id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-43559 | Windows Mobile Broadband Driver Denial of Service Vulnerability | Windows Mobile Broadband Driver Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-vjgw-cc8r-582j | Online Project Time Management System v1.0 was discovered to contain an arbitrary file write vulnerability which allows attackers to execute arbitrary code via a crafted HTML file. | [] | null | 8.8 | null | null |
|
GHSA-fx75-7xmm-5hm3 | Improper access control in Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6 and Citrix XenMobile Server before 10.9 RP5 and leads to the ability to read arbitrary files. | [] | null | null | null | null |
|
GHSA-2mff-8r7p-g487 | Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow. | [] | null | null | null | null |
|
CVE-2018-9397 | In WMT_unlocked_ioctl of MTK WMT device driver, there is a possible OOB
write due to a missing bounds check. This could lead to local escalation of
privilege with System execution privileges needed. User interaction is not
needed for exploitation. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-392p-h7qw-6vx7 | The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.9.1 contains a vulnerability in the ITM application server's WriteWindowMouse API. The vulnerability allows an anonymous remote attacker to execute arbitrary code with local administrator privileges. The vulnerability is caused by improper deserialization. | [] | null | null | null | null |
|
GHSA-44v8-gqvj-w676 | Theme volty tvcmspaymenticon up to v4.0.1 was discovered to contain a SQL injection vulnerability via the component /tvcmspaymenticon/ajax.php?action=update_position&recordsArray. | [] | null | 9.8 | null | null |
|
CVE-2007-1734 | The DCCP support in the do_dccp_getsockopt function in net/dccp/proto.c in Linux kernel 2.6.20 and later does not verify the upper bounds of the optlen value, which allows local users running on certain architectures to read kernel memory or cause a denial of service (oops), a related issue to CVE-2007-1730. | [
"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-rc5h-67pm-gm2w | Mozilla developers reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9. | [] | null | 8.8 | null | null |
|
CVE-2017-9331 | The Agenda component in Telaxus EPESI 1.8.2 and earlier has a Stored Cross-site Scripting (XSS) vulnerability in modules/Utils/RecordBrowser/RecordBrowserCommon_0.php, which allows remote attackers to inject arbitrary web script or HTML via a crafted meeting description parameter. | [
"cpe:2.3:a:epesi:epesi:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-x2jc-989c-47q4 | Hexo up to v7.0.0 (RC2) was discovered to contain an arbitrary file read vulnerability. | [] | null | 7.5 | null | null |
|
GHSA-v7qx-gcjm-59m5 | Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This vulnerability affects Firefox < 110. | [] | null | 8.8 | null | null |
|
GHSA-fvv2-374f-gmhr | Cross-site scripting (XSS) vulnerability in search.php in BitScripts Bits Video Script 2.04 and 2.05 Gold Beta allows remote attackers to inject arbitrary web script or HTML via the order parameter. | [] | null | null | null | null |
|
ICSA-22-102-05 | Aethon TUG Home Base Server | An unauthenticated attacker can arbitrarily add new users with administrative privileges and delete or modify existing users.CVE-2022-1066 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N). An unauthenticated attacker can freely access hashed user credentials.CVE-2022-26423 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N). An unauthenticated attacker can connect to the TUG Home Base Server websocket to take control of TUG robots.CVE-2022-1070 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The Reports tab of the Fleet Management Console is vulnerable to stored cross-site scripting attacks when new reports are created or edited.CVE-2022-27494 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L). The Load tab of the Fleet Management Console is vulnerable to reflected cross-site scripting attacks.CVE-2022-1059 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L). | [] | null | null | 7.6 | null |
CVE-2002-0756 | Cross-site scripting vulnerability in the authentication page for (1) Webmin 0.96 and (2) Usermin 0.90 allows remote attackers to insert script into an error page and possibly steal cookies. | [
"cpe:2.3:a:usermin:usermin:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:usermin:usermin:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.92.1:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.94:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:webmin:webmin:0.96:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-hc2f-7r5r-r2hg | Heap buffer overflow due to incorrect hash function in TensorFlow | ImpactThe [`TensorKey` hash function](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/framework/tensor_key.h#L53-L64) used total estimated `AllocatedBytes()`, which (a) is an estimate per tensor, and (b) is a very poor hash function for constants (e.g. `int32_t`). It also tried to access individual tensor bytes through `tensor.data()` of size `AllocatedBytes()`. This led to ASAN failures because the `AllocatedBytes()` is an estimate of total bytes allocated by a tensor, including any pointed-to constructs (e.g. strings), and does not refer to contiguous bytes in the `.data()` buffer. We couldn't use this byte vector anyways, since types like `tstring` include pointers, whereas we need to hash the string values themselves.PatchesWe have patched the issue in GitHub commit [1b85a28d395dc91f4d22b5f9e1e9a22e92ccecd6](https://github.com/tensorflow/tensorflow/commit/1b85a28d395dc91f4d22b5f9e1e9a22e92ccecd6).The fix will be included in TensorFlow 2.9.0. We will also cherrypick this commit on TensorFlow 2.8.1, which is the only other affected version.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | [] | null | 5.5 | null | null |
GHSA-rmvw-6cmx-qgfg | The glibcbug script in glibc 2.3.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2004-0968. | [] | null | null | null | null |
|
GHSA-3xpr-w4v3-68p8 | Multiple cross-site scripting (XSS) vulnerabilities in Apache Open For Business Project (aka OFBiz) 10.04.x before 10.04.02 allow remote attackers to inject arbitrary web script or HTML via (1) a parameter array in freemarker templates, the (2) contentId or (3) mapKey parameter in a cms event request, which are not properly handled in an error message, or unspecified input in (4) an ajax request to the getServerError function in checkoutProcess.js or (5) a Webslinger component request. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-996g-cjm8-8q33 | An issue in the exp_atom component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | [] | null | 7.5 | null | null |
|
GHSA-wvw3-8wwp-x8x5 | A user privacy issue was addressed by removing the broadcast MAC address. This issue is fixed in macOS Catalina 10.15, watchOS 6, iOS 13, tvOS 13. A device may be passively tracked by its Wi-Fi MAC address. | [] | null | null | null | null |
|
CVE-2024-47540 | GHSL-2024-197: GStreamer uses uninitialized stack memory in Matroska/WebM demuxer | GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size < 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem->allocator->mem_unmap_full or mem->allocator->mem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10. | [
"cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*"
] | 8.6 | null | null | null |
CVE-2021-47386 | hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field | In the Linux kernel, the following vulnerability has been resolved:
hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
If driver read val value sufficient for
(val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((val >> 4) & 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().
The patch fixes possible NULL pointer dereference by removing lm75[].
Found by Linux Driver Verification project (linuxtesting.org).
[groeck: Dropped unnecessary continuation lines, fixed multi-line alignment] | [] | null | 7.8 | null | null |
GHSA-xcpm-3296-q6gm | The October 1998 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the ps and grep commands. | [] | null | null | null | null |
|
GHSA-29fh-mw96-pcjc | A stored cross-site scripting (XSS) vulnerability in FUDforum v3.1.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the SQL statements field under /adm/admsql.php. | [] | null | 3.5 | null | null |
|
GHSA-c8xp-8mf3-62h9 | OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values | Any CA issuer in the RPKI can trick OctoRPKI prior to https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate.ImpactAn attacker can use this to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack which during normal operations would be rejected as "RPKI invalid". Additionally, in certain deployments RTR session flapping in and of itself also could cause BGP routing churn, causing availability issues.Patcheshttps://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]]([email protected]) | [] | null | 7.5 | null | null |
GHSA-fjx2-c7c3-8w5j | The X font server xfs in Red Hat Linux 6.x allows an attacker to cause a denial of service via a malformed request. | [] | null | null | null | null |
|
GHSA-83vh-6f9v-p6j4 | SQL injection vulnerability in load-calendar.php in PHPJabbers Event Booking Calendar 2.0 allows remote attackers to execute arbitrary SQL commands via the cid parameter. | [] | null | null | null | null |
|
CVE-2002-2295 | Buffer overflow in Pico Server (pServ) 2.0 beta 1 through beta 5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a 1024-byte TCP stream message, which triggers an off-by-one buffer overflow, or (2) a long method name in an HTTP request, (3) a long version number in an HTTP request, (4) a long User-Agent header, or (5) a long file path. | [
"cpe:2.3:a:pico_server:pico_server:2.0_beta_1:*:*:*:*:*:*:*",
"cpe:2.3:a:pico_server:pico_server:2.0_beta_2:*:*:*:*:*:*:*",
"cpe:2.3:a:pico_server:pico_server:2.0_beta_3:*:*:*:*:*:*:*",
"cpe:2.3:a:pico_server:pico_server:2.0_beta_5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-r43p-59cr-4g96 | Cross-site scripting (XSS) vulnerability in index.php in phpMyAdmin 2.8.0.3, 2.8.0.2, 2.8.1-dev, and 2.9.0-dev allows remote attackers to inject arbitrary web script or HTML via the lang parameter. | [] | null | null | null | null |
|
CVE-2024-29170 | Dell PowerScale OneFS versions 8.2.x through 9.8.0.x contain a use of hard coded credentials vulnerability. An adjacent network unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure of network traffic and denial of service. | [
"cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
GHSA-6jgp-6m6r-qrvw | The Management I/O (MIO) component in Cisco Firepower Extensible Operating System 1.1(1.160) on Firepower 9000 devices allows local users to execute arbitrary OS commands as root via crafted CLI input, aka Bug ID CSCux10578. | [] | null | null | null | null |
|
GHSA-r5mg-x7hq-vwwm | ** UNSUPPORTED WHEN ASSIGNED ** TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formSystemCheck. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [] | null | 8.8 | null | null |
|
CVE-2023-20257 | A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct cross-site scripting attacks. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by submitting malicious input containing script or HTML content within requests that would stored within the application interface. A successful exploit could allow the attacker to conduct cross-site scripting attacks against other users of the affected application. | [
"cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:3.10.4:-:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_infrastructure:3.10.4:update_1:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
GHSA-2c3h-gr5x-3fh2 | An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, Safari 17.1, macOS Sonoma 14.1. Visiting a malicious website may lead to address bar spoofing. | [] | null | 7.5 | null | null |
|
GHSA-qvf6-4fcc-xh3j | The Easy Digital Downloads (EDD) Reviews extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. | [] | null | 6.1 | null | null |
|
RHSA-2017:3124 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.0 security update | Solr: Code execution via entity expansion | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7"
] | null | null | 9.8 | null |
ICSA-24-275-01 | Optigo Networks ONS-S8 - Spectra Aggregation Switch | The web service for ONS-S8 - Spectra Aggregation Switch includes functions which do not properly validate user input, allowing an attacker to traverse directories, bypass authentication, and execute remote code. The web server for ONS-S8 - Spectra Aggregation Switch includes an incomplete authentication process, which can lead to an attacker authenticating without a password. | [] | null | 9.1 | null | null |
GHSA-6r82-p88g-mc9g | Resource allocation error while playing the video whose dimensions are more than supported dimension in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016, SXR1130 | [] | null | null | 9.8 | null |
|
CVE-2025-21975 | net/mlx5: handle errors in mlx5_chains_create_table() | In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: handle errors in mlx5_chains_create_table()
In mlx5_chains_create_table(), the return value of mlx5_get_fdb_sub_ns()
and mlx5_get_flow_namespace() must be checked to prevent NULL pointer
dereferences. If either function fails, the function should log error
message with mlx5_core_warn() and return error pointer. | [] | null | null | null | null |
PYSEC-2017-79 | null | An exploitable vulnerability exists in the YAML parsing functionality in the read_yaml_file method in io_utils.py in django_make_app 0.1.3. A YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability. | [] | null | null | null | null |
RHSA-2020:1050 | Red Hat Security Advisory: cups security and bug fix update | cups: Local privilege escalation to root due to insecure environment variable handling cups: Manipulation of cupsd.conf by a local attacker resulting in limited reads of arbitrary files as root cups: Session cookie generated by the CUPS web interface is easy to guess cups: Predictable session cookie breaks CSRF protection | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null |
CVE-2024-8182 | Flowise Denial of Service | An Unauthenticated Denial of Service (DoS) vulnerability exists in Flowise version 1.8.2 leading to a complete crash of the instance running a vulnerable version due to improper handling of user supplied input to the “/api/v1/get-upload-file” api endpoint. | [
"cpe:2.3:a:flowiseai:flowise:-:*:*:*:*:*:*:*",
"cpe:2.3:a:flowiseai:flowise:1.8.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2021-22231 | A denial of service in user's profile page is found starting with GitLab CE/EE 8.0 that allows attacker to reject access to their profile page via using a specially crafted username. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 3.5 | null | null |
|
CVE-2001-1295 | Directory traversal vulnerability in Cerberus FTP Server 1.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the CD command. | [
"cpe:2.3:a:grant_averett:cerberus_ftp_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-4cch-wxpw-8p28 | Server-Side Forgery Request can be activated unmarshalling with XStream | ImpactThe vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream.PatchesIf you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15.WorkaroundsThe reported vulnerability does not exist running Java 15 or higher.No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use.Users of XStream 1.4.14 can simply add two lines to XStream's setup code:Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code:Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern.Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:For more informationIf you have any questions or comments about this advisory:Open an issue in [XStream](https://github.com/x-stream/xstream/issues)Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | [] | null | 6.3 | null | null |
GHSA-98r4-4f3j-q239 | An integer underflow in WhatsApp could have caused remote code execution when receiving a crafted video file. | [] | null | 7.8 | null | null |
|
RHSA-2020:2440 | Red Hat Security Advisory: OpenShift Container Platform 4.3.25 openshift security update | kubernetes: Server side request forgery (SSRF) in kube-controller-manager allows users to leak secret information | [
"cpe:/a:redhat:openshift:4.3::el7",
"cpe:/a:redhat:openshift:4.3::el8"
] | null | 6.3 | null | null |
GHSA-f3g2-977q-w8x8 | includes/content/gateway.inc.php in CubeCart 3.0.12 and earlier, when magic_quotes_gpc is disabled, uses an insufficiently restrictive regular expression to validate the gateway parameter, which allows remote attackers to conduct PHP remote file inclusion attacks. | [] | null | null | null | null |
|
GHSA-9jxp-9fgc-mhhp | Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-24102. | [] | null | 7.8 | null | null |
|
GHSA-q5c9-9c6m-cvqq | Amzetta zPortal Windows zClient is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal Windows zClient <= v3.2.8180.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | [] | null | null | null | null |
|
CVE-2022-37095 | H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateWanParams. | [
"cpe:2.3:o:h3c:h200_firmware:h200v100r004:*:*:*:*:*:*:*",
"cpe:2.3:h:h3c:h200:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2019-20680 | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7000v2 before 1.0.0.53, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.60, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.46, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.32. | [
"cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*"
] | null | null | 7 | null |
|
GHSA-gq9f-9xmr-rc2q | Integer overflow in the drm_mode_dirtyfb_ioctl function in drivers/gpu/drm/drm_crtc.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.1.5 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted ioctl call. | [] | null | 7.8 | null | null |
|
RHSA-2017:0860 | Red Hat Security Advisory: chromium-browser security update | chromium-browser: bad cast in blink chromium-browser: out of bounds memory access in v8 chromium-browser: heap buffer overflow in v8 chromium-browser: use after free in printing chromium-browser: use after free in blink | [
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
CVE-2020-1890 | A URL validation issue in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction. | [
"cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*",
"cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-4h4r-xvmr-v723 | When opening a Hangul HShow Document (.hpt) and processing a structure within the document, Hancom Office 2014 will use a static size to allocate a heap buffer yet explicitly trust a size from the file when modifying data inside of it. Due to this, an aggressor can corrupt memory outside the bounds of this buffer which can lead to code execution under the context of the application. | [] | null | null | 7.8 | null |
|
GHSA-794f-724h-wf37 | MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors. | [] | null | null | null | null |
|
CVE-2018-0350 | A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN Solution could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. The attacker must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges. This vulnerability affects the following Cisco products if they are running a release of the Cisco SD-WAN Solution prior to Release 18.3.0: vBond Orchestrator Software, vEdge 100 Series Routers, vEdge 1000 Series Routers, vEdge 2000 Series Routers, vEdge 5000 Series Routers, vEdge Cloud Router Platform, vManage Network Management Software, vSmart Controller Software. Cisco Bug IDs: CSCvi69808, CSCvi69810, CSCvi69814, CSCvi69822, CSCvi69827, CSCvi69828, CSCvi69836. | [
"cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:vedge-plus:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:vedge-pro:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:vmanage_network_management:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge-1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge-1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge-2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge-2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vedge-5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge-5000:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2022-49203 | drm/amd/display: Fix double free during GPU reset on DC streams | In the Linux kernel, the following vulnerability has been resolved:
drm/amd/display: Fix double free during GPU reset on DC streams
[Why]
The issue only occurs during the GPU reset code path.
We first backup the current state prior to commiting 0 streams
internally from DM to DC. This state backup contains valid link
encoder assignments.
DC will clear the link encoder assignments as part of current state
(but not the backup, since it was a copied before the commit) and
free the extra stream reference it held.
DC requires that the link encoder assignments remain cleared/invalid
prior to commiting. Since the backup still has valid assignments we
call the interface post reset to clear them. This routine also
releases the extra reference that the link encoder interface held -
resulting in a double free (and eventually a NULL pointer dereference).
[How]
We'll have to do a full DC commit anyway after GPU reset because
the stream count previously went to 0.
We don't need to retain the assignment that we had backed up, so
just copy off of the now clean current state assignment after the
reset has occcurred with the new link_enc_cfg_copy() interface. | [] | null | 5.5 | null | null |
GHSA-v3j6-jv37-286j | An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.7, all versions starting from 16.10 before 16.10.5, all versions starting from 16.11 before 16.11.2. It was possible for an attacker to cause a denial of service using maliciously crafted markdown content. | [] | null | 6.5 | null | null |
|
GHSA-wx2g-xqh2-pv8w | Unspecified vulnerability in HP Ignite-UX server before C.6.9.150 for HP-UX B.11.00, B.11.11, and B.11.23 allows remote attackers to "gain root access" via unspecified vectors. | [] | null | null | null | null |
|
CVE-2014-3323 | Directory traversal vulnerability in Cisco Unified Contact Center Enterprise allows remote authenticated users to read arbitrary web-root files via a crafted URL, aka Bug ID CSCun25262. | [
"cpe:2.3:a:cisco:unified_contact_center_enterprise:*:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-43pm-8f8q-62m4 | Alstom e-terracontrol 3.5, 3.6, and 3.7 allows remote attackers to cause a denial of service (infinite loop) via crafted DNP3 packets. | [] | null | null | null | null |
|
CVE-2012-5248 | Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.262:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.265:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.268:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.271:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.3.300.273:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.4.402.265:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.4.402.278:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:10.1.106.17:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:10.2.157.51:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:10.3.186.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.8.4990:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.4990:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.1.0.5790:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.0.7220:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.1.8210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3.9130:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.2.12610:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.3.13070:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.5.0.16600:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.5.1.17730:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.6.0.19120:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.6.0.19140:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.1948:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.1953:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.19480:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.0.19530:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.7.1.19610:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.0.0.408:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.0.0.4080:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.1.0.485:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.1.0.488:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.1.0.4880:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.2.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.2.0.2070:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:3.3.0.3670:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-7794-m8w6-jf63 | An elevation of privilege vulnerability exists when the Microsoft AutoUpdate (MAU) application for Mac improperly validates updates before executing them, aka 'Microsoft (MAU) Office Elevation of Privilege Vulnerability'. | [] | null | null | null | null |
|
GHSA-j7p5-9jv3-vq8j | Absolute path traversal vulnerability in proxy.php in the google currency lookup in the Paypal Currency Converter Basic For WooCommerce plugin before 1.4 for WordPress allows remote attackers to read arbitrary files via a full pathname in the requrl parameter. | [] | null | null | null | null |
|
GHSA-c7hg-5qw2-jh2v | Netscape 6.2.3 and earlier, and Mozilla 1.0.1, allow remote attackers to corrupt heap memory and execute arbitrary code via a GIF image with a zero width. | [] | null | null | null | null |
|
GHSA-9cfq-v2hm-c3xr | Jenkins GitHub Branch Source Plugin vulnerable to Server-Side Request Forgery | A server-side request forgery vulnerability exists in Jenkins GitHub Branch Source Plugin 2.3.4 and older in Endpoint.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL. Additionally, this form validation method did not require POST requests, resulting in a CSRF vulnerability. As of version 23.5, this form validation method requires POST requests and the Overall/Administer permission. | [] | null | null | 4.3 | null |
GHSA-rm92-8pw8-34fm | Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the "gap" between the stack and the binary. | [] | null | null | 7.8 | null |
|
GHSA-wr6q-fqcr-67m4 | Multiple SQL injection vulnerabilities in VBZooM 1.11 and earlier allow remote attackers to execute arbitrary SQL commands via the UserID parameter to (1) ignore-pm.php, (2) sendmail.php, (3) reply.php or (4) sub-join.php. | [] | null | null | null | null |
|
CVE-2022-36079 | Parse Server vulnerable to brute force guessing of user sensitive data via search patterns | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints. | [
"cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*"
] | null | 8.6 | null | null |
CVE-2021-32753 | Weak password in API gateway in EdgeX Foundry Edinburgh, Fuji, Geneva, and Hanoi releases allows remote attackers to obtain authentication token via dictionary-based password attack when OAuth2 authentication method is enabled. | EdgeX Foundry is an open source project for building a common open framework for internet-of-things edge computing. A vulnerability exists in the Edinburgh, Fuji, Geneva, and Hanoi versions of the software. When the EdgeX API gateway is configured for OAuth2 authentication and a proxy user is created, the client_id and client_secret required to obtain an OAuth2 authentication token are set to the username of the proxy user. A remote network attacker can then perform a dictionary-based password attack on the OAuth2 token endpoint of the API gateway to obtain an OAuth2 authentication token and use that token to make authenticated calls to EdgeX microservices from an untrusted network. OAuth2 is the default authentication method in EdgeX Edinburgh release. The default authentication method was changed to JWT in Fuji and later releases. Users should upgrade to the EdgeX Ireland release to obtain the fix. The OAuth2 authentication method is disabled in Ireland release. If unable to upgrade and OAuth2 authentication is required, users should create OAuth2 users directly using the Kong admin API and forgo the use of the `security-proxy-setup` tool to create OAuth2 users. | [
"cpe:2.3:a:edgexfoundry:edgex_foundry:*:*:*:*:*:*:*:*"
] | null | 8.3 | null | null |
ICSA-19-136-02 | Fuji Electric Alpha7 PC Loader | An out-of-bounds read vulnerability has been identified, which may crash the system.CVE-2019-10975 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L). | [] | null | null | 3.3 | null |
GHSA-2w8m-f4xv-fpww | jhead through 3.04 has a heap-based buffer over-read in process_DQT in jpgqguess.c. | [] | null | 7.1 | null | null |
|
cisco-sa-20180221-jcf | Cisco Jabber Client Framework for Windows and Mac Cross-Site Scripting Vulnerability | A vulnerability in Cisco Jabber Client Framework (JCF) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected device.
The vulnerability is due to improper neutralization of script in attributes in a web page. An attacker could exploit this vulnerability by executing arbitrary JavaScript in the Jabber client of the recipient. An exploit could allow the attacker to perform remote code execution.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-jcf"] | [] | null | null | 5.4 | null |
GHSA-3pgg-fxm7-xv3p | NVIDIA Triton Inference Server for Linux contains a vulnerability where a user can set the logging location to an arbitrary file. If this file exists, logs are appended to the file. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | [] | null | 9 | null | null |
|
CVE-2023-24563 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:solid_edge_se2023:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2009-3266 | Opera before 10.01 does not properly restrict HTML in a (1) RSS or (2) Atom feed, which allows remote attackers to conduct cross-site scripting (XSS) attacks, and conduct cross-zone scripting attacks involving the Feed Subscription Page to read feeds or create feed subscriptions, via a crafted feed, related to the rendering of the application/rss+xml content type as "scripted content." | [
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-32276 | Grafana 8.4.3 allows unauthenticated access via (for example) a /dashboard/snapshot/*?orgId=0 URI. NOTE: the vendor considers this a UI bug, not a vulnerability | [
"cpe:2.3:a:grafana:grafana:8.4.3:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-gm44-4527-6rm2 | Heap-based buffer overflow in Winny 2.0 b7.1 and earlier allows remote attackers to execute arbitrary code via long strings to certain commands sent to the file transfer port. | [] | null | null | null | null |
|
GHSA-m473-7rj2-2fcq | An issue was discovered in Bento4 1.5.1-627. AP4_Sample::ReadData in Core/Ap4Sample.cpp allows attackers to trigger an attempted excessive memory allocation, related to AP4_DataBuffer::SetDataSize and AP4_DataBuffer::ReallocateBuffer in Core/Ap4DataBuffer.cpp. | [] | null | null | 6.5 | null |
|
CVE-2024-41995 | Initialization of a resource with an insecure default vulnerability exists in JavaTM Platform Ver.12.89 and earlier. If this vulnerability is exploited, the product may be affected by some known TLS1.0 and TLS1.1 vulnerabilities. As for the specific products/models/versions of MFPs and printers that contain JavaTM Platform, see the information provided by the vendor. | [
"cpe:2.3:a:ricoh_company_ltd:javatm_platform:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2010-2421 | Multiple unspecified vulnerabilities in Opera before 10.54 have unknown impact and attack vectors related to (1) "extremely severe," (2) "highly severe," (3) "moderately severe," and (4) "less severe" issues. | [
"cpe:2.3:a:opera:opera_browser:*:b:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-hw9g-wm2x-4jf4 | The Meeting Server in IBM Sametime 8.5.2 through 8.5.2.1 and 9.x through 9.0.0.1 does not validate URLs in Cookie headers before using them in redirects, which has unspecified impact and remote attack vectors. | [] | null | null | null | null |
|
CVE-2023-37897 | Server-side Template Injection (SSTI) in grav | Grav is a file-based Web-platform built in PHP. Grav is subject to a server side template injection (SSTI) vulnerability. The fix for another SSTI vulnerability using `|map`, `|filter` and `|reduce` twigs implemented in the commit `71bbed1` introduces bypass of the denylist due to incorrect return value from `isDangerousFunction()`, which allows to execute the payload prepending double backslash (`\\`). The `isDangerousFunction()` check in version 1.7.42 and onwards retuns `false` value instead of `true` when the `\` symbol is found in the `$name`. This vulnerability can be exploited if the attacker has access to: 1. an Administrator account, or 2. a non-administrator, user account that has Admin panel access and Create/Update page permissions. A fix for this vulnerability has been introduced in commit `b4c6210` and is included in release version `1.7.42.2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
| [
"cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*",
"cpe:2.3:a:getgrav:grav:1.7.42:*:*:*:*:*:*:*",
"cpe:2.3:a:getgrav:grav:1.7.42.1:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
GHSA-cmgv-85xc-pwhm | Vulnerability in the Oracle FLEXCUBE Enterprise Limits and Collateral Management component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.3.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Enterprise Limits and Collateral Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle FLEXCUBE Enterprise Limits and Collateral Management accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | 5.3 | null |
|
CVE-2023-36538 | Improper access control in Zoom Rooms for Windows before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access. | [
"cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*"
] | null | 8.4 | null | null |
|
CVE-2018-6149 | Type confusion in JavaScript in Google Chrome prior to 67.0.3396.87 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-9ggc-843g-q3g8 | Memory leak in H.323 Gatekeeper Service in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to cause a denial of service (resource exhaustion) via a large amount of malformed H.323 data. | [] | null | null | null | null |
|
GHSA-vjff-mhv7-25px | Unspecified vulnerability in Cisco Intrusion Prevention System (IPS) 5.x before 5.1(8)E2 and 6.x before 6.0(5)E2, when inline mode and jumbo Ethernet support are enabled, allows remote attackers to cause a denial of service (panic), and possibly bypass intended restrictions on network traffic, via a "specific series of jumbo Ethernet frames." | [] | null | null | null | null |
|
CVE-2022-29821 | In JetBrains Rider before 2022.1 local code execution via links in ReSharper Quick Documentation was possible | [
"cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*"
] | null | 6.9 | null | null |
|
GHSA-3rw5-32q5-6f2x | PHP remote file inclusion vulnerability in CzarNews 1.13b allows remote attackers to execute arbitrary PHP code via the tpath parameter to (1) headlines.php or (2) news.php. NOTE: some sources have reported the "dir" parameter as being affected; however, this is likely a cut-and-paste error from the wrong section of the original vulnerability report. Also, the news.php version was later reported to be in 1.12 through 1.14. | [] | null | null | null | null |
|
CVE-2017-8961 | A directory traversal vulnerability in HPE Intelligent Management Center (IMC) PLAT 7.3 E0504P02 could allow remote code execution. | [
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
GHSA-r386-j6gx-vhwr | An issue was discovered in PRiSE adAS 1.7.0. The current database password is embedded in the change password form. | [] | null | null | null | null |
|
CVE-2020-25827 | An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site level. Thus, multiple requests can be made across many wikis/sites concurrently. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2025-2335 | Drivin Soluções API registerSchool cross site scripting | A vulnerability classified as problematic was found in Drivin Soluções up to 20250226. This vulnerability affects unknown code of the file /api/school/registerSchool of the component API Handler. The manipulation of the argument message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.1 | 3.5 | 3.5 | 4 |
CVE-2016-7919 | Moodle 3.1.2 allows remote attackers to obtain sensitive information via unspecified vectors, related to a "SQL Injection" issue affecting the Administration panel function in the installation process component. NOTE: the vendor disputes the relevance of this report, noting that "the person who is installing Moodle must know database access credentials and they can access the database directly; there is no need for them to create a SQL injection in one of the installation dialogue fields. | [
"cpe:2.3:a:moodle:moodle:3.1.2:*:*:*:*:*:*:*"
] | null | 7.5 | 7.5 | 5 |
|
CVE-2024-31845 | An issue was discovered in Italtel Embrace 1.6.4. The product does not neutralize or incorrectly neutralizes output that is written to logs. The web application writes logs using a GET query string parameter. This parameter can be modified by an attacker, so that every action he performs is attributed to a different user. This can be exploited without authentication. | [
"cpe:2.3:a:italtel:embrace:1.6.4:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-6w62-83g6-rfhj | Node Connect Reflected Cross-Site Scripting in Sencha Labs Connect middleware | node-connect before 2.8.2 has cross site scripting in Sencha Labs Connect middleware (vulnerability due to incomplete fix for CVE-2013-7370)OverviewConnect is a stack of middleware that is executed in order in each request.The "methodOverride" middleware allows the http post to override the method of the request with the value of the "_method" post key or with the header "x-http-method-override".Because the user post input was not checked, req.method could contain any kind of value. Because the req.method did not match any common method VERB, connect answered with a 404 page containing the "Cannot `[method]` `[url]`" content. The method was not properly encoded for output in the browser.Example:RecommendationUpdate to the newest version of Connect or disable methodOverride. It is not possible to avoid the vulnerability if you have enabled this middleware in the top of your stack.Credit:Sergio Arcos | [] | null | 6.1 | null | null |
CVE-2024-47544 | GHSL-2024-238: GStreamer has NULL-pointer dereferences in MP4/MOV demuxer CENC handling | GStreamer is a library for constructing graphs of media-handling components. The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability. This vulnerability is fixed in 1.24.10. | [
"cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*"
] | 6.8 | null | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.