp: Double-free in libwebp | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
GHSA-jfrj-9wpx-245c | explorer.exe in Windows Explorer 6.00.2900.2180 in Microsoft Windows XP SP2 allows user-assisted remote attackers to cause a denial of service via a crafted WMV file. | [] | null | null | null | null |
|
GHSA-v7rr-4hhg-x35r | The password reset functionality in Lepide Active Directory Self Service allows remote authenticated users to change arbitrary domain user passwords via a crafted request. | [] | null | null | null | null |
|
CVE-2020-10376 | Technicolor TC7337NET 08.89.17.23.03 devices allow remote attackers to discover passwords by sniffing the network for an "Authorization: Basic" HTTP header. | [
"cpe:2.3:o:technicolor:tc7337net_firmware:08.89.17.23.03:*:*:*:*:*:*:*",
"cpe:2.3:h:technicolor:tc7337net:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 5 |
|
RHSA-2024:3701 | Red Hat Security Advisory: nghttp2 security update | nghttp2: CONTINUATION frames DoS | [
"cpe:/a:redhat:rhel_eus:8.8::crb",
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.3 | null | null |
GHSA-pgw3-qmf6-36m3 | A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation. | [] | null | 6 | null | null |
|
GHSA-mm24-m3qx-g7j8 | A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root-level privileges. This vulnerability is due to insufficient input validation of data that is passed into the Tcl interpreter. An attacker could exploit this vulnerability by loading malicious Tcl code on an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root. By default, Tcl shell access requires privilege level 15. | [] | null | 6.7 | null | null |
|
CVE-2024-7867 | Integer overflow and divide-by-zero in Xpdf 4.05 due to bogus page box coordinates | In Xpdf 4.05 (and earlier), very large coordinates in a page box can cause an integer overflow and divide-by-zero. | [
"cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*"
] | 2.1 | null | null | null |
GHSA-w4px-9pgm-p2f3 | pyrad uses sequential packet IDs | The CreateID function in packet.py in pyrad before 2.1 uses sequential packet IDs, which makes it easier for remote attackers to spoof packets by predicting the next ID, a different vulnerability than CVE-2013-0294. | [] | 5.3 | 4.3 | null | null |
CVE-2015-1092 | NSXMLParser in Foundation in Apple iOS before 8.3 and Apple TV before 7.2 allows remote attackers to read arbitrary files via an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2005-4642 | Multiple cross-site scripting (XSS) vulnerabilities in HydroBB 1.0.0 Beta 2 allow remote attackers to inject arbitrary web script or HTML via the s parameter to (1) search.php, (2) members.php, (3) stats.php, (4) viewforum.php, (5) register.php, (6) usercp.php, (7) groups.php, (8) pms.php, and (9) calendar.php. | [
"cpe:2.3:a:hydrobb:hydrobb:1.0.0_beta_2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-20403 | IBM Security Verify Information Queue 1.0.6 and 1.0.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. | [
"cpe:2.3:a:ibm:security_verify_information_queue:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_information_queue:1.0.7:*:*:*:*:*:*:*"
] | null | null | 3.1 | null |
|
GHSA-jcf4-gv32-hf7c | Multiple directory traversal vulnerabilities in TuMusika Evolution 1.7R5 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the language parameter to (1) languages_n.php, (2) languages_f.php, or (3) languages.php in inc/; and (4) allow remote attackers to read arbitrary local files via a .. (dot dot) in the uri parameter to frames/nogui/sc_download.php. | [] | null | null | null | null |
|
CVE-2023-46854 | Proxmox proxmox-widget-toolkit before 4.0.9, as used in multiple Proxmox products, allows XSS via the edit notes feature. | [
"cpe:2.3:a:proxmox:proxmox-widget-toolkit:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-cvh9-37c6-rr6p | The SProcXCMiscGetXIDList function in the XC-MISC extension in X.Org X Window System (aka X11 or X) X11R6.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value. | [] | null | null | null | null |
|
GHSA-jmv3-p5rx-7xp8 | Directory traversal vulnerability in Symantec Backup Exec System Recovery Manager 7.x before 7.0.4 and 8.x before 8.0.2 allows remote attackers to read arbitrary files via unspecified vectors. | [] | null | null | null | null |
|
GHSA-hxgv-4m8q-mh2f | Visual C++ Redistributable Installer Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2023-42090 | Foxit PDF Reader XFA Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability | Foxit PDF Reader XFA Doc Object Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-21596. | [
"cpe:2.3:a:foxit:pdf_editor:-:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_editor:2023.1.0.15510:*:*:*:*:*:*:*",
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*"
] | null | null | 3.3 | null |
GHSA-r2mc-qrj9-9325 | Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application. | [] | null | null | null | null |
|
CVE-2011-4583 | Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 displays web service tokens associated with (1) disabled services and (2) users who no longer have authorization, which allows remote authenticated users to have an unspecified impact by reading these tokens. | [
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.