id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-62vc-2f72-vcj3
Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 123 and Firefox ESR < 115.8.
[]
null
8.1
null
null
CVE-2001-0893
Acme mini_httpd before 1.16 allows remote attackers to view sensitive files under the document root (such as .htpasswd) via a GET request with a trailing /.
[ "cpe:2.3:a:acme:mini_httpd:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2024-6912
Hardcoded MSSQL Credentials
Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0.
[ "cpe:2.3:a:perkin_elmer:process_plus:*:*:*:*:*:*:*:*", "cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
9.3
null
null
null
RHSA-2019:3842
Red Hat Security Advisory: kernel security update
hw: Machine Check Error on Page Size Change (IFU) hw: TSX Transaction Asynchronous Abort (TAA)
[ "cpe:/o:redhat:rhel_aus:6.6::server" ]
null
null
6.5
null
CVE-2019-1832
Cisco Firepower Threat Defense Software Detection Engine Policy Bypass Vulnerability
A vulnerability in the detection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured access control policies. The vulnerability is due to improper validation of ICMP packets. An attacker could exploit this vulnerability by sending crafted ICMP packets to the affected device. A successful exploit could allow the attacker to bypass configured access control policies.
[ "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*" ]
null
null
5.8
null
CVE-2023-5823
WordPress TK Google Fonts GDPR Compliant Plugin <= 2.2.11 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in ThemeKraft TK Google Fonts GDPR Compliant plugin <= 2.2.11 versions.
[ "cpe:2.3:a:themekraft:tk_google_fonts_gdpr_compliant:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
CVE-2023-37950
A missing permission check in Jenkins mabl Plugin 0.0.46 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:mabl:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
null
CVE-2024-3739
cym1102 nginxWebUI upload os command injection
A vulnerability classified as critical was found in cym1102 nginxWebUI up to 3.9.9. This vulnerability affects unknown code of the file /adminPage/main/upload. The manipulation of the argument file leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-260578 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:cym1102:nginxwebui:*:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
CVE-2024-8653
Netcat CMS: multiple reflected cross-site scripting vulnerabilities in netshop module
A vulnerability in NetCat CMS allows an attacker to execute JavaScript code in a user's browser when they visit specific paths on the site. This issue affects NetCat CMS v. 6.4.0.24126.2 and possibly others. Apply patch from vendor https://netcat.ru/ https://netcat.ru/] . Versions 6.4.0.24248 and on have the patch.
[ "cpe:2.3:a:netcat:netcat_content_management_system:*:*:*:*:-:*:*:*" ]
5.9
null
null
null
GHSA-8q5c-93vg-c747
WITHDRAWN
WITHDRAWN
[]
null
null
null
null
GHSA-878f-q47g-6pq6
Unknown versions of Internet Explorer and Outlook allow remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.
[]
null
null
null
null
GHSA-798v-p58f-mw7j
In the Linux kernel, the following vulnerability has been resolved:btrfs: don't drop extent_map for free space inode on write errorWhile running the CI for an unrelated change I hit the following panic with generic/648 on btrfs_holes_spacecache.assertion failed: block_start != EXTENT_MAP_HOLE, in fs/btrfs/extent_io.c:1385 ------------[ cut here ]------------ kernel BUG at fs/btrfs/extent_io.c:1385! invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 1 PID: 2695096 Comm: fsstress Kdump: loaded Tainted: G W 6.8.0-rc2+ #1 RIP: 0010:__extent_writepage_io.constprop.0+0x4c1/0x5c0 Call Trace: <TASK> extent_write_cache_pages+0x2ac/0x8f0 extent_writepages+0x87/0x110 do_writepages+0xd5/0x1f0 filemap_fdatawrite_wbc+0x63/0x90 __filemap_fdatawrite_range+0x5c/0x80 btrfs_fdatawrite_range+0x1f/0x50 btrfs_write_out_cache+0x507/0x560 btrfs_write_dirty_block_groups+0x32a/0x420 commit_cowonly_roots+0x21b/0x290 btrfs_commit_transaction+0x813/0x1360 btrfs_sync_file+0x51a/0x640 __x64_sys_fdatasync+0x52/0x90 do_syscall_64+0x9c/0x190 entry_SYSCALL_64_after_hwframe+0x6e/0x76This happens because we fail to write out the free space cache in one instance, come back around and attempt to write it again. However on the second pass through we go to call btrfs_get_extent() on the inode to get the extent mapping. Because this is a new block group, and with the free space inode we always search the commit root to avoid deadlocking with the tree, we find nothing and return a EXTENT_MAP_HOLE for the requested range.This happens because the first time we try to write the space cache out we hit an error, and on an error we drop the extent mapping. This is normal for normal files, but the free space cache inode is special. We always expect the extent map to be correct. Thus the second time through we end up with a bogus extent map.Since we're deprecating this feature, the most straightforward way to fix this is to simply skip dropping the extent map range for this failed range.I shortened the test by using error injection to stress the area to make it easier to reproduce. With this patch in place we no longer panic with my error injection test.
[]
null
5.5
null
null
GHSA-962c-595j-rvvh
An issue was discovered in INNEO Startup TOOLS 2017 M021 12.0.66.3784 through 2018 M040 13.0.70.3804. The sut_srv.exe web application (served on TCP port 85) includes user input into a filesystem access without any further validation. This might allow an unauthenticated attacker to read files on the server via Directory Traversal, or possibly have unspecified other impact.
[]
null
null
null
null
RHSA-2023:6943
Red Hat Security Advisory: cloud-init security, bug fix, and enhancement update
cloud-init: sensitive data could be exposed in logs
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
5.5
null
null
GHSA-gfp2-4w95-v37r
In network service, there is a missing permission check. This could lead to local escalation of privilege with System execution privileges needed.
[]
null
6.7
null
null
CVE-2021-3560
It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[ "cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2018-15535
/filemanager/ajax_calls.php in tecrail Responsive FileManager before 9.13.4 uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize get_file sequences such as ".." that can resolve to a location that is outside of that directory, aka Directory Traversal.
[ "cpe:2.3:a:tecrail:responsive_filemanager:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-q3qc-2xhc-r4r3
Cross-site scripting (XSS) vulnerability in the SEO module in ADPLAN 3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to HTTP headers.
[]
null
null
null
null
CVE-2020-1857
Huawei NIP6800 versions V500R001C30, V500R001C60SPC500, and V500R005C00SPC100; and Secospace USG6600 and USG9500 versions V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, and V500R005C00SPC100 have an information leakage vulnerability. Due to improper processing of some data, a local authenticated attacker can exploit this vulnerability through a series of operations. Successful exploitation may cause information leakage.
[ "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00spc100:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2022-22329
IBM Control Desk 7.6.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 219124.
[ "cpe:2.3:a:ibm:control_desk:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_desk:7.6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_desk:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_desk:7.6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_desk:7.6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:control_desk:7.6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
4.3
null
RHSA-2017:3277
Red Hat Security Advisory: tcmu-runner security update
tcmu-runner: glfs handler allows local DoS via crafted CheckConfig strings tcmu-runner: qcow handler opens up an information leak via the CheckConfig D-Bus method tcmu-runner: UnregisterHandler D-Bus method in tcmu-runner daemon for internal handler causes DoS tcmu-runner: UnregisterHandler dbus method in tcmu-runner daemon for non-existing handler causes DoS
[ "cpe:/a:redhat:storage:3.3:server:el7" ]
null
null
5.5
null
GHSA-mhjh-3cgm-qwm4
The HIPAA Compliant Forms with Drag’n’Drop HIPAA Form Builder. Sign HIPAA documents plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'hipaatizer' shortcode in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2024-40973
media: mtk-vcodec: potential null pointer deference in SCP
In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of devm_kzalloc() needs to be checked to avoid NULL pointer deference. This is similar to CVE-2022-3113.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-8g69-r984-m943
A vulnerability was found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /ajax/checkin.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
6.9
7.3
null
null
GHSA-x35w-3585-36xp
Multiple SQL injection vulnerabilities in Epicdesigns tinyBB 0.3 allow remote attackers to execute arbitrary SQL commands via the (1) q parameter in (a) forgot.php, and the (2) username and (3) password parameters in (b) login.php, and other unspecified vectors.
[]
null
null
null
null
CVE-2024-50155
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
In the Linux kernel, the following vulnerability has been resolved: netdevsim: use cond_resched() in nsim_dev_trap_report_work() I am still seeing many syzbot reports hinting that syzbot might fool nsim_dev_trap_report_work() with hundreds of ports [1] Lets use cond_resched(), and system_unbound_wq instead of implicit system_wq. [1] INFO: task syz-executor:20633 blocked for more than 143 seconds. Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor state:D stack:25856 pid:20633 tgid:20633 ppid:1 flags:0x00004006 ... NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 16760 Comm: kworker/1:0 Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: events nsim_dev_trap_report_work RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210 Code: 89 fb e8 23 00 00 00 48 8b 3d 04 fb 9c 0c 48 89 de 5b e9 c3 c7 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 c0 d7 03 00 65 8b 15 60 f0 RSP: 0018:ffffc90000a187e8 EFLAGS: 00000246 RAX: 0000000000000100 RBX: ffffc90000a188e0 RCX: ffff888027d3bc00 RDX: ffff888027d3bc00 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff88804a2e6000 R08: ffffffff8a4bc495 R09: ffffffff89da3577 R10: 0000000000000004 R11: ffffffff8a4bc2b0 R12: dffffc0000000000 R13: ffff88806573b503 R14: dffffc0000000000 R15: ffff8880663cca00 FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc90a747f98 CR3: 000000000e734000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 000000000000002b DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Call Trace: <NMI> </NMI> <TASK> __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x75d/0xaa0 drivers/net/netdevsim/dev.c:850 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 </TASK>
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.7.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-q57j-59f5-7q2m
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server.
[]
null
null
null
null
GHSA-gq4m-rjjh-jgf3
A stack-based buffer overflow vulnerability exists in the confers ucloud_add_node_new functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
[]
null
8.8
null
null
GHSA-95fh-3xq2-rfcx
The Rest API component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server, TIBCO JasperReports Server - Community Edition, TIBCO JasperReports Server - Developer Edition, TIBCO JasperReports Server for AWS Marketplace, TIBCO JasperReports Server for ActiveMatrix BPM, and TIBCO JasperReports Server for Microsoft Azure contain a race condition that allows a low privileged authenticated attacker via the REST API to obtain read access to temporary objects created by other users on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Server: versions 7.2.1 and below, TIBCO JasperReports Server: versions 7.5.0 and 7.5.1, TIBCO JasperReports Server: version 7.8.0, TIBCO JasperReports Server: version 7.9.0, TIBCO JasperReports Server - Community Edition: versions 7.8.0 and below, TIBCO JasperReports Server - Developer Edition: versions 7.9.0 and below, TIBCO JasperReports Server for AWS Marketplace: versions 7.9.0 and below, TIBCO JasperReports Server for ActiveMatrix BPM: versions 7.9.0 and below, and TIBCO JasperReports Server for Microsoft Azure: version 7.8.0.
[]
null
null
null
null
CVE-2020-0378
In onWnmFrameReceived of PasspointManager.java, there is a missing permission check. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-157748906
[ "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
GHSA-p42h-vjx3-4qq4
In imgsys_cmdq, there is a possible out of bounds write due to a missing valid range checking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07340433; Issue ID: ALPS07340381.
[]
null
6.5
null
null
GHSA-p35f-8932-32f3
An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data.
[]
null
null
null
null
GHSA-p77m-f595-qx5v
In JetBrains YouTrack before 2023.1.16597 captcha was not properly validated for Helpdesk forms
[]
null
6.5
null
null
RHSA-2023:1923
Red Hat Security Advisory: kpatch-patch security update
kernel: net/ulp: use-after-free in listening ULP sockets
[ "cpe:/o:redhat:rhel_eus:8.6::baseos" ]
null
7.8
null
null
GHSA-47fr-2fhh-8hrg
Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1.5.2) allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay.
[]
null
3.7
null
null
GHSA-cg66-23q8-4x4p
AsusSoftwareManager.exe in ASUS System Control Interface on ASUS personal computers (running Windows) allows a local user to write into the Temp directory and delete another more privileged file via SYSTEM privileges. This affects ASUS System Control Interface 3 before 3.1.5.0, AsusSoftwareManger.exe before 1.0.53.0, and AsusLiveUpdate.dll before 1.0.45.0.
[]
null
6
null
null
GHSA-4x7v-88r3-h68p
The sell function of a smart contract implementation for DateMe (DMX) (Contract Name: ProgressiveToken), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets.
[]
null
null
7.5
null
GHSA-m8q9-pr69-76mx
Aruba ClearPass Policy Manager before 6.5.7 and 6.6.x before 6.6.2 allows attackers to obtain database credentials.
[]
null
null
null
null
CVE-2024-44964
idpf: fix memory leaks and crashes while performing a soft reset
In the Linux kernel, the following vulnerability has been resolved: idpf: fix memory leaks and crashes while performing a soft reset The second tagged commit introduced a UAF, as it removed restoring q_vector->vport pointers after reinitializating the structures. This is due to that all queue allocation functions are performed here with the new temporary vport structure and those functions rewrite the backpointers to the vport. Then, this new struct is freed and the pointers start leading to nowhere. But generally speaking, the current logic is very fragile. It claims to be more reliable when the system is low on memory, but in fact, it consumes two times more memory as at the moment of running this function, there are two vports allocated with their queues and vectors. Moreover, it claims to prevent the driver from running into "bad state", but in fact, any error during the rebuild leaves the old vport in the partially allocated state. Finally, if the interface is down when the function is called, it always allocates a new queue set, but when the user decides to enable the interface later on, vport_open() allocates them once again, IOW there's a clear memory leak here. Just don't allocate a new queue set when performing a reset, that solves crashes and memory leaks. Readd the old queue number and reopen the interface on rollback - that solves limbo states when the device is left disabled and/or without HW queues enabled.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2023-25914
Authneticated Path Traversal in Danfoss AK-SM800A
Due to improper restriction, authenticated attackers could retrieve and read system files of the underlying server through the XML interface. The information that can be read can lead to a full system compromise.
[ "cpe:2.3:h:danfoss:ak-sm_800a:-:*:*:*:*:*:*:*", "cpe:2.3:o:danfoss:ak-sm_800a_firmware:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-3rgf-crcj-xfm5
The installation for Microsoft Open XML File Format Converter for Mac sets insecure ACLs for the /Applications folder, which allows local users to execute arbitrary code by replacing the executable with a Trojan Horse, aka "Mac Office Open XML Permissions Vulnerability."
[]
null
null
null
null
GHSA-g9wq-w5xv-986x
HP UCMDB 10.00 and 10.01 before 10.01CUP12, 10.10 and 10.11 before 10.11CUP6, and 10.2x before 10.21 allows local users to obtain sensitive information via unspecified vectors.
[]
null
null
null
null
GHSA-c3wr-wrc5-mqg4
scilab-bin 4.1.2 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/SciLink#####1, (b) /tmp/SciLink#####2, (c) /tmp/SciLink#####3, (d) /tmp/*.#####, (e) /tmp/*.#####.res, (f) /tmp/*.#####.err, and (g) /tmp/*.#####.diff temporary files, related to the (1) scilink, (2) scidoc, and (3) scidem scripts.
[]
null
null
null
null
GHSA-gg2h-rxjc-7jx5
Vulnerability of incomplete read and write permission verification in the GPU module. Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.
[]
null
9.8
null
null
CVE-2023-24537
Infinite loop in parsing in go/scanner
Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.
[ "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2025-24557
WordPress PlainInventory plugin <= 3.1.5 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in plainware.com PlainInventory allows Reflected XSS. This issue affects PlainInventory: from n/a through 3.1.5.
[]
null
7.1
null
null
GHSA-rjx8-q2mp-875p
An issue was discovered in zzcms 2019. SQL Injection exists in /admin/dl_sendsms.php via the id parameter.
[]
null
9.8
null
null
CVE-2023-30731
Logic error in package installation via debugger command prior to SMR Oct-2023 Release 1 allows physical attacker to install an application that has different build type.
[ "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*" ]
null
5.7
null
null
CVE-2015-8272
RTMPDump 2.4 allows remote attackers to trigger a denial of service (NULL pointer dereference and process crash).
[ "cpe:2.3:a:rtmpdump_project:rtmpdump:2.4:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2023-38200
Keylime: registrar is subject to a dos against ssl connections
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:2.3:a:keylime:keylime:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0_ppc64le:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2025-22473
Dell SmartFabric OS10 Software, version(s) 10.5.4.x, 10.5.5.x, 10.5.6.x, 10.6.0.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
[]
null
7.8
null
null
CVE-2000-1202
ikeyman in IBM IBMHSSSB 1.0 sets the CLASSPATH environmental variable to include the user's own CLASSPATH directories before the system's directories, which allows a malicious local user to execute arbitrary code as root via a Trojan horse Ikeyman class.
[ "cpe:2.3:a:ibm:http_server_ssl_module_common:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-jrh8-wqgg-7vhv
Cross-site scripting (XSS) vulnerability in login_form.asp in BestWebApp Dating Site allows remote attackers to inject arbitrary web script or HTML via the msg parameter.
[]
null
null
null
null
GHSA-4w46-qc42-6vpq
NVIDIA GPU Display Driver for Windows contains a vulnerability in the user mode layer, where an unprivileged regular user can cause an out-of-bounds read. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
[]
null
7.8
null
null
GHSA-3jjh-29mr-6r5q
Possible out of bound write in RAM partition table due to improper validation on number of partitions provided in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
[]
null
null
null
null
CVE-2024-7946
itsourcecode Online Blood Bank Management System User Signup register.php sql injection
A vulnerability was found in itsourcecode Online Blood Bank Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file register.php of the component User Signup. The manipulation of the argument user leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:itsourcecode:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:adonesevangelista:online_blood_bank_management_system:1.0:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
GHSA-fpv2-wmww-mxc8
WeGIA < 3.2.0 is vulnerable to SQL Injection in /funcionario/remuneracao.php via the id_funcionario parameter.
[]
null
9.8
null
null
CVE-2022-47449
WordPress Cart Lift – Abandoned Cart Recovery for WooCommerce and EDD Plugin <= 3.1.5 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in RexTheme Cart Lift – Abandoned Cart Recovery for WooCommerce and EDD plugin <= 3.1.5 versions.
[ "cpe:2.3:a:rextheme:cart_lift_-_abandoned_cart_recovery_for_woocommerce_and_edd:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
CVE-2023-28505
Buffer overflow in UniRPC library function
Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a buffer overflow in an API function, where a string is copied into a caller-provided buffer without checking the length. This requires a valid login to exploit.
[ "cpe:2.3:a:rocketsoftware:unidata:*:*:*:*:*:*:*:*", "cpe:2.3:a:rocketsoftware:universe:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-3q3g-7rqj-c25p
A vulnerability in the conferencing component of Mitel MiVoice Connect, versions R1707-PREM SP1 (21.84.5535.0) and earlier, and Mitel ST 14.2, versions GA27 (19.49.5200.0) and earlier, could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the api.php page. A successful exploit could allow an attacker to execute arbitrary scripts.
[]
null
null
6.1
null
RHSA-2024:8374
Red Hat Security Advisory: python3.11 security update
python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
7.5
null
null
CVE-2024-22424
Cross-Site Request Forgery (CSRF) in github.com/argoproj/argo-cd
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The Argo CD API prior to versions 2.10-rc2, 2.9.4, 2.8.8, and 2.7.15 are vulnerable to a cross-server request forgery (CSRF) attack when the attacker has the ability to write HTML to a page on the same parent domain as Argo CD. A CSRF attack works by tricking an authenticated Argo CD user into loading a web page which contains code to call Argo CD API endpoints on the victim’s behalf. For example, an attacker could send an Argo CD user a link to a page which looks harmless but in the background calls an Argo CD API endpoint to create an application running malicious code. Argo CD uses the “Lax” SameSite cookie policy to prevent CSRF attacks where the attacker controls an external domain. The malicious external website can attempt to call the Argo CD API, but the web browser will refuse to send the Argo CD auth token with the request. Many companies host Argo CD on an internal subdomain. If an attacker can place malicious code on, for example, https://test.internal.example.com/, they can still perform a CSRF attack. In this case, the “Lax” SameSite cookie does not prevent the browser from sending the auth cookie, because the destination is a parent domain of the Argo CD API. Browsers generally block such attacks by applying CORS policies to sensitive requests with sensitive content types. Specifically, browsers will send a “preflight request” for POSTs with content type “application/json” asking the destination API “are you allowed to accept requests from my domain?” If the destination API does not answer “yes,” the browser will block the request. Before the patched versions, Argo CD did not validate that requests contained the correct content type header. So an attacker could bypass the browser’s CORS check by setting the content type to something which is considered “not sensitive” such as “text/plain.” The browser wouldn’t send the preflight request, and Argo CD would happily accept the contents (which are actually still JSON) and perform the requested action (such as running malicious code). A patch for this vulnerability has been released in the following Argo CD versions: 2.10-rc2, 2.9.4, 2.8.8, and 2.7.15. The patch contains a breaking API change. The Argo CD API will no longer accept non-GET requests which do not specify application/json as their Content-Type. The accepted content types list is configurable, and it is possible (but discouraged) to disable the content type check completely. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "cpe:2.3:a:argoproj:argo_cd:2.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*" ]
null
8.4
null
null
CVE-2005-1811
Cross-site scripting (XSS) vulnerability in usercp.php for MyBulletinBoard (MyBB) allows remote attackers to inject arbitrary web script or HTML via the website field in a user profile.
[ "cpe:2.3:a:mybulletinboard:mybulletinboard:1.0_rc4:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2023:0970
Red Hat Security Advisory: httpd security and bug fix update
httpd: mod_dav: out-of-bounds read/write of zero byte httpd: mod_proxy_ajp: Possible request smuggling httpd: mod_proxy: HTTP response splitting
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
5.3
null
null
CVE-2014-6936
The IDS 2013 (aka de.mobileeventguide.ids2013) application 1.21 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:mobileeventguide:ids_2013:1.21:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-jmhc-vxg9-h2g4
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.
[]
null
9.8
null
null
GHSA-5x5p-4jrq-gcvg
The UA Cinemas - Mobile ticketing (aka com.mtel.uacinemaapps) application 2.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2021-36012
Magento Commerce Gift Card Business Logic Error
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by a business logic error in the placeOrder graphql mutation. An authenticated attacker can leverage this vulnerability to altar the price of an item.
[ "cpe:2.3:a:adobe:adobe_commerce:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_commerce:2.4.2:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento_open_source:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento_open_source:2.4.2:p1:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-c4mh-7455-pvxv
Race condition in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages incorrect handling of objects in memory, aka "Kernel Race Condition Vulnerability," a different vulnerability than CVE-2013-1279.
[]
null
7.4
null
null
CVE-2022-37724
Project Wonder WebObjects 1.0 through 5.4.3 is vulnerable to Arbitrary HTTP Header injection and URL- or Header-based XSS reflection in all web-server adaptor interfaces.
[ "cpe:2.3:a:apple:webobjects:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2015-3808
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
[ "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-pm7m-jm2q-c9x9
Sourcecodester Simple Social Networking Site v1.0 is vulnerable to SQL Injection via /sns/admin/?page=posts/view_post&id=.
[]
null
7.2
null
null
CVE-2024-6224
Send email only on Reply to My Comment <= 1.0.6 - Stored XSS via CSRF
The Send email only on Reply to My Comment WordPress plugin through 1.0.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
[ "cpe:2.3:a:elance360:send-email-only-on-reply-to-my-comment:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
RHSA-2020:0374
Red Hat Security Advisory: kernel security and bug fix update
kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c kernel: incomplete fix for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 kernel: heap overflow in marvell/mwifiex/tdls.c kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8
8.8
null
GHSA-xw8p-6vv6-4c5g
RIOT OS version 2020.01.1 is vulnerable to integer wrap-around in its implementation of calloc function, which can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.
[]
null
9.8
null
null
GHSA-q8gr-xw25-p2h3
An iterator-invalidation bug in PDFium in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.
[]
null
null
8.8
null
CVE-2014-3939
Heap-based buffer overflow in Autodesk SketchBook Pro before 6.2.6 allows remote attackers to execute arbitrary code via crafted layer bitmap data in a PXD file.
[ "cpe:2.3:a:autodesk:sketchbook_pro:*:*:*:*:*:*:*:*", "cpe:2.3:a:autodesk:sketchbook_pro:6.2.4:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-cgh2-v9gr-9477
An Insecure Direct Object Reference (IDOR) vulnerability in appointment-detail.php in Phpgurukul's Beauty Parlour Management System v1.1 allows unauthorized access to the Personally Identifiable Information (PII) of other customers.
[]
null
7.5
null
null
GHSA-wxhf-q9xw-8x6v
Multiple PHP remote file inclusion vulnerabilities in ubbt.inc.php in Groupee UBB.threads 6.5.1.1 allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[thispath] or (2) GLOBALS[configdir] parameter.
[]
null
null
null
null
CVE-2021-24793
WPeMatico RSS Feed Fetcher < 2.6.12 - Admin+ Stored Cross-Site Scripting
The WPeMatico RSS Feed Fetcher WordPress plugin before 2.6.12 does not escape the Feed URL added to a campaign before outputting it in an attribute, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
[ "cpe:2.3:a:etruel:wpematico_rss_feed_fetcher:*:*:*:*:*:wordpress:*:*" ]
null
4.8
null
3.5
CVE-2005-2161
Cross-site scripting (XSS) vulnerability in phpBB 2.0.16 allows remote attackers to inject arbitrary web script or HTML via nested [url] tags.
[ "cpe:2.3:a:phpbb_group:phpbb:2.0.16:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2013-5175
The kernel in Apple Mac OS X before 10.9 allows local users to obtain sensitive information or cause a denial of service (out-of-bounds read and system crash) via a crafted Mach-O file.
[ "cpe:2.3:o:apple:mac_os_x:*:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.8.5:*:*:*:*:*:*:*" ]
null
null
null
6.6
CVE-2023-1098
An information disclosure vulnerability has been discovered in GitLab EE/CE affecting all versions starting from 11.5 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1 will allow an admin to leak password from repository mirror configuration.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:enterprise:*:*:*" ]
null
5.8
null
null
CVE-2025-43704
Arctera/Veritas Data Insight before 7.1.2 can send cleartext credentials when configured to use HTTP Basic Authentication to a Dell Isilon OneFS server.
[]
null
4.7
null
null
CVE-2005-2271
iCab 2.9.8 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
[ "cpe:2.3:a:alexander_clauss:icab:2.9.8:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-m9q5-xj5r-c8v2
The function allocation code (js_NewFunction in jsfun.c) in Firefox 1.5 allows attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via user-defined methods that trigger garbage collection in a way that operates on freed objects.
[]
null
null
null
null
CVE-2017-7273
The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.
[ "cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.1.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.3:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4:rc8:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.4.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5.0:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.6.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.7:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.7.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.7.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.8.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.9.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.10.4:*:*:*:*:*:*:*" ]
null
null
6.6
4.6
GHSA-2fq9-5c52-qvcp
Zyxel NBG-418N v2 v1.00(AAXM.4)C0 devices allow login.cgi CSRF.
[]
null
null
8.8
null
GHSA-cvqc-8rrv-whf2
A Stored XSS in merge request creation page in Gitlab EE version 13.5 and above allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious approval rule names
[]
null
5.4
null
null
CVE-2023-1948
PHPGurukul BP Monitoring Management System Add New Family Member add-family-member.php cross site scripting
A vulnerability, which was classified as problematic, has been found in PHPGurukul BP Monitoring Management System 1.0. This issue affects some unknown processing of the file add-family-member.php of the component Add New Family Member Handler. The manipulation of the argument Member Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225335.
[ "cpe:2.3:a:phpgurukul:bp_monitoring_management_system:1.0:*:*:*:*:*:*:*" ]
null
3.5
3.5
4
CVE-2009-0706
SQL injection vulnerability in the Simple Review (com_simple_review) component 1.3.5 for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the category parameter to index.php.
[ "cpe:2.3:a:simple-review:com_simple_review:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*", "cpe:2.3:a:mambo:mambo:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2015-0255
X.Org Server (aka xserver and xorg-server) before 1.16.3 and 1.17.x before 1.17.1 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (crash) via a crafted string length value in a XkbSetGeometry request.
[ "cpe:2.3:a:x.org:xorg-server:*:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:xorg-server:1.17.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" ]
null
null
null
6.4
CVE-2010-1460
The IBM BladeCenter with Advanced Management Module (AMM) firmware before bpet50g does not properly perform interrupt sharing for USB and iSCSI, which allows remote attackers to cause a denial of service (management module reboot) via TCP packets with malformed application data.
[ "cpe:2.3:h:ibm:advanced_management_module:*:c:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.00:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.01:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.20:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.20:f:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.25:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.25:e:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.25:i:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.26:b:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.26:e:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.26:h:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.26:i:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.26:k:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.28:g:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.32:d:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.34:b:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.34:e:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.36:d:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.36:g:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.36:h:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.36:k:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:d:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:f:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:i:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:n:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:o:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:1.42:t:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.46:c:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.46:j:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.48:c:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.48:d:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.48:g:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.48:l:*:*:*:*:*:*", "cpe:2.3:h:ibm:advanced_management_module:2.48:n:*:*:*:*:*:*", "cpe:2.3:h:ibm:bladecenter:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2014-9104
Multiple cross-site request forgery (CSRF) vulnerabilities in the XML-RPC API in the Desktop Client in OpenVPN Access Server 1.5.6 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) disconnecting established VPN sessions, (2) connect to arbitrary VPN servers, or (3) create VPN profiles and execute arbitrary commands via crafted API requests.
[ "cpe:2.3:a:openvpn:openvpn_access_server:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-c6xr-3cp2-f7f7
Multiple cross-site request forgery (CSRF) vulnerabilities on Motorola Surfboard with software SB5100-2.3.3.0-SCM00-NOSH allow remote attackers to (1) cause a denial of service (device reboot) via the "Restart Cable Modem" value in the BUTTON_INPUT parameter to configdata.html, and (2) cause a denial of service (hard reset) via the "Reset All Defaults" value in the BUTTON_INPUT parameter to configdata.html.
[]
null
null
null
null
GHSA-g653-jwh7-jh7g
An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. CSRF exists via wp-admin/admin.php.
[]
null
null
8.8
null
CVE-2010-0199
Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0198, CVE-2010-0202, and CVE-2010-0203.
[ "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
RHSA-2012:1135
Red Hat Security Advisory: libreoffice security update
libreoffice: Multiple heap-based buffer overflows in the XML manifest encryption handling code
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2014-1264
Finder in Apple OS X before 10.9.2 does not ensure ACL integrity after the viewing of file ACL information, which allows local users to bypass intended access restrictions in opportunistic circumstances via standard filesystem operations on a file with a damaged ACL.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.9:*:*:*:*:*:*:*" ]
null
null
null
3.3
CVE-2013-0074
Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."
[ "cpe:2.3:a:microsoft:silverlight:*:*:*:*:*:*:*:*" ]
null
7.8
null
9.3