id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-32vr-6wj5-f3g7
Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[]
null
null
8.2
null
CVE-2022-37843
In TOTOLINK A860R V4.1.2cu.5182_B20201027 in cstecgi.cgi, the acquired parameters are directly put into the system for execution without filtering, resulting in a command injection vulnerability.
[ "cpe:2.3:o:totolink:a860r_firmware:4.1.2cu.5182_b20201027:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a860r:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-56290
WordPress Multiple Shipping And Billing Address For Woocommerce Plugin <= 1.2 - Unauthenticated SQL Injection vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in silverplugins217 Multiple Shipping And Billing Address For Woocommerce allows SQL Injection.This issue affects Multiple Shipping And Billing Address For Woocommerce: from n/a through 1.2.
[]
null
9.3
null
null
GHSA-vqww-4qr9-q8f7
An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.
[]
null
null
null
null
GHSA-r8h3-xcc9-62rw
The mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to fetch cleartext passwords upon a successful login request.
[]
null
7.5
null
null
CVE-2022-25495
The component /jquery_file_upload/server/php/index.php of CuppaCMS v1.0 allows attackers to upload arbitrary files and execute arbitrary code via a crafted PHP file.
[ "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-4vj4-4373-qj2m
** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in Modules Builder (modbuild) 4.1 for Comdev One Admin allow remote attackers to execute arbitrary PHP code via a URL in the path[docroot] parameter to (1) config-bak.php or (2) config.php. NOTE: CVE disputes this vulnerability because the unmodified scripts set the applicable variable to the empty string; reasonable modified copies would use a fixed pathname string.
[]
null
9.8
null
null
GHSA-xh9p-p9h3-4958
Multiple SQL injection vulnerabilities in While You Were Out (WYWO) InOut Board 1.0 allow remote attackers to execute arbitrary SQL commands via (1) the num parameter in (a) phonemessage.asp, (2) the catcode parameter in (b) faqDsp.asp, and the (3) Username and (4) Password fields in (c) login.asp.
[]
null
null
null
null
CVE-1999-1487
Vulnerability in digest in AIX 4.3 allows printq users to gain root privileges by creating and/or modifing any file on the system.
[ "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2022-23135
There is a directory traversal vulnerability in some home gateway products of ZTE. Due to the lack of verification of user modified destination path, an attacker with specific permissions could modify the FTP access path to access and modify the system path contents without authorization, which will cause information leak and affect device operation.
[ "cpe:2.3:o:zte:zxhn_f677_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zte:zxhn_f677:-:*:*:*:*:*:*:*", "cpe:2.3:o:zte:zxhn_f477_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:zte:zxhn_f477:-:*:*:*:*:*:*:*" ]
null
6.5
null
5.5
GHSA-4h86-c5mg-pxv5
Memory corruption in MODEM due to Improper Validation of Array Index while processing GSTK Proactive commands in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[]
null
7.8
null
null
CVE-2017-20015
WEKA INTEREST Security Scanner LAN Viewer denial of service
A vulnerability, which was classified as problematic, was found in WEKA INTEREST Security Scanner up to 1.8. This affects an unknown part of the component LAN Viewer. The manipulation with an unknown input leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
[ "cpe:2.3:a:weka:interest_security_scanner:*:*:*:*:*:*:*:*" ]
null
2.8
null
null
RHSA-2018:0105
Red Hat Security Advisory: qemu-kvm security update
An update for qemu-kvm is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:rhel_aus:6.5::server" ]
null
null
null
null
CVE-2015-2994
Unrestricted file upload vulnerability in ChangePhoto.jsp in SysAid Help Desk before 15.2 allows remote administrators to execute arbitrary code by uploading a file with a .jsp extension, then accessing it via a direct request to the file in icons/user_photo/.
[ "cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*" ]
null
null
null
6.5
RHSA-2022:0669
Red Hat Security Advisory: python-pillow security update
python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions
[ "cpe:/a:redhat:rhel_e4s:8.1::appstream" ]
null
9.8
null
null
CVE-2023-43633
Debug Functions Unlockable Without Triggering Measured Boot
On boot, the Pillar eve container checks for the existence and content of “/config/GlobalConfig/global.json”. If the file exists, it overrides the existing configuration on the device on boot. This allows an attacker to change the system’s configuration, which also includes some debug functions. This could be used to unlock the ssh with custom “authorized_keys” via the “debug.enable.ssh” key, similar to the “authorized_keys” finding that was noted before. Other usages include unlocking the usb to enable the keyboard via the “debug.enable.usb” key, allowing VNC access via the “app.allow.vnc” key, and more. An attacker could easily enable these debug functionalities without triggering the “measured boot” mechanism implemented by EVE OS, and without marking the device as “UUD” (“Unknown Update Detected”). This is because the “/config” partition is not protected by “measured boot”, it is mutable and it is not encrypted in any way. An attacker can gain full control over the device without changing the PCR values, thereby not triggering the “measured boot” mechanism, and having full access to the vault. Note: This issue was partially fixed in these commits (after disclosure to Zededa), where the config partition measurement was added to PCR13: • aa3501d6c57206ced222c33aea15a9169d629141 • 5fef4d92e75838cc78010edaed5247dfbdae1889. This issue was made viable in version 9.0.0 when the calculation was moved to PCR14 but it was not included in the measured boot.
[ "cpe:2.3:o:lfedge:eve:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-6v98-88gr-xr2r
A SQL injection vulnerability in a MediaWiki script in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote unauthenticated attackers to execute arbitrary SQL commands via the host_name and service_description parameters. The vulnerability can be exploited only when a valid Knowledge Base URL is configured on the Knowledge Base configuration page and points to a MediaWiki instance. This relates to the proxy feature in class/centreon-knowledge/ProceduresProxy.class.php and include/configuration/configKnowledge/proxy/proxy.php.
[]
null
null
null
null
CVE-2006-4616
SMTP service in MailEnable Standard, Professional, and Enterprise before ME-10014 (20060904) allows remote attackers to cause a denial of service via an SPF lookup for a domain with a large number of records, which triggers a null pointer exception.
[ "cpe:2.3:a:mailenable:mailenable_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:mailenable:mailenable_professional:*:*:*:*:*:*:*:*", "cpe:2.3:a:mailenable:mailenable_standard:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-c95q-mpxc-wgf9
Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic.
[]
null
null
5.3
null
GHSA-jh7h-6rpx-g936
The GamiPress – Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gamipress_button' shortcode in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-rvj8-8m76-4334
PHP remote file inclusion vulnerability in tasks/send_queued_emails.php in NuclearBB Alpha 2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the root_path parameter.
[]
null
null
null
null
GHSA-q4j7-8h9j-7jxq
In OSIsoft PI Web API 2019 Patch 1 (1.12.0.6346) and all previous versions, the affected product is vulnerable to a cross-site scripting attack, which may allow an attacker to remotely execute arbitrary code.
[]
null
null
null
null
GHSA-xfxh-47fx-qrxv
PHP remote file inclusion vulnerability in athena.php in Oliver May Athena PHP Website Administration 0.1a allows remote attackers to execute arbitrary PHP code via a URL in the athena_dir parameter.
[]
null
null
null
null
CVE-2024-21625
One-click remote code execution via malicious deep link
SideQuest is a place to get virtual reality applications for Oculus Quest. The SideQuest desktop application uses deep links with a custom protocol (`sidequest://`) to trigger actions in the application from its web contents. Because, prior to version 0.10.35, the deep link URLs were not sanitized properly in all cases, a one-click remote code execution can be achieved in cases when a device is connected, the user is presented with a malicious link and clicks it from within the application. As of version 0.10.35, the custom protocol links within the electron application are now being parsed and sanitized properly.
[ "cpe:2.3:a:sidequestvr:sidequest:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
RHSA-2023:4967
Red Hat Security Advisory: kpatch-patch security update
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:rhel_e4s:8.4::baseos" ]
null
7.8
null
null
RHSA-2023:0334
Red Hat Security Advisory: kernel security and bug fix update
kernel: watch queue race condition can lead to privilege escalation kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: i2c: unbounded length leads to buffer overflow in ismt_access() kernel: i915: Incorrect GPU TLB flush can lead to random memory access kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option kernel: nfsd buffer overflow by RPC message over TCP with garbage data
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
7.5
null
null
CVE-2017-10975
Cross-site scripting (XSS) vulnerability in Lutim before 0.8 might allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is mishandled in an upload notification and in the myfiles component, if the attacker can convince the victim to proceed with an upload despite the appearance of an XSS payload in the filename.
[ "cpe:2.3:a:lutim_project:lutim:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-5659-g9p4-354f
Moodle allows attackers to bypass a forced-password-change requirement
login/token.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 allows remote authenticated users to bypass a forced-password-change requirement by creating a web-services token.
[]
null
null
null
null
GHSA-5m9g-hh42-2p58
Tencent Blueking CMDB v3.2.x to v3.9.x was discovered to contain a Server-Side Request Forgery (SSRF) via the event subscription function (/service/subscription.go). This vulnerability allows attackers to access internal requests via a crafted POST request.
[]
null
8.1
null
null
GHSA-8xmj-gvcg-7vcw
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.Please note this vulnerability is similar, but not identical to CVE-2023-52326.
[]
null
6.1
null
null
GHSA-xcr3-4qvr-54rh
Cross-site Scripting in Pimcore
Pimcore prior to version 10.4 is vulnerable to stored cross-site scripting in Tooltip.
[]
null
null
6.8
null
CVE-2022-47949
The Nintendo NetworkBuffer class, as used in Animal Crossing: New Horizons before 2.0.6 and other products, allows remote attackers to execute arbitrary code via a large UDP packet that causes a buffer overflow, aka ENLBufferPwn. The victim must join a game session with the attacker. Other affected products include Mario Kart 7 before 1.2, Mario Kart 8, Mario Kart 8 Deluxe before 2.1.0, ARMS before 5.4.1, Splatoon, Splatoon 2 before 5.5.1, Splatoon 3 before late 2022, Super Mario Maker 2 before 3.0.2, and Nintendo Switch Sports before late 2022.
[ "cpe:2.3:a:nintendo:animal_crossing\\:_new_horizons:*:*:*:*:*:*:*:*", "cpe:2.3:a:nintendo:arms:*:*:*:*:*:*:*:*", "cpe:2.3:a:nintendo:mario_kart_7:*:*:*:*:*:*:*:*", "cpe:2.3:a:nintendo:mario_kart_8:*:*:*:*:deluxe:*:*:*", "cpe:2.3:a:nintendo:mario_kart_8:-:*:*:*:-:*:*:*", "cpe:2.3:a:nintendo:splatoon:*:*:*:*:*:*:*:*", "cpe:2.3:a:nintendo:splatoon_2:*:*:*:*:*:*:*:*", "cpe:2.3:a:nintendo:splatoon_3:*:*:*:*:*:*:*:*", "cpe:2.3:a:nintendo:super_mario_maker_2:*:*:*:*:*:*:*:*", "cpe:2.3:a:nintendo:switch_sports:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-8mjr-jr5h-q2xr
OpenZeppelin Contracts for Cairo account cannot process transactions on Goerli
ImpactThis vulnerability affects all accounts (vanilla and ethereum flavors) in the [v0.2.0 release of OpenZeppelin Contracts for Cairo](https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.2.0), which are not whitelisted on StarkNet mainnet, so only goerli deployments of v0.2.0 accounts are affected.This faulty behavior is not observed in [StarkNet's testing framework](https://github.com/starkware-libs/cairo-lang/blob/master/src/starkware/starknet/testing/starknet.py), so don't rely on it passing to detect this issue on custom accounts.PatchesThis bug has been patched in [v0.2.1](https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.2.1).ReferencesThe issue is detailed in https://github.com/OpenZeppelin/cairo-contracts/issues/386.For more informationIf you have any questions or comments about this advisory:Open an issue in [the Contracts for Cairo repo](https://github.com/OpenZeppelin/cairo-contracts/issues/new/choose)Email us at [[email protected]](mailto:[email protected])
[]
null
6.5
null
null
GHSA-33gc-f8v9-v8hm
Malicious Package in ladder-text-js
`ladder-text-js` contained a malicious script that attempted to delete all files when `npm test` was run.RecommendationThis module has been unpublished from the npm Registry. If you find this module in your environment remove it.
[]
null
9.8
null
null
CVE-2012-0954
APT 0.7.x before 0.7.25 and 0.8.x before 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote attackers to install altered packages via a man-in-the-middle (MITM) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3587.
[ "cpe:2.3:a:debian:advanced_package_tool:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.2-0.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.14:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.15:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp1:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp2:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.15:exp3:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.16:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.17:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp1:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp2:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp3:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.17:exp4:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.18:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.19:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.20:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.21:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.22:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.23:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.7.24:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.0:pre1:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.0:pre2:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.12:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.13:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.14:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.15:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp1:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp2:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.15:exp3:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.15.6:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.15.7:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.15.8:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.15.9:*:*:*:*:*:*:*", "cpe:2.3:a:debian:advanced_package_tool:0.8.15.10:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-x9rw-3x6c-c4h9
librsvg before 2.34.1 uses the node name to identify the type of node, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "fe," which is misidentified as a RsvgFilterPrimitive.
[]
null
null
null
null
GHSA-h956-h9q8-3c53
LINE for iOS version 7.1.3 to 7.1.5 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
5.9
null
CVE-2022-44474
AEM Reflected XSS Arbitrary code execution
Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-3c9x-2mx6-v84j
An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain, aka "Microsoft Edge Elevation of Privilege Vulnerability." This affects Microsoft Edge.
[]
null
null
5.4
null
GHSA-gcqc-374g-rrqf
An issue was discovered in wolfSSL before 4.3.0 in a non-default configuration where DSA is enabled. DSA signing uses the BEEA algorithm during modular inversion of the nonce, leading to a side-channel attack against the nonce.
[]
null
5.3
null
null
CVE-2024-49515
Substance3D - Painter | Untrusted Search Path (CWE-426)
Substance3D - Painter versions 10.1.0 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. The problem extends to any type of critical resource that the application trusts. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-fg28-g5cr-jq66
Race condition in do_coredump in signal.c in Linux kernel 2.6 allows local users to cause a denial of service by triggering a core dump in one thread while another thread has a pending SIGSTOP.
[]
null
null
null
null
GHSA-38vg-j2xv-fm9g
Cross Site Scripting (XSS) in updateprofile.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'rename', 'remail', 'rphone' and 'rcity' parameters.
[]
null
6.1
null
null
CVE-2024-13137
wangl1989 mysiteforme SiteController RestResponse cross site scripting
A vulnerability was found in wangl1989 mysiteforme 1.0. It has been classified as problematic. This affects the function RestResponse of the file src/main/java/com/mysiteforme/admin/controller/system/SiteController. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:wangl1989:mysiteforme:1.0:*:*:*:*:*:*:*" ]
5.1
2.4
2.4
3.3
RHSA-2022:7633
Red Hat Security Advisory: dnsmasq security and bug fix update
dnsmasq: Heap use after free in dhcp6_no_relay
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
GHSA-pr5m-4w22-8483
NanoHTTPD Cross-site Scripting vulnerability
An issue was discovered in RouterNanoHTTPD.java in NanoHTTPD through 2.3.1. The GeneralHandler class implements a basic GET handler that prints debug information as an HTML page. Any web server that extends this class without implementing its own GET handler is vulnerable to reflected XSS, because the GeneralHandler GET handler prints user input passed through the query string without any sanitization.
[]
null
null
null
null
GHSA-cxqm-79p9-m968
D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of requests to the /cgi-bin/webproc endpoint. When parsing the var:page parameter, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18422.
[]
null
null
8.8
null
RHSA-2021:0735
Red Hat Security Advisory: nodejs:10 security update
nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion nodejs: DNS rebinding in --inspect
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
null
null
CVE-2014-2399
Unspecified vulnerability in the Oracle Endeca Server component in Oracle Fusion Middleware 2.2.2 allows remote attackers to affect integrity via unknown vectors related to Oracle Endeca Information Discovery (Formerly Latitude), a different vulnerability than CVE-2014-2400.
[ "cpe:2.3:a:oracle:fusion_middleware:2.2.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2016-0674
Unspecified vulnerability in the Siebel Core - Common Components component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows local users to affect confidentiality and integrity via vectors related to Email.
[ "cpe:2.3:a:oracle:siebel_core-common_components:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:siebel_core-common_components:8.2.2:*:*:*:*:*:*:*" ]
null
null
4.4
3.2
GHSA-3jp7-w958-xwmc
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Bravada bravada allows Stored XSS.This issue affects Bravada: from n/a through 1.1.2.
[]
null
6.5
null
null
GHSA-74xr-j6fq-776m
Blind SQL injection in Inmarsat AmosConnect 8 login form allows remote attackers to access user credentials, including user names and passwords.
[]
null
null
9.8
null
CVE-2022-4865
Cross-site Scripting (XSS) - Stored in usememos/memos
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
[ "cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*" ]
null
null
8.3
null
CVE-2018-1274
Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path parsing which can cause a denial of service (CPU and memory consumption).
[ "cpe:2.3:a:pivotal_software:spring_data_commons:*:*:*:*:*:*:*:*", "cpe:2.3:a:pivotal_software:spring_data_rest:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2014-3032
Cross-site scripting (XSS) vulnerability in the Web GUI in IBM Tivoli Netcool/OMNIbus 7.3.0 before 7.3.0.6, 7.3.1 before 7.3.1.7, and 7.4.0 before 7.4.0.3 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_netcool\\/omnibus:7.4.0.2:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
[ "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*" ]
null
null
null
5.1
CVE-2014-8522
The MySQL database in McAfee Network Data Loss Prevention (NDLP) before 9.3 does not require a password, which makes it easier for remote attackers to obtain access.
[ "cpe:2.3:a:mcafee:network_data_loss_prevention:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:network_data_loss_prevention:8.6:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:network_data_loss_prevention:9.2.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2015-7360
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface (WebUI) in Fortinet FortiSandbox before 2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) serial parameter to alerts/summary/profile/; the (2) urlForCreatingReport parameter to csearch/report/export/; the (3) id parameter to analysis/detail/download/screenshot; or vectors related to (4) "Fortiview threats by users search filtered by vdom" or (5) "PCAP file download generated by the VM scan feature."
[ "cpe:2.3:h:fortinet:fortisandbox:-:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortisandbox_firmware:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-8388-c89m-3x67
SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.
[]
null
8.8
null
null
GHSA-8cm2-xr5f-hrc3
Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0105, CVE-2016-0107, CVE-2016-0112, and CVE-2016-0113.
[]
null
null
7.5
null
CVE-2007-1675
Buffer overflow in the CRAM-MD5 authentication mechanism in the IMAP server (nimap.exe) in IBM Lotus Domino before 6.5.6 and 7.x before 7.0.2 FP1 allows remote attackers to cause a denial of service via a long username.
[ "cpe:2.3:a:ibm:lotus_domino:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.4:*:fp1:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.4:*:fp2:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.5:*:fp1:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:6.5.5:*:fp2:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_domino:7.0.2:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2019-6225
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to elevate privileges.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
CVE-2020-20468
White Shark System (WSS) 1.3.2 is vulnerable to CSRF. Attackers can use the user_edit_password.php file to modify the user password.
[ "cpe:2.3:a:white_shark_systems_project:white_shark_systems:1.3.2:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-vqc7-p7p7-97wf
A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.
[]
null
null
null
null
CVE-2025-2041
s-a-zhd Ecommerce-Website-using-PHP shop.php sql injection
A vulnerability, which was classified as critical, has been found in s-a-zhd Ecommerce-Website-using-PHP 1.0. Affected by this issue is some unknown functionality of the file /shop.php. The manipulation of the argument p_cat leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
CVE-2019-1340
An elevation of privilege vulnerability exists in Windows AppX Deployment Server that allows file creation in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1320, CVE-2019-1322.
[ "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2014-2888
lib/sfpagent/bsig.rb in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request.
[ "cpe:2.3:a:herry:sfpagent:*:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.0.1:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.0:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.1:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.2:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.3:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.4:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.5:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.6:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.7:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.8:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.9:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.10:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.11:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.12:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.13:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.1.14:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.0:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.1:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.2:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.3:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.4:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.5:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.6:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.7:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.8:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.9:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.2.10:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.0:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.1:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.2:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.3:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.4:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.5:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.6:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.7:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.8:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.9:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.3.10:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.0:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.1:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.2:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.3:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.4:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.5:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.6:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.7:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.8:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.9:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.10:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.11:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.12:*:*:*:*:ruby:*:*", "cpe:2.3:a:herry:sfpagent:0.4.13:*:*:*:*:ruby:*:*" ]
null
null
null
7.5
CVE-2008-1665
Multiple unspecified vulnerabilities in HP Select Identity (HPSI) Active Directory Bidirectional LDAP Connector 2.20, 2.20.001, 2.20.002, and 2.30 allow remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:hp:hpsi_active_directory_bidirectional_ldap_connector:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:hp:hpsi_active_directory_bidirectional_ldap_connector:2.20.001:*:*:*:*:*:*:*", "cpe:2.3:a:hp:hpsi_active_directory_bidirectional_ldap_connector:2.20.002:*:*:*:*:*:*:*", "cpe:2.3:a:hp:hpsi_active_directory_bidirectional_ldap_connector:2.30:*:*:*:*:*:*:*" ]
null
null
null
9
CVE-2013-4030
Integrated Management Module (IMM) 2 1.00 through 2.00 on IBM System X and Flex System servers supports SSL cipher suites with short keys, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack against (1) SSL or (2) TLS traffic.
[ "cpe:2.3:h:ibm:integrated_management_module_2:1.00:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:integrated_management_module_2:2.00:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:bladecenter:hs23:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:bladecenter:hs23e:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flex_system_manager_node_7955:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flex_system_manager_node_8731:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flex_system_manager_node_8734:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flex_system_x220_compute_node:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flex_system_x240_compute_node:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:flex_system_x440_compute_node:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x_idataplex_direct_water_cooled_dx360_m4_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x_idataplex_dx360_m4_server:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3100_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3250_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3300_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3500_m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3500_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3500_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3530_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3550_m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3550_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3550_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3630_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3630_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3630_m4_hd:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3650_m2:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3650_m3:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3650_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3650_m4_hd:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3690_x5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3750_m4:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3850_x5:-:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:system_x3950_x5:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-955q-2rmr-5vhw
The Session Reliability Service (XTE) in Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0, and Access Essentials 1.0 and 1.5, allows remote attackers to bypass network security policies and connect to arbitrary TCP ports via a modified address:port string.
[]
null
null
null
null
GHSA-hg53-xx34-25ww
In the Linux kernel, the following vulnerability has been resolved:arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reservedAdding a reserved memory region for the framebuffer memory (the splash memory region set up by the bootloader).It fixes a kernel panic (arm-smmu: Unhandled context fault at this particular memory region) reported on DB845c running v5.10.y.
[]
null
5.5
null
null
CVE-2021-40407
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.
[ "cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*", "cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*" ]
null
null
9.1
null
CVE-2020-7200
A potential security vulnerability has been identified in HPE Systems Insight Manager (SIM) version 7.6. The vulnerability could be exploited to allow remote code execution.
[ "cpe:2.3:a:hp:systems_insight_manager:7.6:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2020-12797
HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
[ "cpe:2.3:a:hashicorp:consul:*:*:*:*:*:*:*:*", "cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*" ]
null
5.3
null
5
RHSA-2024:7164
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.4 security and bug fix update
github.com/gin-contrib/cors: Gin mishandles a wildcard in the origin string in github.com/gin-contrib/cors golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect containers/image: digest type does not guarantee valid type braces: fails to limit the number of characters it can handle golang: net: malformed DNS message can cause infinite loop jose-go: improper handling of highly compressed data follow-redirects: Possible credential leak node-tar: denial of service while parsing a tar file due to lack of folders depth validation moby: external DNS requests from 'internal' networks could lead to data exfiltration express: cause malformed URLs to be evaluated webpack-dev-middleware: lack of URL validation may lead to file leak axios: axios: Server-Side Request Forgery
[ "cpe:/a:redhat:rhmt:1.8::el8" ]
null
7.5
null
null
RHSA-2018:0013
Red Hat Security Advisory: microcode_ctl security update
An update for microcode_ctl is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-rrjj-mw48-hvmw
The kernel in Apple Mac OS X before 10.9 does not properly check for errors during the processing of multicast Wi-Fi packets, which allows remote attackers to cause a denial of service (system crash) by leveraging presence in an 802.11 network's coverage area.
[]
null
null
null
null
CVE-2014-3533
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.
[ "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.24:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.4.26:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.6.16:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.6.18:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.6.20:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:freedesktop:dbus:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*", "cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-8w8h-433w-8c4w
Arbitrary File Upload exists in the Proclaim 9.1.1 component for Joomla! via a mediafileform action.
[]
null
null
9.8
null
CVE-2023-0317
GateManager debug interface is included in non-debug builds
Unprotected Alternate Channel vulnerability in debug console of GateManager allows system administrator to obtain sensitive information.
[ "cpe:2.3:a:secomea:gatemanager:*:*:*:*:*:*:*:*" ]
null
4.9
null
null
GHSA-g7gw-qjjj-h26r
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mohammad I. Okfie WP-Hijri allows Reflected XSS. This issue affects WP-Hijri: from n/a through 1.5.3.
[]
null
7.1
null
null
CVE-2018-18255
An issue was discovered in CapMon Access Manager 5.4.1.1005. The client applications of AccessManagerCoreService.exe communicate with this server through named pipes. A user can initiate communication with the server by creating a named pipe and sending commands to achieve elevated privileges.
[ "cpe:2.3:a:capmon:access_manager:*:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
CVE-2024-31362
WordPress ProfileGrid – User Profiles, Memberships, Groups and Communities plugin <= 5.7.8 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Metagauss ProfileGrid.This issue affects ProfileGrid : from n/a through 5.7.8.
[]
null
4.3
null
null
CVE-2007-5486
dotProject before 2.1 does not properly check privileges when invoking the Companies module, which allows remote attackers to access this module via a crafted URL. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:dotproject:dotproject:*:*:*:*:*:*:*:*" ]
null
null
null
6.4
GHSA-ch5h-qj6v-8hfx
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 400, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 820, SD 820A, SD 835, SD 845, while playing an ASF file, a buffer over-read can potentially occur.
[]
null
null
9.8
null
GHSA-rf46-8mxq-53gg
Cross-site scripting (XSS) vulnerability in a ZCC page in njwc.jar in Novell ZENworks Configuration Management (ZCM) 11.2 before 11.2.3a Monthly Update 1 allows remote attackers to inject arbitrary web script or HTML via vectors involving an onload event.
[]
null
null
null
null
CVE-2024-31695
A misconfiguration in the fingerprint authentication mechanism of Binance: BTC, Crypto and NFTS v2.85.4, allows attackers to bypass authentication when adding a new fingerprint.
[ "cpe:2.3:a:binance:btc:*:*:*:*:*:*:*:*", "cpe:2.3:a:binance:crypto:*:*:*:*:*:*:*:*", "cpe:2.3:a:binance:nfts:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-qh22-5q6m-7h2p
In the Linux kernel, the following vulnerability has been resolved:mptcp: fix possible stall on recvmsg()recvmsg() can enter an infinite loop if the caller provides the MSG_WAITALL, the data present in the receive queue is not sufficient to fulfill the request, and no more data is received by the peer.When the above happens, mptcp_wait_data() will always return with no wait, as the MPTCP_DATA_READY flag checked by such function is set and never cleared in such code path.Leveraging the above syzbot was able to trigger an RCU stall:rcu: INFO: rcu_preempt self-detected stall on CPU rcu: 0-...!: (10499 ticks this GP) idle=0af/1/0x4000000000000000 softirq=10678/10678 fqs=1 (t=10500 jiffies g=13089 q=109) rcu: rcu_preempt kthread starved for 10497 jiffies! g13089 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. rcu: RCU grace-period kthread stack dump: task:rcu_preempt state:R running task stack:28696 pid: 14 ppid: 2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:4955 [inline] __schedule+0x940/0x26f0 kernel/sched/core.c:6236 schedule+0xd3/0x270 kernel/sched/core.c:6315 schedule_timeout+0x14a/0x2a0 kernel/time/timer.c:1881 rcu_gp_fqs_loop+0x186/0x810 kernel/rcu/tree.c:1955 rcu_gp_kthread+0x1de/0x320 kernel/rcu/tree.c:2128 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 rcu: Stack dump where RCU GP kthread last ran: Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 8510 Comm: syz-executor827 Not tainted 5.15.0-rc2-next-20210920-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:84 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline] RIP: 0010:kasan_check_range+0xc8/0x180 mm/kasan/generic.c:189 Code: 38 00 74 ed 48 8d 50 08 eb 09 48 83 c0 01 48 39 d0 74 7a 80 38 00 74 f2 48 89 c2 b8 01 00 00 00 48 85 d2 75 56 5b 5d 41 5c c3 <48> 85 d2 74 5e 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 50 80 38 00 RSP: 0018:ffffc9000cd676c8 EFLAGS: 00000283 RAX: ffffed100e9a110e RBX: ffffed100e9a110f RCX: ffffffff88ea062a RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff888074d08870 RBP: ffffed100e9a110e R08: 0000000000000001 R09: ffff888074d08877 R10: ffffed100e9a110e R11: 0000000000000000 R12: ffff888074d08000 R13: ffff888074d08000 R14: ffff888074d08088 R15: ffff888074d08000 FS: 0000555556d8e300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 S: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000180 CR3: 0000000068909000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: instrument_atomic_read_write include/linux/instrumented.h:101 [inline] test_and_clear_bit include/asm-generic/bitops/instrumented-atomic.h:83 [inline] mptcp_release_cb+0x14a/0x210 net/mptcp/protocol.c:3016 release_sock+0xb4/0x1b0 net/core/sock.c:3204 mptcp_wait_data net/mptcp/protocol.c:1770 [inline] mptcp_recvmsg+0xfd1/0x27b0 net/mptcp/protocol.c:2080 inet6_recvmsg+0x11b/0x5e0 net/ipv6/af_inet6.c:659 sock_recvmsg_nosec net/socket.c:944 [inline] ____sys_recvmsg+0x527/0x600 net/socket.c:2626 ___sys_recvmsg+0x127/0x200 net/socket.c:2670 do_recvmmsg+0x24d/0x6d0 net/socket.c:2764 __sys_recvmmsg net/socket.c:2843 [inline] __do_sys_recvmmsg net/socket.c:2866 [inline] __se_sys_recvmmsg net/socket.c:2859 [inline] __x64_sys_recvmmsg+0x20b/0x260 net/socket.c:2859 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fc200d2 ---truncated---
[]
null
null
null
null
GHSA-64h7-xqm5-vw78
Siemens SIMATIC S7-1500 CPU devices with firmware before 1.6 allow remote attackers to cause a denial of service (device restart and STOP transition) via crafted TCP packets.
[]
null
null
null
null
GHSA-9xqg-wjcv-qqxq
Use after free in append_command in GitHub repository vim/vim prior to 8.2. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
[]
null
7.8
null
null
CVE-2017-9691
There is a race condition in Android for MSM, Firefox OS for MSM, and QRD Android that allows to access to already free'd memory in the debug message output functionality contained within the mobicore driver.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
4.7
1.9
CVE-2019-9336
In libavc there is a possible information disclosure due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112326322
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2005-0802
Cross-site scripting (XSS) vulnerability in search.asp in ACS Blog 0.8 through 1.1b allows remote attackers to execute arbitrary web script or HTML via the search parameter.
[ "cpe:2.3:a:asp_press:acs_blog:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:asp_press:acs_blog:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:asp_press:acs_blog:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:asp_press:acs_blog:1.1b:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-8488-996w-f5hf
Symantec Ghost 7.0 stores usernames and passwords in plaintext in the NGServer\params registry key, which could allow an attacker to gain privileges.
[]
null
null
null
null
CVE-2023-26068
Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 2 of 4).
[ "cpe:2.3:o:lexmark:cxtpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx942:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx943:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx944:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9325:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9335:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9445:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9455:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9465:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cstpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs943:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtct_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx432:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3142:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtpm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtmm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx735:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4342:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4352:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mslsg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxlsg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mslbd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b3340:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b3442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1342:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms439:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxlbd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb3442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1342:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:msngm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2338:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2546:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1242:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1246:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m3250:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms321:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms521:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms621:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms622:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxngm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2338:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtgm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2546:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1242:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1246:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3250:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:msngw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2865:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms821:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms823:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms825:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mstgw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5255:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5270:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms822:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms826:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtgw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2770:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5365:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5370:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7355:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7370:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cslbn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3426:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs439:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cslbl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3224:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3326:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxlbn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3426:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxlbl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3224:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:csnzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2325:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2425:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2535:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx522:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2535:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2640:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2235:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4240:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxnzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2325:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2425:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtpp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx820:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx825:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx827:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx86:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc6152:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc6153:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc8155:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc8160:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc8163:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c6160:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs820:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs827:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cstat_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c4150:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs720:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs727:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs728:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtat_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx727:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4140:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4143:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4150:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4153:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cstmh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs921:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs923:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs927:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-8237
Inefficient Algorithmic Complexity in GitLab
A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all versions prior to 12.6 prior to 17.4.5, 17.5 prior to 17.5.3, and 17.6 prior to 17.6.1. An attacker could cause a denial of service with a crafted cargo.toml file.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:17.6.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:17.6.0:*:*:*:enterprise:*:*:*" ]
null
6.5
null
null
CVE-2024-29728
Multiple vulnerabilities in SportsNET
SQL injection vulnerabilities in SportsNET affecting version 4.0.1. These vulnerabilities could allow an attacker to retrieve, update and delete all information in the database by sending a specially crafted SQL query: https://XXXXXXX.saludydesafio.com/app/ax/inscribeUsuario/ , parameter idDesafio.
[ "cpe:2.3:a:sportsnet:sportsnetcms:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:sportsnet:sportsnet:4.0.1:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2022-48937
io_uring: add a schedule point in io_add_buffers()
In the Linux kernel, the following vulnerability has been resolved: io_uring: add a schedule point in io_add_buffers() Looping ~65535 times doing kmalloc() calls can trigger soft lockups, especially with DEBUG features (like KASAN). [ 253.536212] watchdog: BUG: soft lockup - CPU#64 stuck for 26s! [b219417889:12575] [ 253.544433] Modules linked in: vfat fat i2c_mux_pca954x i2c_mux spidev cdc_acm xhci_pci xhci_hcd sha3_generic gq(O) [ 253.544451] CPU: 64 PID: 12575 Comm: b219417889 Tainted: G S O 5.17.0-smp-DEV #801 [ 253.544457] RIP: 0010:kernel_text_address (./include/asm-generic/sections.h:192 ./include/linux/kallsyms.h:29 kernel/extable.c:67 kernel/extable.c:98) [ 253.544464] Code: 0f 93 c0 48 c7 c1 e0 63 d7 a4 48 39 cb 0f 92 c1 20 c1 0f b6 c1 5b 5d c3 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 53 48 89 fb <48> c7 c0 00 00 80 a0 41 be 01 00 00 00 48 39 c7 72 0c 48 c7 c0 40 [ 253.544468] RSP: 0018:ffff8882d8baf4c0 EFLAGS: 00000246 [ 253.544471] RAX: 1ffff1105b175e00 RBX: ffffffffa13ef09a RCX: 00000000a13ef001 [ 253.544474] RDX: ffffffffa13ef09a RSI: ffff8882d8baf558 RDI: ffffffffa13ef09a [ 253.544476] RBP: ffff8882d8baf4d8 R08: ffff8882d8baf5e0 R09: 0000000000000004 [ 253.544479] R10: ffff8882d8baf5e8 R11: ffffffffa0d59a50 R12: ffff8882eab20380 [ 253.544481] R13: ffffffffa0d59a50 R14: dffffc0000000000 R15: 1ffff1105b175eb0 [ 253.544483] FS: 00000000016d3380(0000) GS:ffff88af48c00000(0000) knlGS:0000000000000000 [ 253.544486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 253.544488] CR2: 00000000004af0f0 CR3: 00000002eabfa004 CR4: 00000000003706e0 [ 253.544491] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 253.544492] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 253.544494] Call Trace: [ 253.544496] <TASK> [ 253.544498] ? io_queue_sqe (fs/io_uring.c:7143) [ 253.544505] __kernel_text_address (kernel/extable.c:78) [ 253.544508] unwind_get_return_address (arch/x86/kernel/unwind_frame.c:19) [ 253.544514] arch_stack_walk (arch/x86/kernel/stacktrace.c:27) [ 253.544517] ? io_queue_sqe (fs/io_uring.c:7143) [ 253.544521] stack_trace_save (kernel/stacktrace.c:123) [ 253.544527] ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515) [ 253.544531] ? ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515) [ 253.544533] ? __kasan_kmalloc (mm/kasan/common.c:524) [ 253.544535] ? kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567) [ 253.544541] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828) [ 253.544544] ? __io_queue_sqe (fs/io_uring.c:?) [ 253.544551] __kasan_kmalloc (mm/kasan/common.c:524) [ 253.544553] kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567) [ 253.544556] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828) [ 253.544560] io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828) [ 253.544564] ? __kasan_slab_alloc (mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469) [ 253.544567] ? __kasan_slab_alloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469) [ 253.544569] ? kmem_cache_alloc_bulk (mm/slab.h:732 mm/slab.c:3546) [ 253.544573] ? __io_alloc_req_refill (fs/io_uring.c:2078) [ 253.544578] ? io_submit_sqes (fs/io_uring.c:7441) [ 253.544581] ? __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uring.c:10096) [ 253.544584] ? __x64_sys_io_uring_enter (fs/io_uring.c:10096) [ 253.544587] ? do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) [ 253.544590] ? entry_SYSCALL_64_after_hwframe (??:?) [ 253.544596] __io_queue_sqe (fs/io_uring.c:?) [ 253.544600] io_queue_sqe (fs/io_uring.c:7143) [ 253.544603] io_submit_sqe (fs/io_uring.c:?) [ 253.544608] io_submit_sqes (fs/io_uring.c:?) [ 253.544612] __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uri ---truncated---
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
GHSA-cj43-q238-hv9p
In Support Incident Tracker (SiT!) 3.67, the search_id parameter in the search_incidents_advanced.php page is affected by XSS.
[]
null
null
null
null
CVE-2009-1326
Stack-based buffer overflow in Mini-stream RM Downloader 3.0.0.9 allows remote attackers to execute arbitrary code via a long URI in a playlist (.m3u) file.
[ "cpe:2.3:a:mini-stream:rm_downloader:3.0.0.9:*:*:*:*:*:*:*" ]
null
null
null
9.3