id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-62vc-2f72-vcj3 | Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8. | [] | null | 8.1 | null | null |
|
CVE-2001-0893 | Acme mini_httpd before 1.16 allows remote attackers to view sensitive files under the document root (such as .htpasswd) via a GET request with a trailing /. | [
"cpe:2.3:a:acme:mini_httpd:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-6912 | Hardcoded MSSQL Credentials | Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0. | [
"cpe:2.3:a:perkin_elmer:process_plus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | 9.3 | null | null | null |
RHSA-2019:3842 | Red Hat Security Advisory: kernel security update | hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:rhel_aus:6.6::server"
] | null | null | 6.5 | null |
CVE-2019-1832 | Cisco Firepower Threat Defense Software Detection Engine Policy Bypass Vulnerability | A vulnerability in the detection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured access control policies. The vulnerability is due to improper validation of ICMP packets. An attacker could exploit this vulnerability by sending crafted ICMP packets to the affected device. A successful exploit could allow the attacker to bypass configured access control policies. | [
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*"
] | null | null | 5.8 | null |
CVE-2023-5823 | WordPress TK Google Fonts GDPR Compliant Plugin <= 2.2.11 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in ThemeKraft TK Google Fonts GDPR Compliant plugin <= 2.2.11 versions. | [
"cpe:2.3:a:themekraft:tk_google_fonts_gdpr_compliant:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
CVE-2023-37950 | A missing permission check in Jenkins mabl Plugin 0.0.46 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [
"cpe:2.3:a:jenkins:mabl:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | null |
|
CVE-2024-3739 | cym1102 nginxWebUI upload os command injection | A vulnerability classified as critical was found in cym1102 nginxWebUI up to 3.9.9. This vulnerability affects unknown code of the file /adminPage/main/upload. The manipulation of the argument file leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260578 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:cym1102:nginxwebui:*:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
CVE-2024-8653 | Netcat CMS: multiple reflected cross-site scripting vulnerabilities in netshop module | A vulnerability in NetCat CMS allows an attacker to execute JavaScript code in a user's browser when they visit specific paths on the site.
This issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others.
Apply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch. | [
"cpe:2.3:a:netcat:netcat_content_management_system:*:*:*:*:-:*:*:*"
] | 5.9 | null | null | null |
GHSA-8q5c-93vg-c747 | WITHDRAWN | WITHDRAWN | [] | null | null | null | null |
GHSA-878f-q47g-6pq6 | Unknown versions of Internet Explorer and Outlook allow remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack. | [] | null | null | null | null |
|
GHSA-798v-p58f-mw7j | In the Linux kernel, the following vulnerability has been resolved:btrfs: don't drop extent_map for free space inode on write errorWhile running the CI for an unrelated change I hit the following panic
with generic/648 on btrfs_holes_spacecache.assertion failed: block_start != EXTENT_MAP_HOLE, in fs/btrfs/extent_io.c:1385
------------[ cut here ]------------
kernel BUG at fs/btrfs/extent_io.c:1385!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 1 PID: 2695096 Comm: fsstress Kdump: loaded Tainted: G W 6.8.0-rc2+ #1
RIP: 0010:__extent_writepage_io.constprop.0+0x4c1/0x5c0
Call Trace:
<TASK>
extent_write_cache_pages+0x2ac/0x8f0
extent_writepages+0x87/0x110
do_writepages+0xd5/0x1f0
filemap_fdatawrite_wbc+0x63/0x90
__filemap_fdatawrite_range+0x5c/0x80
btrfs_fdatawrite_range+0x1f/0x50
btrfs_write_out_cache+0x507/0x560
btrfs_write_dirty_block_groups+0x32a/0x420
commit_cowonly_roots+0x21b/0x290
btrfs_commit_transaction+0x813/0x1360
btrfs_sync_file+0x51a/0x640
__x64_sys_fdatasync+0x52/0x90
do_syscall_64+0x9c/0x190
entry_SYSCALL_64_after_hwframe+0x6e/0x76This happens because we fail to write out the free space cache in one
instance, come back around and attempt to write it again. However on
the second pass through we go to call btrfs_get_extent() on the inode to
get the extent mapping. Because this is a new block group, and with the
free space inode we always search the commit root to avoid deadlocking
with the tree, we find nothing and return a EXTENT_MAP_HOLE for the
requested range.This happens because the first time we try to write the space cache out
we hit an error, and on an error we drop the extent mapping. This is
normal for normal files, but the free space cache inode is special. We
always expect the extent map to be correct. Thus the second time
through we end up with a bogus extent map.Since we're deprecating this feature, the most straightforward way to
fix this is to simply skip dropping the extent map range for this failed
range.I shortened the test by using error injection to stress the area to make
it easier to reproduce. With this patch in place we no longer panic
with my error injection test. | [] | null | 5.5 | null | null |
|
GHSA-962c-595j-rvvh | An issue was discovered in INNEO Startup TOOLS 2017 M021 12.0.66.3784 through 2018 M040 13.0.70.3804. The sut_srv.exe web application (served on TCP port 85) includes user input into a filesystem access without any further validation. This might allow an unauthenticated attacker to read files on the server via Directory Traversal, or possibly have unspecified other impact. | [] | null | null | null | null |
|
RHSA-2023:6943 | Red Hat Security Advisory: cloud-init security, bug fix, and enhancement update | cloud-init: sensitive data could be exposed in logs | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.5 | null | null |
GHSA-gfp2-4w95-v37r | In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. | [] | null | 6.7 | null | null |
|
CVE-2021-3560 | It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [
"cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2018-15535 | /filemanager/ajax_calls.php in tecrail Responsive FileManager before 9.13.4 uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize get_file sequences such as ".." that can resolve to a location that is outside of that directory, aka Directory Traversal. | [
"cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-q3qc-2xhc-r4r3 | Cross-site scripting (XSS) vulnerability in the SEO module in ADPLAN 3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to HTTP headers. | [] | null | null | null | null |
|
CVE-2020-1857 | Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage. | [
"cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2022-22329 | IBM Control Desk 7.6.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 219124. | [
"cpe:2.3:a:ibm:control_desk:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_desk:7.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_desk:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_desk:7.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_desk:7.6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_desk:7.6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
RHSA-2017:3277 | Red Hat Security Advisory: tcmu-runner security update | tcmu-runner: glfs handler allows local DoS via crafted CheckConfig strings tcmu-runner: qcow handler opens up an information leak via the CheckConfig D-Bus method tcmu-runner: UnregisterHandler D-Bus method in tcmu-runner daemon for internal handler causes DoS tcmu-runner: UnregisterHandler dbus method in tcmu-runner daemon for non-existing handler causes DoS | [
"cpe:/a:redhat:storage:3.3:server:el7"
] | null | null | 5.5 | null |
GHSA-mhjh-3cgm-qwm4 | The HIPAA Compliant Forms with Drag’n’Drop HIPAA Form Builder. Sign HIPAA documents plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'hipaatizer' shortcode in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
CVE-2024-40973 | media: mtk-vcodec: potential null pointer deference in SCP | In the Linux kernel, the following vulnerability has been resolved:
media: mtk-vcodec: potential null pointer deference in SCP
The return value of devm_kzalloc() needs to be checked to avoid
NULL pointer deference. This is similar to CVE-2022-3113. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-8g69-r984-m943 | A vulnerability was found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ajax/checkin.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | 6.9 | 7.3 | null | null |
|
GHSA-x35w-3585-36xp | Multiple SQL injection vulnerabilities in Epicdesigns tinyBB 0.3 allow remote attackers to execute arbitrary SQL commands via the (1) q parameter in (a) forgot.php, and the (2) username and (3) password parameters in (b) login.php, and other unspecified vectors. | [] | null | null | null | null |
|
CVE-2024-50155 | netdevsim: use cond_resched() in nsim_dev_trap_report_work() | In the Linux kernel, the following vulnerability has been resolved:
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
I am still seeing many syzbot reports hinting that syzbot
might fool nsim_dev_trap_report_work() with hundreds of ports [1]
Lets use cond_resched(), and system_unbound_wq
instead of implicit system_wq.
[1]
INFO: task syz-executor:20633 blocked for more than 143 seconds.
Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor state:D stack:25856 pid:20633 tgid:20633 ppid:1 flags:0x00004006
...
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 16760 Comm: kworker/1:0 Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events nsim_dev_trap_report_work
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210
Code: 89 fb e8 23 00 00 00 48 8b 3d 04 fb 9c 0c 48 89 de 5b e9 c3 c7 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 c0 d7 03 00 65 8b 15 60 f0
RSP: 0018:ffffc90000a187e8 EFLAGS: 00000246
RAX: 0000000000000100 RBX: ffffc90000a188e0 RCX: ffff888027d3bc00
RDX: ffff888027d3bc00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88804a2e6000 R08: ffffffff8a4bc495 R09: ffffffff89da3577
R10: 0000000000000004 R11: ffffffff8a4bc2b0 R12: dffffc0000000000
R13: ffff88806573b503 R14: dffffc0000000000 R15: ffff8880663cca00
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc90a747f98 CR3: 000000000e734000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 000000000000002b DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
<NMI>
</NMI>
<TASK>
__local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
spin_unlock_bh include/linux/spinlock.h:396 [inline]
nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]
nsim_dev_trap_report_work+0x75d/0xaa0 drivers/net/netdevsim/dev.c:850
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
worker_thread+0x870/0xd30 kernel/workqueue.c:3391
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
</TASK> | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-q57j-59f5-7q2m | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server. | [] | null | null | null | null |
|
GHSA-gq4m-rjjh-jgf3 | A stack-based buffer overflow vulnerability exists in the confers ucloud_add_node_new functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability. | [] | null | 8.8 | null | null |
|
GHSA-95fh-3xq2-rfcx | The Rest API component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server - Community Edition, TIBCO JasperReports Server - Developer Edition, TIBCO JasperReports Server for AWS Marketplace, TIBCO JasperReports Server for ActiveMatrix BPM, and TIBCO JasperReports Server for Microsoft Azure contain a race condition that allows a low privileged authenticated attacker via the REST API to obtain read access to temporary objects created by other users on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions 7.2.1 and below, TIBCO JasperReports Server: versions 7.5.0 and 7.5.1, TIBCO JasperReports Server: version 7.8.0, TIBCO JasperReports Server: version 7.9.0, TIBCO JasperReports Server - Community Edition: versions 7.8.0 and below, TIBCO JasperReports Server - Developer Edition: versions 7.9.0 and below, TIBCO JasperReports Server for AWS Marketplace: versions 7.9.0 and below, TIBCO JasperReports Server for ActiveMatrix BPM: versions 7.9.0 and below, and TIBCO JasperReports Server for Microsoft Azure: version 7.8.0. | [] | null | null | null | null |
|
CVE-2020-0378 | In onWnmFrameReceived of PasspointManager.java, there is a missing permission check. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-157748906 | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.9 |
|
GHSA-p42h-vjx3-4qq4 | In imgsys_cmdq, there is a possible out of bounds write due to a missing valid range checking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07340433; Issue ID: ALPS07340381. | [] | null | 6.5 | null | null |
|
GHSA-p35f-8932-32f3 | An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. | [] | null | null | null | null |
|
GHSA-p77m-f595-qx5v | In JetBrains YouTrack before 2023.1.16597 captcha was not properly validated for Helpdesk forms | [] | null | 6.5 | null | null |
|
RHSA-2023:1923 | Red Hat Security Advisory: kpatch-patch security update | kernel: net/ulp: use-after-free in listening ULP sockets | [
"cpe:/o:redhat:rhel_eus:8.6::baseos"
] | null | 7.8 | null | null |
GHSA-47fr-2fhh-8hrg | Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1.5.2) allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay. | [] | null | 3.7 | null | null |
|
GHSA-cg66-23q8-4x4p | AsusSoftwareManager.exe in ASUS System Control Interface on ASUS personal computers (running Windows) allows a local user to write into the Temp directory and delete another more privileged file via SYSTEM privileges. This affects ASUS System Control Interface 3 before 3.1.5.0, AsusSoftwareManger.exe before 1.0.53.0, and AsusLiveUpdate.dll before 1.0.45.0. | [] | null | 6 | null | null |
|
GHSA-4x7v-88r3-h68p | The sell function of a smart contract implementation for DateMe (DMX) (Contract Name: ProgressiveToken), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets. | [] | null | null | 7.5 | null |
|
GHSA-m8q9-pr69-76mx | Aruba ClearPass Policy Manager before 6.5.7 and 6.6.x before 6.6.2 allows attackers to obtain database credentials. | [] | null | null | null | null |
|
CVE-2024-44964 | idpf: fix memory leaks and crashes while performing a soft reset | In the Linux kernel, the following vulnerability has been resolved:
idpf: fix memory leaks and crashes while performing a soft reset
The second tagged commit introduced a UAF, as it removed restoring
q_vector->vport pointers after reinitializating the structures.
This is due to that all queue allocation functions are performed here
with the new temporary vport structure and those functions rewrite
the backpointers to the vport. Then, this new struct is freed and
the pointers start leading to nowhere.
But generally speaking, the current logic is very fragile. It claims
to be more reliable when the system is low on memory, but in fact, it
consumes two times more memory as at the moment of running this
function, there are two vports allocated with their queues and vectors.
Moreover, it claims to prevent the driver from running into "bad state",
but in fact, any error during the rebuild leaves the old vport in the
partially allocated state.
Finally, if the interface is down when the function is called, it always
allocates a new queue set, but when the user decides to enable the
interface later on, vport_open() allocates them once again, IOW there's
a clear memory leak here.
Just don't allocate a new queue set when performing a reset, that solves
crashes and memory leaks. Readd the old queue number and reopen the
interface on rollback - that solves limbo states when the device is left
disabled and/or without HW queues enabled. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2023-25914 | Authneticated Path Traversal in Danfoss AK-SM800A | Due to improper restriction, authenticated attackers could retrieve and read system files of the underlying server through the XML interface. The information that can be read can lead to a full system compromise. | [
"cpe:2.3:h:danfoss:ak-sm_800a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:danfoss:ak-sm_800a_firmware:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-3rgf-crcj-xfm5 | The installation for Microsoft Open XML File Format Converter for Mac sets insecure ACLs for the /Applications folder, which allows local users to execute arbitrary code by replacing the executable with a Trojan Horse, aka "Mac Office Open XML Permissions Vulnerability." | [] | null | null | null | null |
|
GHSA-g9wq-w5xv-986x | HP UCMDB 10.00 and 10.01 before 10.01CUP12, 10.10 and 10.11 before 10.11CUP6, and 10.2x before 10.21 allows local users to obtain sensitive information via unspecified vectors. | [] | null | null | null | null |
|
GHSA-c3wr-wrc5-mqg4 | scilab-bin 4.1.2 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/SciLink#####1, (b) /tmp/SciLink#####2, (c) /tmp/SciLink#####3, (d) /tmp/*.#####, (e) /tmp/*.#####.res, (f) /tmp/*.#####.err, and (g) /tmp/*.#####.diff temporary files, related to the (1) scilink, (2) scidoc, and (3) scidem scripts. | [] | null | null | null | null |
|
GHSA-gg2h-rxjc-7jx5 | Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability. | [] | null | 9.8 | null | null |
|
CVE-2023-24537 | Infinite loop in parsing in go/scanner | Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow. | [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2025-24557 | WordPress PlainInventory plugin <= 3.1.5 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in plainware.com PlainInventory allows Reflected XSS. This issue affects PlainInventory: from n/a through 3.1.5. | [] | null | 7.1 | null | null |
GHSA-rjx8-q2mp-875p | An issue was discovered in zzcms 2019. SQL Injection exists in /admin/dl_sendsms.php via the id parameter. | [] | null | 9.8 | null | null |
|
CVE-2023-30731 | Logic error in package installation via debugger command prior to SMR Oct-2023 Release 1 allows physical attacker to install an application that has different build type. | [
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*"
] | null | 5.7 | null | null |
|
CVE-2015-8272 | RTMPDump 2.4 allows remote attackers to trigger a denial of service (NULL pointer dereference and process crash). | [
"cpe:2.3:a:rtmpdump_project:rtmpdump:2.4:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2023-38200 | Keylime: registrar is subject to a dos against ssl connections | A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections. | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:2.3:a:keylime:keylime:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2025-22473 | Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution. | [] | null | 7.8 | null | null |
|
CVE-2000-1202 | ikeyman in IBM IBMHSSSB 1.0 sets the CLASSPATH environmental variable to include the user's own CLASSPATH directories before the system's directories, which allows a malicious local user to execute arbitrary code as root via a Trojan horse Ikeyman class. | [
"cpe:2.3:a:ibm:http_server_ssl_module_common:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-jrh8-wqgg-7vhv | Cross-site scripting (XSS) vulnerability in login_form.asp in BestWebApp Dating Site allows remote attackers to inject arbitrary web script or HTML via the msg parameter. | [] | null | null | null | null |
|
GHSA-4w46-qc42-6vpq | NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds read. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | [] | null | 7.8 | null | null |
|
GHSA-3jjh-29mr-6r5q | Possible out of bound write in RAM partition table due to improper validation on number of partitions provided in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking | [] | null | null | null | null |
|
CVE-2024-7946 | itsourcecode Online Blood Bank Management System User Signup register.php sql injection | A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file register.php of the component User Signup. The manipulation of the argument user leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:itsourcecode:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-fpv2-wmww-mxc8 | WeGIA < 3.2.0 is vulnerable to SQL Injection in /funcionario/remuneracao.php via the id_funcionario parameter. | [] | null | 9.8 | null | null |
|
CVE-2022-47449 | WordPress Cart Lift – Abandoned Cart Recovery for WooCommerce and EDD Plugin <= 3.1.5 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in RexTheme Cart Lift – Abandoned Cart Recovery for WooCommerce and EDD plugin <= 3.1.5 versions. | [
"cpe:2.3:a:rextheme:cart_lift_-_abandoned_cart_recovery_for_woocommerce_and_edd:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
CVE-2023-28505 | Buffer overflow in UniRPC library function | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a buffer overflow in an API function, where a string is copied into a caller-provided buffer without checking the length. This requires a valid login to exploit. | [
"cpe:2.3:a:rocketsoftware:unidata:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketsoftware:universe:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
GHSA-3q3g-7rqj-c25p | A vulnerability in the conferencing component of Mitel MiVoice Connect, versions R1707-PREM SP1 (21.84.5535.0) and earlier, and Mitel ST 14.2, versions GA27 (19.49.5200.0) and earlier, could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the api.php page. A successful exploit could allow an attacker to execute arbitrary scripts. | [] | null | null | 6.1 | null |
|
RHSA-2024:8374 | Red Hat Security Advisory: python3.11 security update | python: cpython: tarfile: ReDos via excessive backtracking while parsing header values | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 7.5 | null | null |
CVE-2024-22424 | Cross-Site Request Forgery (CSRF) in github.com/argoproj/argo-cd | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The Argo CD API prior to versions 2.10-rc2, 2.9.4, 2.8.8, and 2.7.15 are vulnerable to a cross-server request forgery (CSRF) attack when the attacker has the ability to write HTML to a page on the same parent domain as Argo CD. A CSRF attack works by tricking an authenticated Argo CD user into loading a web page which contains code to call Argo CD API endpoints on the victim’s behalf. For example, an attacker could send an Argo CD user a link to a page which looks harmless but in the background calls an Argo CD API endpoint to create an application running malicious code. Argo CD uses the “Lax” SameSite cookie policy to prevent CSRF attacks where the attacker controls an external domain. The malicious external website can attempt to call the Argo CD API, but the web browser will refuse to send the Argo CD auth token with the request. Many companies host Argo CD on an internal subdomain. If an attacker can place malicious code on, for example, https://test.internal.example.com/, they can still perform a CSRF attack. In this case, the “Lax” SameSite cookie does not prevent the browser from sending the auth cookie, because the destination is a parent domain of the Argo CD API. Browsers generally block such attacks by applying CORS policies to sensitive requests with sensitive content types. Specifically, browsers will send a “preflight request” for POSTs with content type “application/json” asking the destination API “are you allowed to accept requests from my domain?” If the destination API does not answer “yes,” the browser will block the request. Before the patched versions, Argo CD did not validate that requests contained the correct content type header. So an attacker could bypass the browser’s CORS check by setting the content type to something which is considered “not sensitive” such as “text/plain.” The browser wouldn’t send the preflight request, and Argo CD would happily accept the contents (which are actually still JSON) and perform the requested action (such as running malicious code). A patch for this vulnerability has been released in the following Argo CD versions: 2.10-rc2, 2.9.4, 2.8.8, and 2.7.15. The patch contains a breaking API change. The Argo CD API will no longer accept non-GET requests which do not specify application/json as their Content-Type. The accepted content types list is configurable, and it is possible (but discouraged) to disable the content type check completely. Users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:argoproj:argo_cd:2.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
CVE-2005-1811 | Cross-site scripting (XSS) vulnerability in usercp.php for MyBulletinBoard (MyBB) allows remote attackers to inject arbitrary web script or HTML via the website field in a user profile. | [
"cpe:2.3:a:mybulletinboard:mybulletinboard:1.0_rc4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2023:0970 | Red Hat Security Advisory: httpd security and bug fix update | httpd: mod_dav: out-of-bounds read/write of zero byte httpd: mod_proxy_ajp: Possible request smuggling httpd: mod_proxy: HTTP response splitting | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.3 | null | null |
CVE-2014-6936 | The IDS 2013 (aka de.mobileeventguide.ids2013) application 1.21 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:mobileeventguide:ids_2013:1.21:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-jmhc-vxg9-h2g4 | A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions. | [] | null | 9.8 | null | null |
|
GHSA-5x5p-4jrq-gcvg | The UA Cinemas - Mobile ticketing (aka com.mtel.uacinemaapps) application 2.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2021-36012 | Magento Commerce Gift Card Business Logic Error | Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by a business logic error in the placeOrder graphql mutation. An authenticated attacker can leverage this vulnerability to altar the price of an item. | [
"cpe:2.3:a:adobe:adobe_commerce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_commerce:2.4.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento_open_source:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento_open_source:2.4.2:p1:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-c4mh-7455-pvxv | Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages incorrect handling of objects in memory, aka "Kernel Race Condition Vulnerability," a different vulnerability than CVE-2013-1279. | [] | null | 7.4 | null | null |
|
CVE-2022-37724 | Project Wonder WebObjects 1.0 through 5.4.3 is vulnerable to Arbitrary HTTP Header injection and URL- or Header-based XSS reflection in all web-server adaptor interfaces. | [
"cpe:2.3:a:apple:webobjects:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2015-3808 | The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-pm7m-jm2q-c9x9 | Sourcecodester Simple Social Networking Site v1.0 is vulnerable to SQL Injection via /sns/admin/?page=posts/view_post&id=. | [] | null | 7.2 | null | null |
|
CVE-2024-6224 | Send email only on Reply to My Comment <= 1.0.6 - Stored XSS via CSRF | The Send email only on Reply to My Comment WordPress plugin through 1.0.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | [
"cpe:2.3:a:elance360:send-email-only-on-reply-to-my-comment:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
RHSA-2020:0374 | Red Hat Security Advisory: kernel security and bug fix update | kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 kernel: heap overflow in marvell/mwifiex/tdls.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8 | 8.8 | null |
GHSA-xw8p-6vv6-4c5g | RIOT OS version 2020.01.1 is vulnerable to integer wrap-around in its implementation of calloc function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. | [] | null | 9.8 | null | null |
|
GHSA-q8gr-xw25-p2h3 | An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. | [] | null | null | 8.8 | null |
|
CVE-2014-3939 | Heap-based buffer overflow in Autodesk SketchBook Pro before 6.2.6 allows remote attackers to execute arbitrary code via crafted layer bitmap data in a PXD file. | [
"cpe:2.3:a:autodesk:sketchbook_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:sketchbook_pro:6.2.4:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-cgh2-v9gr-9477 | An Insecure Direct Object Reference (IDOR) vulnerability in appointment-detail.php in Phpgurukul's Beauty Parlour Management System v1.1 allows unauthorized access to the Personally Identifiable Information (PII) of other customers. | [] | null | 7.5 | null | null |
|
GHSA-wxhf-q9xw-8x6v | Multiple PHP remote file inclusion vulnerabilities in ubbt.inc.php in Groupee UBB.threads 6.5.1.1 allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[thispath] or (2) GLOBALS[configdir] parameter. | [] | null | null | null | null |
|
CVE-2021-24793 | WPeMatico RSS Feed Fetcher < 2.6.12 - Admin+ Stored Cross-Site Scripting | The WPeMatico RSS Feed Fetcher WordPress plugin before 2.6.12 does not escape the Feed URL added to a campaign before outputting it in an attribute, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | [
"cpe:2.3:a:etruel:wpematico_rss_feed_fetcher:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
CVE-2005-2161 | Cross-site scripting (XSS) vulnerability in phpBB 2.0.16 allows remote attackers to inject arbitrary web script or HTML via nested [url] tags. | [
"cpe:2.3:a:phpbb_group:phpbb:2.0.16:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2013-5175 | The kernel in Apple Mac OS X before 10.9 allows local users to obtain sensitive information or cause a denial of service (out-of-bounds read and system crash) via a crafted Mach-O file. | [
"cpe:2.3:o:apple:mac_os_x:*:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*"
] | null | null | null | 6.6 |
|
CVE-2023-1098 | An information disclosure vulnerability has been discovered in GitLab EE/CE affecting all versions starting from 11.5 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1 will allow an admin to leak password from repository mirror configuration. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:enterprise:*:*:*"
] | null | 5.8 | null | null |
|
CVE-2025-43704 | Arctera/Veritas Data Insight before 7.1.2 can send cleartext credentials when configured to use HTTP Basic Authentication to a Dell Isilon OneFS server. | [] | null | 4.7 | null | null |
|
CVE-2005-2271 | iCab 2.9.8 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability." | [
"cpe:2.3:a:alexander_clauss:icab:2.9.8:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-m9q5-xj5r-c8v2 | The function allocation code (js_NewFunction in jsfun.c) in Firefox 1.5 allows attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via user-defined methods that trigger garbage collection in a way that operates on freed objects. | [] | null | null | null | null |
|
CVE-2017-7273 | The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report. | [
"cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.1.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.3:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.4.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5.0:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.7:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.8.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*"
] | null | null | 6.6 | 4.6 |
|
GHSA-2fq9-5c52-qvcp | Zyxel NBG-418N v2 v1.00(AAXM.4)C0 devices allow login.cgi CSRF. | [] | null | null | 8.8 | null |
|
GHSA-cvqc-8rrv-whf2 | A Stored XSS in merge request creation page in Gitlab EE version 13.5 and above allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious approval rule names | [] | null | 5.4 | null | null |
|
CVE-2023-1948 | PHPGurukul BP Monitoring Management System Add New Family Member add-family-member.php cross site scripting | A vulnerability, which was classified as problematic, has been found in PHPGurukul BP Monitoring Management System 1.0. This issue affects some unknown processing of the file add-family-member.php of the component Add New Family Member Handler. The manipulation of the argument Member Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225335. | [
"cpe:2.3:a:phpgurukul:bp_monitoring_management_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
CVE-2009-0706 | SQL injection vulnerability in the Simple Review (com_simple_review) component 1.3.5 for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the category parameter to index.php. | [
"cpe:2.3:a:simple-review:com_simple_review:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2015-0255 | X.Org Server (aka xserver and xorg-server) before 1.16.3 and 1.17.x before 1.17.1 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (crash) via a crafted string length value in a XkbSetGeometry request. | [
"cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:x.org:xorg-server:1.17.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-2010-1460 | The IBM BladeCenter with Advanced Management Module (AMM) firmware before bpet50g does not properly perform interrupt sharing for USB and iSCSI, which allows remote attackers to cause a denial of service (management module reboot) via TCP packets with malformed application data. | [
"cpe:2.3:h:ibm:advanced_management_module:*:c:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.00:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.01:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.20:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.20:f:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.25:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.25:e:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.25:i:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.26:b:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.26:e:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.26:h:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.26:i:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.26:k:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.28:g:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.32:d:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.34:b:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.34:e:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.36:d:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.36:g:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.36:h:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.36:k:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:d:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:f:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:i:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:n:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:o:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:1.42:t:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.46:c:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.46:j:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.48:c:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.48:d:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.48:g:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.48:l:*:*:*:*:*:*",
"cpe:2.3:h:ibm:advanced_management_module:2.48:n:*:*:*:*:*:*",
"cpe:2.3:h:ibm:bladecenter:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2014-9104 | Multiple cross-site request forgery (CSRF) vulnerabilities in the XML-RPC API in the Desktop Client in OpenVPN Access Server 1.5.6 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) disconnecting established VPN sessions, (2) connect to arbitrary VPN servers, or (3) create VPN profiles and execute arbitrary commands via crafted API requests. | [
"cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-c6xr-3cp2-f7f7 | Multiple cross-site request forgery (CSRF) vulnerabilities on Motorola Surfboard with software SB5100-2.3.3.0-SCM00-NOSH allow remote attackers to (1) cause a denial of service (device reboot) via the "Restart Cable Modem" value in the BUTTON_INPUT parameter to configdata.html, and (2) cause a denial of service (hard reset) via the "Reset All Defaults" value in the BUTTON_INPUT parameter to configdata.html. | [] | null | null | null | null |
|
GHSA-g653-jwh7-jh7g | An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. CSRF exists via wp-admin/admin.php. | [] | null | null | 8.8 | null |
|
CVE-2010-0199 | Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0202, and CVE-2010-0203. | [
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
RHSA-2012:1135 | Red Hat Security Advisory: libreoffice security update | libreoffice: Multiple heap-based buffer overflows in the XML manifest encryption handling code | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2014-1264 | Finder in Apple OS X before 10.9.2 does not ensure ACL integrity after the viewing of file ACL information, which allows local users to bypass intended access restrictions in opportunistic circumstances via standard filesystem operations on a file with a damaged ACL. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*"
] | null | null | null | 3.3 |
|
CVE-2013-0074 | Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability." | [
"cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.