id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-mpcx-vp9j-q8cq | Directory traversal vulnerability in log.jsp in Ignite Realtime Openfire 3.6.2 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the log parameter. | [] | null | null | null | null |
|
CVE-2023-25455 | WordPress WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin <= 7.6.0 - Arbitrary Content Deletion vulnerability | Missing Authorization vulnerability in miniOrange WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn): from n/a through 7.6.0. | [
"cpe:2.3:a:miniorange:wordpress_social_login_and_register_\\(discord\\,_google\\,_twitter\\,_linkedin\\):*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
GHSA-xhr8-rwrh-56m7 | Buffer overflow in the Log-SCR function in the "Log to Screen" feature in WinFtp Server 1.6.8 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long request. | [] | null | null | null | null |
|
CVE-2020-15910 | SolarWinds N-Central version 12.3 GA and lower does not set the JSESSIONID attribute to HTTPOnly. This makes it possible to influence the cookie with javascript. An attacker could send the user to a prepared webpage or by influencing JavaScript to the extract the JESSIONID. This could then be forwarded to the attacker. | [
"cpe:2.3:a:solarwinds:n-central:*:*:*:*:general_availability:*:*:*"
] | null | 4.7 | null | 4.3 |
|
CVE-2019-12918 | Quest KACE Systems Management Appliance Server Center version 9.1.317 is vulnerable to SQL injection. The affected file is software_library.php and affected parameters are order[0][column] and order[0][dir]. | [
"cpe:2.3:a:quest:kace_systems_management_appliance:9.1.317:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-jrx7-xjrv-c46c | Opera before 8.51 on Linux and Unix systems allows remote attackers to execute arbitrary code via shell metacharacters (backticks) in a URL that another product provides in a command line argument when launching Opera. | [] | null | null | null | null |
|
GHSA-qpxm-w553-gwr7 | admin/index.php in Longino Jacome php-Revista 1.1.2 allows remote attackers to bypass authentication controls by setting the ID_ADMIN and SUPER_ADMIN parameters to 1. | [] | null | null | null | null |
|
ICSA-21-119-03 | Johnson Controls Exacq Technologies exacqVision | The affected product calculates or uses an incorrect maximum or minimum value that is one more or one less than the correct value.CVE-2021-3156 has been assigned to this vulnerability. A CVSS v3 base score of 7.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 7 | null |
GHSA-vrr8-fp7c-7qgp | org.xwiki.platform:xwiki-platform-flamingo-theme-ui vulnerable to privilege escalation | ImpactAny user with the right to add an object on a page can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the styles properties `FlamingoThemesCode.WebHome`. This page is installed by default.Reproduction Steps**Steps to reproduce**:As a user without script or programming rights, edit your user profile with the object editor (enable advanced mode if necessary to get access) and add an object of type "Theme Class" of "FlamingoThemesCode". In the field "body-bg" (all other fields should work, too) add the following text:`{{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("Hello " + "from groovy!"){{/groovy}}{{/async}}`Click "Save & View"Open <xwiki-host>/xwiki/bin/view/FlamingoThemesCode/WebHomeSheet where <xwiki-host> is the URL of your XWiki installation**Expected result**:The list of color themes either doesn't include the user's profile or displays a regular preview.**Actual result**:The user's profile is listed as color theme but instead of the little preview the messageis displayed. This shows that a Groovy macro with content created by the user has been executed and thus demonstrates a privilege escalation from simple user account to programming rights.PatchesThe vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.WorkaroundsThe issue can be fixed by applying this [patch](https://github.com/xwiki/xwiki-platform/commit/df596f15368342236f8899ca122af8f3df0fe2e8#diff-e2153fa59f9d92ef67b0afbf27984bd17170921a3b558fac227160003d0dfd2a) on `FlamingoThemesCode.WebHomeSheet`.Referencespatch: https://github.com/xwiki/xwiki-platform/commit/df596f15368342236f8899ca122af8f3df0fe2e8Jira: https://jira.xwiki.org/browse/XWIKI-20280For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected]) | [] | null | 9.9 | null | null |
CVE-2013-4818 | Unspecified vulnerability in HP IceWall SSO 8.0 through 10.0, IceWall SSO Agent Option 8.0 through 10.0, IceWall SSO Smart Device Option 10.0, and IceWall File Manager 3.0 through SP4 allows remote attackers to obtain sensitive information via unknown vectors. | [
"cpe:2.3:a:hp:icewall_smart_device_option:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_file_manager:3.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_file_manager:3.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_file_manager:3.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_file_manager:3.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:8.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:8.0:r2:*:*:enterprise:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:8.0:r2:*:*:standard:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:8.0:r3:*:*:enterprise:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:8.0:r3:*:*:standard:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:8.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:10.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:10.0:*:*:*:enterprise:windows:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:10.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent:10.0:*:*:*:standard:windows:*:*",
"cpe:2.3:a:hp:icewall_sso_agent_option:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent_option:8.0:*:*:*:2007:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:icewall_sso_agent_option:10.0:r1:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-76fp-52wr-gx66 | API permission management vulnerability in the Fwk-Display module.Successful exploitation of this vulnerability may cause features to perform abnormally. | [] | null | 9.8 | null | null |
|
CVE-2020-0904 | Windows Hyper-V Denial of Service Vulnerability | <p>A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.</p>
<p>To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.</p>
<p>The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.</p>
| [
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
CVE-2009-5117 | The Web Post Protection feature in McAfee Host Data Loss Prevention (DLP) 3.x before 3.0.100.10 and 9.x before 9.0.0.422, when HTTP Capture mode is enabled, allows local users to obtain sensitive information from web traffic by reading unspecified files. | [
"cpe:2.3:a:mcafee:host_data_loss_prevention:3.0.100.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:host_data_loss_prevention:9.0.0.416:*:*:*:*:*:*:*"
] | null | null | null | 1.9 |
|
CVE-2025-26778 | WordPress Gallery Custom Links Plugin <= 2.2.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Gallery allows Stored XSS. This issue affects Gallery: from n/a through 2.2.1. | [] | null | 5.9 | null | null |
GHSA-6wmf-9w58-4whg | Array Networks AG/vxAG with ArrayOS AG before 9.4.0.469 allows unauthenticated command injection that leads to privilege escalation and control of the system. NOTE: ArrayOS AG 10.x is unaffected. | [] | null | 9.8 | null | null |
|
CVE-2018-18883 | An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted. | [
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 7.2 |
|
GHSA-f88m-j96j-6cvj | Buffer overflow in the ulSetError function in util/ulError.cxx in PLIB 1.8.5, as used in TORCS 1.3.1 and other products, allows user-assisted remote attackers to execute arbitrary code via vectors involving a long error message, as demonstrated by a crafted acc file for TORCS. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-77j4-5485-vwcx | Cross-site scripting (XSS) vulnerability in Wiki Server in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote authenticated users to inject arbitrary web script or HTML via crafted Wiki content, related to lack of a charset field. | [] | null | null | null | null |
|
GHSA-c3jj-9wrg-44g9 | The Editorial Calendar WordPress plugin through 3.7.12 does not sanitise and escape its settings, allowing users with roles as low as contributor to inject arbitrary web scripts in the plugin admin panel, enabling a Stored Cross-Site Scripting vulnerability targeting higher privileged users. | [] | null | 5.4 | null | null |
|
GHSA-4v45-q65w-8hm3 | Open redirect vulnerability in the login page in Puppet Enterprise before 3.0.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the service parameter. | [] | null | null | null | null |
|
CVE-2024-54091 | A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 12), Solid Edge SE2025 (All versions < V225.0 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T format.
This could allow an attacker to execute code in the context of the current process. | [] | 7.3 | 7.8 | null | null |
|
GHSA-w3r9-r9w7-8h48 | Golang Facebook Thrift servers vulnerable to denial of service | Golang Facebook Thrift servers would not error upon receiving messages declaring containers of sizes larger than the payload. As a result, malicious clients could send short messages which would result in a large memory allocation, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2020.03.16.00.Specific Go Packages Affectedgithub.com/facebook/fbthrift/thrift/lib/go/thrift | [] | null | 7.5 | null | null |
CVE-2016-7399 | scripts/license.pl in Veritas NetBackup Appliance 2.6.0.x through 2.6.0.4, 2.6.1.x through 2.6.1.2, 2.7.x through 2.7.3, and 3.0.x allow remote attackers to execute arbitrary commands via shell metacharacters in the hostName parameter to appliancews/getLicense. | [
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:2.7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:veritas:netbackup_appliance_firmware:3.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:veritas:netbackup_appliance:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2017-14698 | ASUS DSL-AC51, DSL-AC52U, DSL-AC55U, DSL-N55U C1, DSL-N55U D1, DSL-AC56U, DSL-N10_C1, DSL-N12U C1, DSL-N12E C1, DSL-N14U, DSL-N14U-B1, DSL-N16, DSL-N16U, DSL-N17U, DSL-N66U, and DSL-AC750 routers allow remote attackers to change passwords of arbitrary users via the http_passwd parameter to mod_login.asp. | [
"cpe:2.3:o:asus:dsl-ac51_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-ac51:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac52u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-ac52u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac55u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-ac55u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n55u_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n55u_c1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n55u_d1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n55u_d1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac56u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-ac56u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n10_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n10_c1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n12u_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n12u_c1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n12e_c1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n12e_c1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n14u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n14u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n14u-b1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n14u-b1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n16_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n16u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n16u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n17u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n17u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-n66u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n66u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:dsl-ac750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-ac750:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 |
|
GHSA-mqr4-8jm7-g4jj | Adobe Flash Player 30.0.0.113 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] | null | null | 7.5 | null |
|
GHSA-8vhq-5hmx-q53c | Heap buffer overflow in PDF in Google Chrome prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. | [] | null | 8.8 | null | null |
|
GHSA-gcm7-m975-8q53 | Intent redirection vulnerability in Samsung Internet prior to version 14.0.1.20 allows attacker to execute privileged action. | [] | null | 7.8 | null | null |
|
GHSA-gf95-pc3w-rmh9 | Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node. | [] | null | null | null | null |
|
CVE-2023-27298 | Uncontrolled search path in the WULT software maintained by Intel(R) before version 1.0.0 (commit id 592300b) may allow an unauthenticated user to potentially enable escalation of privilege via network access. | [
"cpe:2.3:a:intel:wake_up_latency_tracer:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
PYSEC-2020-336 | null | In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a CHECK failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0. | [] | null | null | null | null |
CVE-2018-6536 | An issue was discovered in Icinga 2.x through 2.8.1. The daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for icinga2.pid modification before a root script executes a "kill `cat /pathname/icinga2.pid`" command, as demonstrated by icinga2.init.d.cmake. | [
"cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 |
|
CVE-2016-7803 | SQL injection vulnerability in the Cybozu Garoon 3.0.0 to 4.2.2 allows remote authenticated attackers to execute arbitrary SQL commands via "MultiReport" function. | [
"cpe:2.3:a:cybozu:garoon:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cybozu:garoon:4.2.2:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-q283-h7m5-gh5p | An issue in wasm2c 1.0.32, wasm2wat 1.0.32, wasm-decompile 1.0.32, and wasm-validate 1.0.32 allows attackers to cause a Denial of Service (DoS) via running a crafted binary. | [] | null | 7.5 | null | null |
|
CVE-2003-0647 | Buffer overflow in the HTTP server for Cisco IOS 12.2 and earlier allows remote attackers to execute arbitrary code via an extremely long (2GB) HTTP GET request. | [
"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2014:0396 | Red Hat Security Advisory: rhev-hypervisor6 security update | openssl: information disclosure in handling of TLS heartbeat extension packets | [
"cpe:/o:redhat:enterprise_linux:6::hypervisor"
] | null | null | null | null |
GHSA-95f7-jm6f-gv7p | Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally. | [] | null | 6.7 | null | null |
|
GHSA-22jv-36fh-m28x | A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 SP1). The affected application does not properly implement brute force protection against user credentials in its Client Communication component. This could allow an attacker to learn user credentials that are vulnerable to brute force attacks. | [] | 8.7 | 7.5 | null | null |
|
GHSA-6c3f-x526-64jj | Cross-Site Scripting (XSS) in Xinha, as included in the Serendipity package before 1.5.5, allows remote attackers to execute arbitrary code in the image manager. | [] | null | null | null | null |
|
CVE-2018-9032 | An authentication bypass vulnerability on D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router (Hardware Version : A1, B1; Firmware Version : 1.02-2.06) devices potentially allows attackers to bypass SharePort Web Access Portal by directly visiting /category_view.php or /folder_view.php. | [
"cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-850l:a1:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-850l:b1:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
ICSA-20-336-01 | Schneider Electric EcoStruxure Operator Terminal Expert runtime (Vijeo XD) | An improper privilege management vulnerability exists that could cause privilege escalation on the workstation when interacting directly with a driver installed by the runtime software of EcoStruxure Operator Terminal Expert.CVE-2020-7544 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 7.4 | null |
GHSA-9h54-f8p4-357g | Missing Authorization vulnerability in Woo WooCommerce Canada Post Shipping.This issue affects WooCommerce Canada Post Shipping: from n/a through 2.8.3. | [] | null | 5.3 | null | null |
|
CVE-2005-0773 | Stack-based buffer overflow in VERITAS Backup Exec Remote Agent 9.0 through 10.0 for Windows, and 9.0.4019 through 9.1.307 for Netware allows remote attackers to execute arbitrary code via a CONNECT_CLIENT_AUTH request with authentication method type 3 (Windows credentials) and a long password argument. | [
"cpe:2.3:a:symantec_veritas:backup_exec:9.0.4019:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.0.4170:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.0.4172:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.0.4174:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.0.4202:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4367_sp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.0_rev.4454_sp1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1.306:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1.307:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1.1067.3:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1.1127.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1.1151.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1.1152.4:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1.1154:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:9.1_rev.4691_sp2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec_veritas:backup_exec:10.0_rev.5484_sp1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-v3pr-j5pv-5cfq | Cross-site scripting (XSS) vulnerability in LedNews 0.7 allows remote attackers to insert arbitrary web script via a news item. | [] | null | null | null | null |
|
GHSA-m82q-v8rc-95v6 | Use of Default Password vulnerability in ABB RCCMD on Windows, Linux, MacOS allows Try Common or Default Usernames and Passwords.This issue affects RCCMD: before 4.40 230207. | [] | null | 9.8 | null | null |
|
GHSA-3248-52cq-vhgx | Buffer overflow in lscfg of unknown versions of AIX has unknown impact. | [] | null | null | null | null |
|
GHSA-frfx-jmh3-hg3q | Unknown vulnerability in the DNP dissector in Ethereal 0.10.5 through 0.10.8 allows remote attackers to cause "memory corruption." | [] | null | null | null | null |
|
CVE-2018-6868 | Cross Site Scripting (XSS) exists in PHP Scripts Mall Slickdeals / DealNews / Groupon Clone Script 3.0.2 via a User Profile Field parameter. | [
"cpe:2.3:a:groupon_clone_script_project:groupon_clone_script:3.0.2:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-xmq4-6j6c-v6v5 | article.php in oBlog does not properly restrict comments, which allows remote attackers to cause a denial of service (blog spam) via a comment=new action. | [] | null | null | null | null |
|
CVE-2020-3857 | A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to execute arbitrary code with system privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2013-5009 | The Management Console in Symantec Endpoint Protection (SEP) 11.x before 11.0.7.4 and 12.x before 12.1.2 RU2 and Endpoint Protection Small Business Edition 12.x before 12.1.2 RU2 does not properly perform authentication, which allows remote authenticated users to gain privileges by leveraging access to a limited-admin account. | [
"cpe:2.3:a:symantec:endpoint_protection:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0:ru6mp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.1:mp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp1:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.2:mp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp1a:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.4:mp2:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.3001:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6000:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6100:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6200:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6200.754:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.6300:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.7000:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:endpoint_protection:11.0.7100:*:*:*:*:*:*:*"
] | null | null | null | 7.4 |
|
CVE-2009-3026 | protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly other versions, does not follow the "require TLS/SSL" preference when connecting to older Jabber servers that do not follow the XMPP specification, which causes libpurple to connect to the server without the expected encryption and allows remote attackers to sniff sessions. | [
"cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-v3jp-xfmh-x2q5 | SQL injection vulnerability in product.php in 2daybiz Custom T-shirt Design Script allows remote attackers to execute arbitrary SQL commands via the id parameter. | [] | null | null | null | null |
|
GHSA-ff8c-r6cp-6m85 | A vulnerability was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. It has been classified as critical. Affected is the function log_employee of the file /classes/Master.php?f=log_employee. The manipulation of the argument employee_code leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268422 is the identifier assigned to this vulnerability. | [] | 6.9 | 6.3 | null | null |
|
GHSA-rmm3-6hwr-c8q9 | In the Linux kernel before 5.4.12, drivers/input/input.c has out-of-bounds writes via a crafted keycode table, as demonstrated by input_set_keycode, aka CID-cb222aed03d7. | [] | null | 6.7 | null | null |
|
GHSA-h379-c75h-jgq4 | Buffer overflow vulnerability in DLINK 619L version B 2.06beta via the curTime parameter on login. | [] | null | 9.8 | null | null |
|
GHSA-prgj-cjmj-v8ff | An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during caplen processing. If the caplen is less than 144, one can cause an integer overflow in the function handle_80211, which will result in an out-of-bounds read and may allow access to sensitive memory (or a denial of service). | [] | null | null | 9.1 | null |
|
CVE-2024-7169 | SourceCodester School Fees Payment System ajax.php cross-site request forgery | A vulnerability classified as problematic has been found in SourceCodester School Fees Payment System 1.0. This affects an unknown part of the file /ajax.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272583. | [
"cpe:2.3:a:sourcecodester:school_fees_payment_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:school_fees_payment_system:1.0:*:*:*:*:*:*:*"
] | 6.9 | 4.3 | 4.3 | 5 |
RHSA-2014:0285 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | kernel: exec/ptrace: get_dumpable() incorrect tests kernel: ipc: ipc_rcu_putref refcount races kernel: xen: hypercalls exposed to privilege rings 1 and 2 of HVM guests Kernel: qeth: buffer overflow in snmp ioctl Kernel: AACRAID Driver compat IOCTL missing capability check hw: AMD CPU erratum may cause core hang Kernel: net: leakage of uninitialized memory to user-space via recv syscalls | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2022-1946 | Gallery < 2.0.0 - Reflected Cross-Site Scripting | The Gallery WordPress plugin before 2.0.0 does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected Cross-Site Scripting issue | [
"cpe:2.3:a:wpdevart:gallery:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
GHSA-wj3w-79hv-x498 | Buffer overflow in the SigComp Universal Decompressor Virtual Machine dissector in Wireshark 0.10.8 through 1.0.13 and 1.2.0 through 1.2.8 has unknown impact and remote attack vectors. | [] | null | null | null | null |
|
GHSA-mp76-7w5v-pr75 | TurboBoost Commands vulnerable to arbitrary method invocation | ImpactTurboBoost Commands has existing protections in place to guarantee that only public methods on Command classes can be invoked; however, the existing checks aren't as robust as they should be. It's possible for a sophisticated attacker to invoke more methods than should be permitted depending on the the strictness of authorization checks that individual applications enforce. Being able to call some of these methods can have security implications.DetailsCommands verify that the class must be a `Command` and that the method requested is defined as a public method; however, this isn't robust enough to guard against all unwanted code execution. The library should more strictly enforce which methods are considered safe before allowing them to be executed.PatchesPatched in the following versions.0.1.3[NPM Package](https://www.npmjs.com/package/@turbo-boost/commands/v/0.1.3)[Ruby GEM](https://rubygems.org/gems/turbo_boost-commands/versions/0.1.3)0.2.2[NPM Package](https://www.npmjs.com/package/@turbo-boost/commands/v/0.2.2)[Ruby GEM](https://rubygems.org/gems/turbo_boost-commands/versions/0.2.2)WorkaroundsYou can add this guard to mitigate the issue if running an unpatched version of the library. | [] | null | 8.1 | null | null |
GHSA-46qq-67xm-22x8 | Unspecified vulnerability in the APM - Application Performance Management component in Oracle Enterprise Manager Grid Control 6.5, 11.1, and 12.1.0.2 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Business Transaction Management. | [] | null | null | null | null |
|
GHSA-8wgh-r989-wp43 | Cross-Site Request Forgery (CSRF) vulnerability in ryan_xantoo Map Contact allows Stored XSS. This issue affects Map Contact: from n/a through 3.0.4. | [] | null | 7.1 | null | null |
|
GHSA-f7v6-q2xx-gh48 | The OPC Foundation Local Discovery Server (LDS) before 1.03.367 is installed as a Windows Service without adding double quotes around the opcualds.exe executable path, which might allow local users to gain privileges. | [] | null | null | 7.8 | null |
|
CVE-2018-8007 | Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2. | [
"cpe:2.3:a:apache:couchdb:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 9 |
|
GHSA-r2w8-wv3f-f6gx | Cross-Site Request Forgery (CSRF) vulnerability in HasThemes ShopLentor plugin <= 2.6.2 versions. | [] | null | 4.3 | null | null |
|
GHSA-mjfv-7ccm-vjfr | IBM Jazz Reporting Service 7.0 and 7.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183039. | [] | null | null | null | null |
|
CVE-2021-41129 | Authentication bypass in Pterodactyl | Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user. Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the `LoginCheckpointController@__invoke` method which handles two-factor authentication for a user. This controller looks for a request input parameter called `confirmation_token` which is expected to be a 64 character random alpha-numeric string that references a value within the Panel's cache containing a `user_id` value. This value is then used to fetch the user that attempted to login, and lookup their two-factor authentication token. Due to the design of this system, any element in the cache that contains only digits could be referenced by a malicious user, and whatever value is stored at that position would be used as the `user_id`. There are a few different areas of the Panel that store values into the cache that are integers, and a user who determines what those cache keys are could pass one of those keys which would cause this code pathway to reference an arbitrary user. At its heart this is a high-risk login bypass vulnerability. However, there are a few additional conditions that must be met in order for this to be successfully executed, notably: 1.) The account referenced by the malicious cache key must have two-factor authentication enabled. An account without two-factor authentication would cause an exception to be triggered by the authentication logic, thusly exiting this authentication flow. 2.) Even if the malicious user is able to reference a valid cache key that references a valid user account with two-factor authentication, they must provide a valid two-factor authentication token. However, due to the design of this endpoint once a valid user account is found with two-factor authentication enabled there is no rate-limiting present, thusly allowing an attacker to brute force combinations until successful. This leads to a third condition that must be met: 3.) For the duration of this attack sequence the cache key being referenced must continue to exist with a valid `user_id` value. Depending on the specific key being used for this attack, this value may disappear quickly, or be changed by other random user interactions on the Panel, outside the control of the attacker. In order to mitigate this vulnerability the underlying authentication logic was changed to use an encrypted session store that the user is therefore unable to control the value of. This completely removed the use of a user-controlled value being used. In addition, the code was audited to ensure this type of vulnerability is not present elsewhere. | [
"cpe:2.3:a:pterodactyl:panel:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
CVE-2021-43246 | Windows Hyper-V Denial of Service Vulnerability | Windows Hyper-V Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2366:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2366:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1415:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.405:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1415:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1415:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1415:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.376:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.1415:*:*:*:*:*:x64:*"
] | null | 5.6 | null | null |
GHSA-4gm4-x57g-4vgj | Missing Authorization vulnerability in WPDO DoLogin Security allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects DoLogin Security: from n/a through 3.7.1. | [] | null | 5.3 | null | null |
|
GHSA-88j7-9543-qfmf | DIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to denial-of-service the device via long input values. | [] | null | null | null | null |
|
CVE-2021-22963 | A redirect vulnerability in the fastify-static module version < 4.2.4 allows remote attackers to redirect users to arbitrary websites via a double slash // followed by a domain: http://localhost:3000//google.com/%2e%2e.The issue shows up on all the fastify-static applications that set redirect: true option. By default, it is false. | [
"cpe:2.3:a:fastify:fastify-static:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 5.8 |
|
CVE-2009-1139 | Memory leak in the LDAP service in Active Directory on Microsoft Windows 2000 SP4 and Server 2003 SP2, and Active Directory Application Mode (ADAM) on Windows XP SP2 and SP3 and Server 2003 SP2, allows remote attackers to cause a denial of service (memory consumption and service outage) via (1) LDAP or (2) LDAPS requests with unspecified OID filters, aka "Active Directory Memory Leak Vulnerability." | [
"cpe:2.3:a:microsoft:adam:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp3:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-q7w5-m6gq-2mrg | Multiple cross-site scripting (XSS) vulnerabilities in the management GUI in Symantec Web Gateway 5.0.x before 5.0.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
GHSA-68hg-g6f6-j32f | A vulnerability in the web-based interface of Cisco Prime Service Catalog could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based interface of an affected product. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvh65713. | [] | null | null | 6.1 | null |
|
GHSA-3j2v-wgmf-j8hj | Buffer overflow in the (1) WTHoster and (2) WebDriver modules in WildTangent Web Driver 4.0 allows remote attackers to execute arbitrary code via a long filename. | [] | null | null | null | null |
|
CVE-2023-0405 | GPT3 AI Content Writer < 1.4.38 - Subscriber+ Arbitrary Post Content Update | The GPT AI Power: Content Writer & ChatGPT & Image Generator & WooCommerce Product Writer & AI Training WordPress plugin before 1.4.38 does not perform any kind of nonce or privilege checks before letting logged-in users modify arbitrary posts. | [
"cpe:2.3:a:gptaipower:gpt_ai_power:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
CVE-2002-2059 | BIOS D845BG, D845HV, D845PT and D845WN on Intel motherboards does not properly restrict access to configuration information when BIOS passwords are enabled, which could allow local users to change the default boot device via the F8 key. | [
"cpe:2.3:h:intel:d845bg_motherboard:p01-0012:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845bg_motherboard:p02-0015:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845bg_motherboard:p03-0021:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845bg_motherboard:p04-0023:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845bg_motherboard:p05-0024:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845hv_motherboard:p04-0018:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845hv_motherboard:p05-0022:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845hv_motherboard:p06-0024:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845hv_motherboard:p07-0029:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845hv_motherboard:p08-0031:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845hv_motherboard:p09-0035:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845hv_motherboard:p10-0038:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845hv_motherboard:p11-0040:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845pt_motherboard:p01-0012:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845pt_motherboard:p02-0015:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845pt_motherboard:p03-0021:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845pt_motherboard:p04-0023:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845pt_motherboard:p05-0024:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845wn_motherboard:p04-0018:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845wn_motherboard:p06-0024:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845wn_motherboard:p07-0029:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845wn_motherboard:p08-0031:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845wn_motherboard:p09-0035:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845wn_motherboard:p10-0038:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:d845wn_motherboard:p11-0040:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2022-49648 | tracing/histograms: Fix memory leak problem | In the Linux kernel, the following vulnerability has been resolved:
tracing/histograms: Fix memory leak problem
This reverts commit 46bbe5c671e06f070428b9be142cc4ee5cedebac.
As commit 46bbe5c671e0 ("tracing: fix double free") said, the
"double free" problem reported by clang static analyzer is:
> In parse_var_defs() if there is a problem allocating
> var_defs.expr, the earlier var_defs.name is freed.
> This free is duplicated by free_var_defs() which frees
> the rest of the list.
However, if there is a problem allocating N-th var_defs.expr:
+ in parse_var_defs(), the freed 'earlier var_defs.name' is
actually the N-th var_defs.name;
+ then in free_var_defs(), the names from 0th to (N-1)-th are freed;
IF ALLOCATING PROBLEM HAPPENED HERE!!! -+
\
|
0th 1th (N-1)-th N-th V
+-------------+-------------+-----+-------------+-----------
var_defs: | name | expr | name | expr | ... | name | expr | name | ///
+-------------+-------------+-----+-------------+-----------
These two frees don't act on same name, so there was no "double free"
problem before. Conversely, after that commit, we get a "memory leak"
problem because the above "N-th var_defs.name" is not freed.
If enable CONFIG_DEBUG_KMEMLEAK and inject a fault at where the N-th
var_defs.expr allocated, then execute on shell like:
$ echo 'hist:key=call_site:val=$v1,$v2:v1=bytes_req,v2=bytes_alloc' > \
/sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
Then kmemleak reports:
unreferenced object 0xffff8fb100ef3518 (size 8):
comm "bash", pid 196, jiffies 4295681690 (age 28.538s)
hex dump (first 8 bytes):
76 31 00 00 b1 8f ff ff v1......
backtrace:
[<0000000038fe4895>] kstrdup+0x2d/0x60
[<00000000c99c049a>] event_hist_trigger_parse+0x206f/0x20e0
[<00000000ae70d2cc>] trigger_process_regex+0xc0/0x110
[<0000000066737a4c>] event_trigger_write+0x75/0xd0
[<000000007341e40c>] vfs_write+0xbb/0x2a0
[<0000000087fde4c2>] ksys_write+0x59/0xd0
[<00000000581e9cdf>] do_syscall_64+0x3a/0x80
[<00000000cf3b065c>] entry_SYSCALL_64_after_hwframe+0x46/0xb0 | [] | null | 5.5 | null | null |
CVE-2009-0182 | Buffer overflow in VUPlayer 2.49 and earlier allows user-assisted attackers to execute arbitrary code via a long URL in a File line in a .pls file, as demonstrated by an http URL on a File1 line. | [
"cpe:2.3:a:vuplayer:vuplayer:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9.3 |
|
CVE-2020-13485 | The Knock Knock plugin before 1.2.8 for Craft CMS allows IP Whitelist bypass via an X-Forwarded-For HTTP header. | [
"cpe:2.3:a:verbb:knock_knock:*:*:*:*:*:craft_cms:*:*"
] | null | 9.1 | null | 6.4 |
|
cisco-sa-sbss-ipv6-dos-tsgqbffW | Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability | A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition.
This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-tsgqbffW"] | [] | null | null | 5.3 | null |
CVE-2014-4658 | The vault subsystem in Ansible before 1.5.5 does not set the umask before creation or modification of a vault file, which allows local users to obtain sensitive key information by reading a file. | [
"cpe:2.3:a:redhat:ansible:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2020-35805 | Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.74, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBK20 before 2.3.5.26, RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK40 before 2.3.5.30, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK50 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10. | [
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-gxgw-3343-jpx9 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kevinweber wBounce allows Stored XSS. This issue affects wBounce: from n/a through 1.8.1. | [] | null | 6.5 | null | null |
|
CVE-2018-5166 | WebExtensions can use request redirection and a "filterReponseData" filter to bypass host permission settings to redirect network traffic and access content from a host for which they do not have explicit user permission. This vulnerability affects Firefox < 60. | [
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2007-3114 | Memory leak in server/MaraDNS.c in MaraDNS before 1.2.12.05, and 1.3.x before 1.3.03, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, a different set of affected versions than CVE-2007-3115 and CVE-2007-3116. | [
"cpe:2.3:a:maradns:maradns:1.2.12.01:*:*:*:*:*:*:*",
"cpe:2.3:a:maradns:maradns:1.2.12.02:*:*:*:*:*:*:*",
"cpe:2.3:a:maradns:maradns:1.2.12.03:*:*:*:*:*:*:*",
"cpe:2.3:a:maradns:maradns:1.2.12.04:*:*:*:*:*:*:*",
"cpe:2.3:a:maradns:maradns:1.3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:maradns:maradns:1.3.02:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2009-1588 | Cross-site scripting (XSS) vulnerability in CGI RESCUE MiniBBS 8t before 8.95t, 8 before 8.95, 9 before 9.08, and 10 before 10.32 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:cgi_rescue:cgi_rescue_minibbs:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi_rescue:cgi_rescue_minibbs:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cgi_rescue:cgi_rescue_minibbs:10.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2023-41813 | User notification settings edition | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). Allows you to edit the Web Console user notification options. This issue affects Pandora FMS: from 700 through 774. | [
"cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*"
] | null | 3 | null | null |
RHSA-2021:0719 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.0.8 security and bug fix update | gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation | [
"cpe:/a:redhat:acm:2.0::el8"
] | null | 8.6 | null | null |
CVE-2019-9503 | Broadcom brcmfmac driver is vulnerable to a frame validation bypass | The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions. | [
"cpe:2.3:a:broadcom:brcmfmac_driver:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | 7.9 | null | null |
CVE-2021-20261 | A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | 6.4 | null | 4.4 |
|
RHSA-2024:3918 | Red Hat Security Advisory: OpenShift Container Platform 4.14.30 packages and security update | ssh: Prefix truncation attack on Binary Packet Protocol (BPP) | [
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 5.9 | null | null |
CVE-2005-1578 | EnCase Forensic Edition 4.18a does not support Device Configuration Overlays (DCO), which allows attackers to hide information without detection. | [
"cpe:2.3:a:guidance_software:encase:4.18a:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2015-8078 | Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the section_offset variable. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076. | [
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-45506 | HAProxy 2.9.x before 2.9.10, 3.0.x before 3.0.4, and 3.1.x through 3.1-dev6 allows a remote denial of service for HTTP/2 zero-copy forwarding (h2_send loop) under a certain set of conditions, as exploited in the wild in 2024. | [
"cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:3.1:dev0:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:3.1:dev1:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:3.1:dev2:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:3.1:dev3:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:3.1:dev4:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:3.1:dev5:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2024-45072 | IBM WebSphere Application Server XML external entity injection | IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A privileged user could exploit this vulnerability to expose sensitive information or consume memory resources. | [
"cpe:2.3:a:ibm:websphere_application_server:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-h35x-4f36-345v | In the Linux kernel, the following vulnerability has been resolved:accel/ivpu: Prevent recovery invocation during probe and resumeRefactor IPC send and receive functions to allow correct
handling of operations that should not trigger a recovery process.Expose ivpu_send_receive_internal(), which is now utilized by the D0i3
entry, DCT initialization, and HWS initialization functions.
These functions have been modified to return error codes gracefully,
rather than initiating recovery.The updated functions are invoked within ivpu_probe() and ivpu_resume(),
ensuring that any errors encountered during these stages result in a proper
teardown or shutdown sequence. The previous approach of triggering recovery
within these functions could lead to a race condition, potentially causing
undefined behavior and kernel crashes due to null pointer dereferences. | [] | null | 4.7 | null | null |
|
RHSA-2009:0225 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 kernel security and bug fix update | kernel: Unix sockets kernel panic Linux Kernel 'atm module' Local Denial of Service kernel: fix inotify watch removal/umount races kernel: fix soft lockups/OOM issues with unix socket garbage collector | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2021-22264 | An issue has been discovered in GitLab affecting all versions starting from 13.8 before 14.0.9, all versions starting from 14.1 before 14.1.4, all versions starting from 14.2 before 14.2.2. Under specialized conditions, an invited group member may continue to have access to a project even after the invited group, which the member was part of, is deleted. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 6.8 | null | null |
Subsets and Splits