id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
57.2k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-hpqp-8w3c-7h9x | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Miller WP-OGP allows Stored XSS. This issue affects WP-OGP: from n/a through 1.0.5. | [] | null | 5.9 | null | null |
|
CVE-2009-1900 | The Configservice APIs in the Administrative Console component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35, 6.1 before 6.1.0.25, and 7.0 before 7.0.0.5, when tracing is enabled, allow remote attackers to obtain sensitive information via unspecified use of the wsadmin scripting tool. | [
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2021-30665 | A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2023-2186 | On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution. | [
"cpe:2.3:a:trianglemicroworks:scada_data_gateway:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
|
GHSA-45rh-35p3-x338 | Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via read_arcobject function. | [] | null | 7.1 | null | null |
|
GHSA-vwf8-q6fw-4wcm | Cilium leaks information via incorrect ReferenceGrant update logic in Gateway API | ImpactDue to ReferenceGrant changes not being immediately propagated in Cilium's GatewayAPI controller, Gateway resources are able to access secrets in other namespaces after the associated ReferenceGrant has been revoked. This can lead to Gateways continuing to establish sessions using secrets that they should no longer have access to.PatchesThis issue was resolved in https://github.com/cilium/cilium/pull/34032.This issue affects:Cilium v1.15 between v1.15.0 and v1.15.7 inclusiveCilium v1.16.0This issue has been patched in:Cilium v1.15.8Cilium v1.16.1WorkaroundsAny modification of a related Gateway/HTTPRoute/GRPCRoute/TCPRoute CRD (for example, adding any label to any of these resources) will trigger a reconciliation of ReferenceGrants on an affected cluster.AcknowledgementsThe Cilium community has worked together with members of Cure53 and Isovalent to prepare these mitigations. Special thanks to @sayboras for resolving this issue.For more informationIf you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).If you think you have found a vulnerability affecting Cilium, we strongly encourage you to report it to our security mailing list at [[email protected]](mailto:[email protected]). This is a private mailing list for the Cilium security team, and your report will be treated as top priority. | [] | null | 5.4 | null | null |
GHSA-r5mh-25wx-vvhc | Cross-site scripting (XSS) vulnerability in functions.php in microBlog 2.0 RC-10 allows remote attackers to inject arbitrary web script and HTML via a javascript: URI in a [url] BBcode tag. | [] | null | null | null | null |
|
GHSA-6hwj-585x-wxvq | Moxa IKS and EDS fails to properly validate user input, giving unauthenticated and authenticated attackers the ability to perform XSS attacks, which may be used to send a malicious script. | [] | null | null | 6.1 | null |
|
CVE-2016-1469 | The HTTP framework on Cisco SPA300, SPA500, and SPA51x devices allows remote attackers to cause a denial of service (device outage) via a series of malformed HTTP requests, aka Bug ID CSCut67385. | [
"cpe:2.3:o:cisco:spa300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:spa500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa300_series_ip_phone:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:spa500_series_ip_phone:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
CVE-2020-24441 | Improper Access Control in Adobe Acrobat Reader for Android | Adobe Acrobat Reader for Android version 20.6.2 (and earlier) does not properly restrict access to directories created by the application. This could result in disclosure of sensitive information stored in databases used by the application. Exploitation requires a victim to download and run a malicious application. | [
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:android:*:*"
] | null | 5.5 | null | null |
CVE-2023-35075 | HTML injection via channel autocomplete | Mattermost fails to use innerText / textContent when setting the channel name in the webapp during autocomplete, allowing an attacker to inject HTML to a victim's page by create a channel name that is valid HTML. No XSS is possible though.
| [
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null |
GHSA-6qjx-53c3-79qw | WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-12-2-1. | [] | null | null | null | null |
|
CVE-2022-33282 | Integer overflow to buffer overflow in Automotive Multimedia | Memory corruption in Automotive Multimedia due to integer overflow to buffer overflow during IOCTL calls in video playback. | [
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null |
GHSA-r3xv-2c38-xgr5 | Linear eMerge E3-Series devices allow a Stack-based Buffer Overflow on the ARM platform. | [] | null | null | null | null |
|
GHSA-chwj-xj8v-386c | The Enhanced Search Box WordPress plugin through 0.6.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack | [] | null | 4.8 | null | null |
|
CVE-2023-22114 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-8p48-ghv5-7qq7 | thorsten/phpmyfaq vulnerable to stored cross-site scripting (XSS) via HTML export | thorsten/phpmyfaq prior to 3.1.12 is vulnerable to stored cross-site scripting (XSS) because it fails to sanitize user input in the FAQ site while generating an HTML Export. This has been fixed in 3.1.12. | [] | null | 4.7 | null | null |
GHSA-h5pv-v4mg-79m7 | DCMTK v3.6.7 was discovered to contain a memory leak via the T_ASC_Association object. | [] | null | 7.5 | null | null |
|
CVE-2020-15825 | In JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 |
|
GHSA-hh6q-wqw3-85g6 | u'QSEE reads the access permission policy for the SMEM TOC partition from the SMEM TOC contents populated by XBL Loader and applies them without validation' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Agatti, APQ8009, APQ8098, Bitra, IPQ6018, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8998, Nicobar, QCA6390, QCS404, QCS405, QCS605, QCS610, Rennell, SA415M, SA515M, SA6155P, SA8155P, Saipan, SC7180, SC8180X, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 | [] | null | null | null | null |
|
CVE-2024-0847 | The 5280 Bootstrap Modal Contact Form plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation in class-sbmm-list-table.php. This makes it possible for unauthenticated attackers to bulk delete messages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
|
GHSA-mjv9-6vrm-gqp7 | E-commerce MLM Software 1.0 has SQL Injection via the service_detail.php pid parameter, event_detail.php eventid parameter, or news_detail.php newid parameter. | [] | null | null | 9.8 | null |
|
CVE-2019-2930 | Vulnerability in the Oracle Field Service product of Oracle E-Business Suite (component: Wireless). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Field Service. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Field Service, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Field Service accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:field_service:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | 4.3 |
|
CVE-2021-24138 | AdRotate < 5.8.4 - Authenticated SQL Injection | Unvalidated input in the AdRotate WordPress plugin, versions before 5.8.4, leads to Authenticated SQL injection via param "id". This requires an admin privileged user. | [
"cpe:2.3:a:ajdg:adrotate:*:*:*:*:*:wordpress:*:*"
] | null | 5.5 | null | 5.5 |
GHSA-5qmh-c322-6w4x | Format string vulnerability in xv before 3.10a allows remote attackers to execute arbitrary code via format string specifiers in a filename. | [] | null | null | null | null |
|
GHSA-43ww-5h9q-8jh6 | Unspecified vulnerability in the Solaris component in Oracle Sun Products Suite 8, 9, 10, and 11 Express allows remote attackers to affect availability via unknown vectors related to Remote Quota Server (rquotad). | [] | null | null | null | null |
|
CVE-2024-52337 | Tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method | A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations. | [
"cpe:/o:redhat:enterprise_linux:7::fastdatapath",
"cpe:/o:redhat:enterprise_linux:8::fastdatapath",
"cpe:/o:redhat:enterprise_linux:9::fastdatapath",
"cpe:/a:redhat:rhel_extras_rt_els:7",
"cpe:/o:redhat:rhel_els:7",
"cpe:/a:redhat:rhel_extras_sap_hana_els:7",
"cpe:/a:redhat:rhel_extras_sap_els:7",
"cpe:/a:redhat:enterprise_linux:8::realtime",
"cpe:/a:redhat:enterprise_linux:8::sap",
"cpe:/a:redhat:enterprise_linux:8::sap_hana",
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::nfv",
"cpe:/o:redhat:enterprise_linux:8::baseos",
"cpe:/a:redhat:rhel_tus:8.4::nfv",
"cpe:/a:redhat:rhel_tus:8.4::realtime",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/o:redhat:rhel_tus:8.4::baseos",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/o:redhat:rhel_e4s:8.4::baseos",
"cpe:/a:redhat:rhel_e4s:8.4::sap_hana",
"cpe:/a:redhat:rhel_e4s:8.4::sap",
"cpe:/a:redhat:rhel_tus:8.6::realtime",
"cpe:/a:redhat:rhel_e4s:8.6::sap_hana",
"cpe:/a:redhat:rhel_aus:8.6::appstream",
"cpe:/o:redhat:rhel_tus:8.6::baseos",
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/a:redhat:rhel_tus:8.6::nfv",
"cpe:/a:redhat:rhel_e4s:8.6::nfv",
"cpe:/a:redhat:rhel_e4s:8.6::sap",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/a:redhat:rhel_eus:8.8::sap_hana",
"cpe:/a:redhat:rhel_eus:8.8::realtime",
"cpe:/a:redhat:rhel_eus:8.8::appstream",
"cpe:/a:redhat:rhel_eus:8.8::sap",
"cpe:/o:redhat:rhel_eus:8.8::baseos",
"cpe:/a:redhat:rhel_eus:8.8::nfv",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::sap",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::sap_hana",
"cpe:/a:redhat:rhel_eus:9.2::realtime",
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::sap",
"cpe:/o:redhat:rhel_eus:9.2::baseos",
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::sap_hana",
"cpe:/a:redhat:rhel_eus:9.4::sap_hana",
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/a:redhat:rhel_eus:9.4::sap",
"cpe:/o:redhat:rhel_eus:9.4::baseos",
"cpe:/a:redhat:rhel_eus:9.4::nfv",
"cpe:/a:redhat:rhel_eus:9.4::realtime",
"cpe:/o:redhat:enterprise_linux:6"
] | null | 5.5 | null | null |
CVE-2012-0467 | Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.8:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.9:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.9:beta2:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2014:1789 | Red Hat Security Advisory: openstack-keystone security and bug fix update | openstack-keystone: configuration data information leak through Keystone catalog | [
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
CVE-2024-50277 | dm: fix a crash if blk_alloc_disk fails | In the Linux kernel, the following vulnerability has been resolved:
dm: fix a crash if blk_alloc_disk fails
If blk_alloc_disk fails, the variable md->disk is set to an error value.
cleanup_mapped_device will see that md->disk is non-NULL and it will
attempt to access it, causing a crash on this statement
"md->disk->private_data = NULL;". | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*"
] | null | 4.7 | null | null |
CVE-2019-19699 | There is Authenticated remote code execution in Centreon Infrastructure Monitoring Software through 19.10 via Pollers misconfiguration, leading to system compromise via apache crontab misconfiguration, This allows the apache user to modify an executable file executed by root at 22:30 every day. To exploit the vulnerability, someone must have Admin access to the Centreon Web Interface and create a custom main.php?p=60803&type=3 command. The user must then set the Pollers Post-Restart Command to this previously created command via the main.php?p=60901&o=c&server_id=1 URI. This is triggered via an export of the Poller Configuration. | [
"cpe:2.3:a:centreon:centreon:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | 9 |
|
GHSA-4rgh-w8fp-573j | Directory traversal vulnerability in zhtml.cgi in NEOJAPAN desknet NEO 2.0R1.0 through 2.5R1.4 allows remote authenticated users to read arbitrary files via a crafted parameter. | [] | null | null | null | null |
|
PYSEC-2016-2 | null | Cross-site scripting (XSS) vulnerability in the dismissChangeRelatedObjectPopup function in contrib/admin/static/admin/js/admin/RelatedObjectLookups.js in Django before 1.8.14, 1.9.x before 1.9.8, and 1.10.x before 1.10rc1 allows remote attackers to inject arbitrary web script or HTML via vectors involving unsafe usage of Element.innerHTML. | [] | null | null | null | null |
GHSA-c586-6hq4-j669 | The O-RAN E2T I-Release Prometheus metric Increment function can crash in sctpThread.cpp for message.peerInfo->counters[IN_INITI][MSG_COUNTER][ProcedureCode_id_E2setup]->Increment(). | [] | null | 7.5 | null | null |
|
RHSA-2019:2504 | Red Hat Security Advisory: OpenShift Container Platform 4.1.11 openshift security update | kubernetes: API server allows access to cluster-scoped custom resources as if resources were namespaced | [
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 5 | null |
GHSA-57xc-4245-hh9c | A stored cross-site scripting (XSS) vulnerability in HikaShop Joomla Component < 5.1.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload in the `description` parameter of any product. The `description `parameter is not sanitised in the backend. | [] | null | 5.4 | null | null |
|
RHSA-2023:3441 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 (etcd) security update | etcd: Information discosure via debug function etcd: Key name can be accessed via LeaseTimeToLive API | [
"cpe:/a:redhat:openstack:17.0::el9"
] | null | 3.1 | null | null |
CVE-2017-5408 | Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
GHSA-r3mc-836c-4x5x | A potential security vulnerability has been identified in the disk drive firmware installers named Supplemental Update / Online ROM Flash Component on HPE servers running Linux. The vulnerable software is included in the HPE Service Pack for ProLiant (SPP) releases 2018.06.0, 2018.09.0, and 2018.11.0. The vulnerable software is the Supplemental Update / Online ROM Flash Component for Linux (x64) software. The installer in this software component could be locally exploited to execute arbitrary code. Drive Models can be found in the Vulnerability Resolution field of the security bulletin. The 2019_03 SPP and Supplemental update / Online ROM Flash Component for Linux (x64) after 2019.03.0 has fixed this issue. | [] | null | null | null | null |
|
GHSA-7gw3-q9vq-vw4p | Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file. | [] | null | null | null | null |
|
GHSA-33j3-f98h-3v38 | Info Touch Surfnet kiosk allows local users to crash Surfnet and access the underlying operating system via the CMD_CREDITCARD_CHARGE command. | [] | null | null | null | null |
|
CVE-2018-12355 | Knowage (formerly SpagoBI) 6.1.1 allows XSS via the name or description field to the "Olap Schemas' Catalogue" catalogue. | [
"cpe:2.3:a:eng:knowage:6.1.1:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-jq75-f732-532c | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15458. | [] | null | null | null | null |
|
GHSA-r589-gf8r-vw76 | Improper conditions check in Zoom Team Chat for Zoom clients may allow an authenticated user to conduct a denial of service via network access. | [] | null | 4.3 | null | null |
|
CVE-2010-4069 | Stack-based buffer overflow in IBM Informix Dynamic Server (IDS) 7.x through 7.31, 9.x through 9.40, 10.00 before 10.00.xC10, 11.10 before 11.10.xC3, and 11.50 before 11.50.xC3 allows remote authenticated users to execute arbitrary code via long DBINFO keyword arguments in a SQL statement, aka idsdb00165017, idsdb00165019, idsdb00165021, idsdb00165022, and idsdb00165023. | [
"cpe:2.3:a:ibm:informix_dynamic_server:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.tc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.xc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.xc7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.tc3tl:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc7w1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.10.tb4tl:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc1de:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2e:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc2:*:*:*:*:*:*:*"
] | null | null | null | 8.5 |
|
CVE-2017-15728 | In phpMyFAQ before 2.9.9, there is Stored Cross-site Scripting (XSS) via metaDescription or metaKeywords. | [
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
GHSA-4ghm-c9g7-9cv9 | Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not provide a warning about a (1) http or (2) https URL that contains a username and password, which makes it easier for remote attackers to conduct phishing attacks via a crafted URL. | [] | null | null | null | null |
|
CVE-2017-12732 | A Stack-based Buffer Overflow issue was discovered in GE CIMPLICITY Versions 9.0 and prior. A function reads a packet to indicate the next packet length. The next packet length is not verified, allowing a buffer overwrite that could lead to an arbitrary remote code execution. | [
"cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\/scada_cimplicity:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | 4.9 |
|
GHSA-cw72-cqmc-6g9v | Media Foundation Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-22010. | [] | null | 3.3 | null | null |
|
CVE-2022-23972 | ASUS RT-AX56U - SQL Injection | ASUS RT-AX56U’s SQL handling function has an SQL injection vulnerability due to insufficient user input validation. An unauthenticated LAN attacker to inject arbitrary SQL code to read, modify and delete database. | [
"cpe:2.3:o:asus:rt-ax56u_firmware:3.0.0.4.386.45898:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2022-49265 | PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() | In the Linux kernel, the following vulnerability has been resolved:
PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()
When a genpd with GENPD_FLAG_IRQ_SAFE gets removed, the following
sleep-in-atomic bug will be seen, as genpd_debug_remove() will be called
with a spinlock being held.
[ 0.029183] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1460
[ 0.029204] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 1, name: swapper/0
[ 0.029219] preempt_count: 1, expected: 0
[ 0.029230] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.17.0-rc4+ #489
[ 0.029245] Hardware name: Thundercomm TurboX CM2290 (DT)
[ 0.029256] Call trace:
[ 0.029265] dump_backtrace.part.0+0xbc/0xd0
[ 0.029285] show_stack+0x3c/0xa0
[ 0.029298] dump_stack_lvl+0x7c/0xa0
[ 0.029311] dump_stack+0x18/0x34
[ 0.029323] __might_resched+0x10c/0x13c
[ 0.029338] __might_sleep+0x4c/0x80
[ 0.029351] down_read+0x24/0xd0
[ 0.029363] lookup_one_len_unlocked+0x9c/0xcc
[ 0.029379] lookup_positive_unlocked+0x10/0x50
[ 0.029392] debugfs_lookup+0x68/0xac
[ 0.029406] genpd_remove.part.0+0x12c/0x1b4
[ 0.029419] of_genpd_remove_last+0xa8/0xd4
[ 0.029434] psci_cpuidle_domain_probe+0x174/0x53c
[ 0.029449] platform_probe+0x68/0xe0
[ 0.029462] really_probe+0x190/0x430
[ 0.029473] __driver_probe_device+0x90/0x18c
[ 0.029485] driver_probe_device+0x40/0xe0
[ 0.029497] __driver_attach+0xf4/0x1d0
[ 0.029508] bus_for_each_dev+0x70/0xd0
[ 0.029523] driver_attach+0x24/0x30
[ 0.029534] bus_add_driver+0x164/0x22c
[ 0.029545] driver_register+0x78/0x130
[ 0.029556] __platform_driver_register+0x28/0x34
[ 0.029569] psci_idle_init_domains+0x1c/0x28
[ 0.029583] do_one_initcall+0x50/0x1b0
[ 0.029595] kernel_init_freeable+0x214/0x280
[ 0.029609] kernel_init+0x2c/0x13c
[ 0.029622] ret_from_fork+0x10/0x20
It doesn't seem necessary to call genpd_debug_remove() with the lock, so
move it out from locking to fix the problem. | [] | null | null | null | null |
GHSA-wjph-q6c3-pvg8 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BetterAddons Better Elementor Addons better-elementor-addons allows Stored XSS.This issue affects Better Elementor Addons: from n/a through 1.4.4. | [] | null | 6.5 | null | null |
|
ICSA-22-235-07 | Hitachi Energy RTU500 | This vulnerability exists in the HCI Modbus TCP function in affected product versions. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. There is a lack of flood control, which if exploited, could cause an internal stack overflow in the HCI Modbus TCP function.CVE-2022-2081 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 7.5 | null |
CVE-2021-45357 | Cross Site Scripting (XSS) vulnerability exists in Piwigo 12.x via the pwg_activity function in include/functions.inc.php. | [
"cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-j78r-c5c3-fxff | A vulnerability classified as critical has been found in Tenda AC18 15.03.05.05. Affected is the function formSetSambaConf of the file /goform/setsambacfg. The manipulation of the argument usbName leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257778 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 6.3 | null | null |
|
CVE-2008-0180 | Cross-site scripting (XSS) vulnerability in themes/_unstyled/templates/init.vm in Liferay Portal 4.3.6 allows remote authenticated users to inject arbitrary web script or HTML via the Greeting field in a User Profile. | [
"cpe:2.3:a:liferay:liferay_enterprise_portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_enterprise_portal:4.3.6:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-5g8p-x9mm-c9vr | In the Linux kernel, the following vulnerability has been resolved:ksmbd: fix use-after-free in smb2_lockIf smb_lock->zero_len has value, ->llist of smb_lock is not delete and
flock is old one. It will cause use-after-free on error handling
routine. | [] | null | 7.8 | null | null |
|
RHSA-2022:5100 | Red Hat Security Advisory: grub2, mokutil, shim, and shim-unsigned-x64 security update | grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling grub2: Crafted JPEG image can lead to buffer underflow write in the heap grub2: Integer underflow in grub_net_recv_ip4_packets grub2: Out-of-bound write when handling split HTTP headers grub2: shim_lock verifier allows non-kernel files to be loaded grub2: use-after-free in grub_cmd_chainloader() shim: Buffer overflow when loading crafted EFI images | [
"cpe:/a:redhat:rhel_eus:8.2::crb",
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 7.3 | null | null |
CVE-2020-0350 | In NFC, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges and a Firmware compromise needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-139424089 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
CVE-2006-6094 | Multiple SQL injection vulnerabilities in ActiveNews Manager allow remote attackers to execute arbitrary SQL commands via the (1) catID parameter to activeNews_categories.asp, the (2) articleID parameter to activeNews_comments.asp, or the (3) query parameter to activenews_search.asp. | [
"cpe:2.3:a:dotnetindex:active_news_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2007-3525 | Ripe Website Manager 0.8.9 and earlier allows remote attackers to obtain configuration information via a direct request to includes/phpinfo.php, which calls the phpinfo function. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:ripe_website_manager:ripe_website_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-fpgj-7jhh-pchm | Cross-Site Request Forgery (CSRF) vulnerability in Coachify Coachify allows Cross Site Request Forgery.This issue affects Coachify: from n/a through 1.0.7. | [] | null | 4.3 | null | null |
|
GHSA-x3rx-42rv-mqqr | WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1. | [] | null | null | null | null |
|
GHSA-833g-vcgj-6xrj | Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content. | [] | null | null | 7.3 | null |
|
GHSA-xjfj-5c48-9853 | Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension. | [] | null | null | null | null |
|
GHSA-9qm9-mgq3-x66p | Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite,
versions before 4.5.2, contain a Key Management Error Vulnerability. | [] | null | 7.5 | null | null |
|
RHSA-2013:0771 | Red Hat Security Advisory: curl security update | curl: Cookie domain suffix match vulnerability | [
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2020-12374 | Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1000wf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 |
|
CVE-2025-30804 | WordPress wpShopGermany IT-RECHT KANZLEI plugin <= 2.0 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in maennchen1.de wpShopGermany IT-RECHT KANZLEI allows Cross Site Request Forgery. This issue affects wpShopGermany IT-RECHT KANZLEI: from n/a through 2.0. | [] | null | 4.3 | null | null |
GHSA-v8w8-p4p3-g24w | Cross-Site Request Forgery (CSRF) vulnerability in wpwox Custom Script Integration allows Stored XSS. This issue affects Custom Script Integration: from n/a through 2.1. | [] | null | 7.1 | null | null |
|
GHSA-h72c-w3q3-55qq | OS Command Injection in jw.util | An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used. | [] | null | 9.8 | null | null |
CVE-2016-1365 | The Grapevine update process in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.0 allows remote authenticated users to execute arbitrary commands as root via a crafted upgrade parameter, aka Bug ID CSCux15507. | [
"cpe:2.3:a:cisco:application_policy_infrastructure_controller_enterprise_module:1.0.10:*:*:*:*:*:*:*"
] | null | null | 8.8 | 8.5 |
|
GHSA-64gc-gm28-vcwg | IBM Doors Web Access 9.5 and 9.6 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 130808. | [] | null | null | 5.4 | null |
|
GHSA-56gp-g9q8-5fjc | Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.00, 9.1x, and 9.2x allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors. | [] | null | null | null | null |
|
CVE-2018-1000849 | Alpine Linux version Versions prior to 2.6.10, 2.7.6, and 2.10.1 contains a Other/Unknown vulnerability in apk-tools (Alpine Linux' package manager) that can result in Remote Code Execution. This attack appear to be exploitable via A specially crafted APK-file can cause apk to write arbitrary data to an attacker-specified file, due to bugs in handling long link target name and the way a regular file is extracted.. This vulnerability appears to have been fixed in 2.6.10, 2.7.6, and 2.10.1. | [
"cpe:2.3:o:alpinelinux:alpine_linux:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-86wg-j8j4-wh6r | Multiple SQL injection vulnerabilities in login.asp in Bankoi WebHosting Control Panel 1.20 allow remote attackers to execute arbitrary SQL commands via the (1) username or (2) password field. | [] | null | null | null | null |
|
CVE-2014-3462 | The ".encfs6.xml" configuration file in encfs before 1.7.5 allows remote attackers to access sensitive data by setting "blockMACBytes" to 0 and adding 8 to "blockMACRandBytes". | [
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:encfs_project:encfs:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-vc8x-p7xj-72gr | In the Linux kernel, the following vulnerability has been resolved:Revert "block, bfq: merge bfq_release_process_ref() into bfq_put_cooperator()"This reverts commit bc3b1e9e7c50e1de0f573eea3871db61dd4787de.The bic is associated with sync_bfqq, and bfq_release_process_ref cannot
be put into bfq_put_cooperator.kasan report:
[ 400.347277] ==================================================================
[ 400.347287] BUG: KASAN: slab-use-after-free in bic_set_bfqq+0x200/0x230
[ 400.347420] Read of size 8 at addr ffff88881cab7d60 by task dockerd/5800
[ 400.347430]
[ 400.347436] CPU: 24 UID: 0 PID: 5800 Comm: dockerd Kdump: loaded Tainted: G E 6.12.0 #32
[ 400.347450] Tainted: [E]=UNSIGNED_MODULE
[ 400.347454] Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.20192059.B64.2207280713 07/28/2022
[ 400.347460] Call Trace:
[ 400.347464] <TASK>
[ 400.347468] dump_stack_lvl+0x5d/0x80
[ 400.347490] print_report+0x174/0x505
[ 400.347521] kasan_report+0xe0/0x160
[ 400.347541] bic_set_bfqq+0x200/0x230
[ 400.347549] bfq_bic_update_cgroup+0x419/0x740
[ 400.347560] bfq_bio_merge+0x133/0x320
[ 400.347584] blk_mq_submit_bio+0x1761/0x1e20
[ 400.347625] __submit_bio+0x28b/0x7b0
[ 400.347664] submit_bio_noacct_nocheck+0x6b2/0xd30
[ 400.347690] iomap_readahead+0x50c/0x680
[ 400.347731] read_pages+0x17f/0x9c0
[ 400.347785] page_cache_ra_unbounded+0x366/0x4a0
[ 400.347795] filemap_fault+0x83d/0x2340
[ 400.347819] __xfs_filemap_fault+0x11a/0x7d0 [xfs]
[ 400.349256] __do_fault+0xf1/0x610
[ 400.349270] do_fault+0x977/0x11a0
[ 400.349281] __handle_mm_fault+0x5d1/0x850
[ 400.349314] handle_mm_fault+0x1f8/0x560
[ 400.349324] do_user_addr_fault+0x324/0x970
[ 400.349337] exc_page_fault+0x76/0xf0
[ 400.349350] asm_exc_page_fault+0x26/0x30
[ 400.349360] RIP: 0033:0x55a480d77375
[ 400.349384] Code: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 49 3b 66 10 0f 86 ae 02 00 00 55 48 89 e5 48 83 ec 58 48 8b 10 <83> 7a 10 00 0f 84 27 02 00 00 44 0f b6 42 28 44 0f b6 4a 29 41 80
[ 400.349392] RSP: 002b:00007f18c37fd8b8 EFLAGS: 00010216
[ 400.349401] RAX: 00007f18c37fd9d0 RBX: 0000000000000000 RCX: 0000000000000000
[ 400.349407] RDX: 000055a484407d38 RSI: 000000c000e8b0c0 RDI: 0000000000000000
[ 400.349412] RBP: 00007f18c37fd910 R08: 000055a484017f60 R09: 000055a484066f80
[ 400.349417] R10: 0000000000194000 R11: 0000000000000005 R12: 0000000000000008
[ 400.349422] R13: 0000000000000000 R14: 000000c000476a80 R15: 0000000000000000
[ 400.349430] </TASK>
[ 400.349452]
[ 400.349454] Allocated by task 5800:
[ 400.349459] kasan_save_stack+0x30/0x50
[ 400.349469] kasan_save_track+0x14/0x30
[ 400.349475] __kasan_slab_alloc+0x89/0x90
[ 400.349482] kmem_cache_alloc_node_noprof+0xdc/0x2a0
[ 400.349492] bfq_get_queue+0x1ef/0x1100
[ 400.349502] __bfq_get_bfqq_handle_split+0x11a/0x510
[ 400.349511] bfq_insert_requests+0xf55/0x9030
[ 400.349519] blk_mq_flush_plug_list+0x446/0x14c0
[ 400.349527] __blk_flush_plug+0x27c/0x4e0
[ 400.349534] blk_finish_plug+0x52/0xa0
[ 400.349540] _xfs_buf_ioapply+0x739/0xc30 [xfs]
[ 400.350246] __xfs_buf_submit+0x1b2/0x640 [xfs]
[ 400.350967] xfs_buf_read_map+0x306/0xa20 [xfs]
[ 400.351672] xfs_trans_read_buf_map+0x285/0x7d0 [xfs]
[ 400.352386] xfs_imap_to_bp+0x107/0x270 [xfs]
[ 400.353077] xfs_iget+0x70d/0x1eb0 [xfs]
[ 400.353786] xfs_lookup+0x2ca/0x3a0 [xfs]
[ 400.354506] xfs_vn_lookup+0x14e/0x1a0 [xfs]
[ 400.355197] __lookup_slow+0x19c/0x340
[ 400.355204] lookup_one_unlocked+0xfc/0x120
[ 400.355211] ovl_lookup_single+0x1b3/0xcf0 [overlay]
[ 400.355255] ovl_lookup_layer+0x316/0x490 [overlay]
[ 400.355295] ovl_lookup+0x844/0x1fd0 [overlay]
[ 400.355351] lookup_one_qstr_excl+0xef/0x150
[ 400.355357] do_unlinkat+0x22a/0x620
[ 400.355366] __x64_sys_unlinkat+0x109/0x1e0
[ 400.355375] do_syscall_64+0x82/0x160
[ 400.355384] entry_SYSCALL_64_after_hwframe+0x76/0x7
---truncated--- | [] | null | 7.8 | null | null |
|
GHSA-cwr4-7j4w-3vv9 | Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN. | [] | null | null | null | null |
|
GHSA-mqfw-6fj5-2hhj | Windows GDI Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21532. | [] | null | 7.8 | null | null |
|
CVE-2022-4574 |
An SMI handler input validation vulnerability in the BIOS of some ThinkPad models could allow an attacker with local access and elevated privileges to execute arbitrary code.
| [
"cpe:2.3:h:lenovo:thinkpad:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x13_yoga_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_yoga_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x13_yoga_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_yoga_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x13_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x13_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x13_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_yoga_7th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_7th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_yoga_6th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_6th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_yoga_5th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_5th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_yoga_4th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga_4th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_titanium_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_titanium:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_nano_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_nano_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_nano_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_nano_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_fold_gen_1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_fold_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_extreme_gen_5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_extreme_4th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme_4th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_extreme_3rd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme_3rd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_carbon_9th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_9th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_carbon_8th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_8th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_carbon_7th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_7th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_carbon_10th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon_10th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t16_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t16_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t15p_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15p_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t15p_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15p_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t15p_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15p_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t15g_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15g_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t15g_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15g_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t15_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t15_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t14s_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14s_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t14s_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14s_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t14s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t14_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t14_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t14_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t14_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p17_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p17_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p17_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p17_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p16s_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p16s_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p16_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p16_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p15v_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15v_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p15v_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15v_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p15v_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15v_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p15s_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15s_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p15s_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15s_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p15_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p15_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p15_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p14s_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p14s_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p14s_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p14s_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p14s_gen_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p14s_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p1_gen_5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1_gen_5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p1_gen_4_firmware:1.22:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1_gen_4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p1_gen_3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1_gen_3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l15_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l15_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l14_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l14_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l14_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l14:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
GHSA-hqpw-f5hx-r963 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
GHSA-6jpx-gmxf-75q7 | A SQL injection code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [] | null | null | 8.8 | null |
|
CVE-2022-3121 | SourceCodester Online Employee Leave Management System addemployee.php cross-site request forgery | A vulnerability was found in SourceCodester Online Employee Leave Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/addemployee.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The identifier VDB-207853 was assigned to this vulnerability. | [
"cpe:2.3:a:online_employee_leave_management_system_project:online_employee_leave_management_system:1.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2018-19829 | Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known. | [
"cpe:2.3:a:artica:integria_ims:5.0.83:*:*:*:*:*:*:*"
] | null | null | 6.5 | 5.8 |
|
GHSA-q9v3-53xg-6f9p | Null pointer dereference when viewing a specially crafted email in Mutt >1.5.2 <2.2.12 | [] | null | 4.3 | null | null |
|
GHSA-m2h3-c444-942c | ONTAP Mediator versions prior to 1.7 are susceptible to a
vulnerability that can allow an unauthenticated attacker to enumerate
URLs via REST API. | [] | null | 5.3 | null | null |
|
CVE-2004-0606 | Cross-site scripting (XSS) vulnerability in Infoblox DNS One running firmware 2.4.0-8 and earlier allows remote attackers to execute arbitrary scripts as other users via the (1) CLIENTID or (2) HOSTNAME option of a DHCP request. | [
"cpe:2.3:h:infoblox:dns_one_appliance:2.4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:infoblox:dns_one_appliance:2.4.0.8a:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-8h2m-5m3x-cvj9 | SQL injection vulnerability in the CamelcityDB (com_camelcitydb2) component 2.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php. | [] | null | null | null | null |
|
GHSA-jfx8-jc37-qc4h | IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ShowPlugInSaveOptions_W+0x000000000000aefe. | [] | null | 5.5 | null | null |
|
ICSMA-19-241-02 | Philips HDI 4000 Ultrasound | The HDI 4000 Ultrasound System is built on an old operating system that is no longer supported. Thus, any unmitigated vulnerability in the old operating system could be exploited to affect this product.CVE-2019-10988 has been assigned to this vulnerability. A CVSS v3 base score of 3.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N). | [] | null | null | 3 | null |
CVE-2013-4537 | The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-4384-whxj-38x3 | Uncontrolled search path element in some Intel(R) Chipset Device Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | 6.7 | null | null |
|
RHSA-2023:1548 | Red Hat Security Advisory: tigervnc security update | xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability | [
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.8 | null | null |
GHSA-mgr2-3mpv-43gc | Downloads Resources over HTTP in openframe-image | Affected versions of `openframe-image` insecurely downloads resources over HTTP.In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.RecommendationNo patch is currently available for this vulnerability.The best mitigation is currently to avoid using this package, using a different package if available.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | null | null | null | null |
GHSA-r6p2-4r7p-7g2c | A vulnerability classified as problematic has been found in SourceCodester Simple Cold Storage Management System 1.0. Affected is an unknown function of the file /csms/?page=contact_us of the component Contact Us. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-211194 is the identifier assigned to this vulnerability. | [] | null | 4.3 | null | null |
|
ICSA-17-341-01 | Xiongmai Technology IP Cameras and DVRs | The stack-based buffer overflow vulnerability has been identified, which may allow an attacker to execute code remotely or crash the device. After rebooting, the device restores itself to a more vulnerable state in which Telnet is accessible.CVE-2017-16725 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 9.8 | null |
GHSA-5gq9-48pm-v9hx | An exploitable integer overflow exists in the way that the Blender open-source 3d creation suite v2.78c applies a particular object modifier to a Mesh. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to open the file or use the file as a library in order to trigger this vulnerability. | [] | null | null | 7.8 | null |
|
CVE-2006-5059 | Multiple cross-site scripting (XSS) vulnerabilities in WWWthreads 5.4.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the Cat parameter to (1) dosearch.php, (2) postlist.php, (3) showmembers.php, (4) faq_english.php, (5) online.php, (6) login.php, (7) newuser.php, (8) wwwthreads.php, (9) search.php, or (10) postlist.php. | [
"cpe:2.3:a:wired_community_software:wwwthreads:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wired_community_software:wwwthreads:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wired_community_software:wwwthreads:rc3:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
GHSA-3g2j-hcpv-vrj2 | The Ultimate Store Kit Elementor Addons, Woocommerce Builder, EDD Builder, Elementor Store Builder, Product Grid, Product Table, Woocommerce Slider plugin is vulnerable to PHP Object Injection via deserialization of untrusted input via the _ultimate_store_kit_wishlist cookie in versions up to , and including, 2.0.3. This makes it possible for an unauthenticated attacker to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker or above to delete arbitrary files, retrieve sensitive data, or execute code. | [] | null | 9.8 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.