id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2022-44349
NAVBLUE S.A.S N-Ops & Crew 22.5-rc.50 is vulnerable to Cross Site Scripting (XSS).
[ "cpe:2.3:a:navblue:s.a.s_n-ops_\\&_crew:22.5:rc_.50:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-2p57-w4x5-xmvp
ReadGRAYImage in coders/gray.c in GraphicsMagick 1.3.26 has a magick/import.c ImportGrayQuantumType heap-based buffer over-read via a crafted file.
[]
null
null
8.8
null
GHSA-vwqq-85rp-rwj6
An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "WindowServer" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[]
null
null
7.8
null
GHSA-mmcg-c68q-4p38
ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) vulnerability.
[]
null
null
null
null
CVE-2016-6668
The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages.
[ "cpe:2.3:a:atlassian:confluence_server:5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.11:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.9.12:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:confluence_server:5.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.26.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.26.10:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.29.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.29.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.31.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.12:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2023-0515
SourceCodester Online Tours & Travels Management System Parameter forget_password.php sql injection
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/forget_password.php of the component Parameter Handler. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219335.
[ "cpe:2.3:a:online_tours_\\&_travels_management_system_project:online_tours_\\&_travels_management_system:1.0:*:*:*:*:*:*:*" ]
null
5.5
5.5
5.2
CVE-2022-31519
The Lukasavicus/WindMill repository through 1.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[ "cpe:2.3:a:windmill_project:windmill:1.0:*:*:*:*:*:*:*" ]
null
9.3
null
6.4
GHSA-55p4-97hq-wgm9
On the RICOH Aficio MP 305+ printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.
[]
null
null
6.1
null
GHSA-fr3q-v98q-fwq5
In the Linux kernel, the following vulnerability has been resolved:drm/sched: fix null-ptr-deref in init entityThe bug can be triggered by sending an amdgpu_cs_wait_ioctl to the AMDGPU DRM driver on any ASICs with valid context. The bug was reported by Joonkyo Jung <[email protected]>. For example the following code:The ioctl AMDGPU_WAIT_CS without previously submitted job could be assumed that the error should be returned, but the following commit 1decbf6bb0b4dc56c9da6c5e57b994ebfc2be3aa modified the logic and allowed to have sched_rq equal to NULL.As a result when there is no job the ioctl AMDGPU_WAIT_CS returns success. The change fixes null-ptr-deref in init entity and the stack below demonstrates the error condition:[ +0.000007] BUG: kernel NULL pointer dereference, address: 0000000000000028 [ +0.007086] #PF: supervisor read access in kernel mode [ +0.005234] #PF: error_code(0x0000) - not-present page [ +0.005232] PGD 0 P4D 0 [ +0.002501] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI [ +0.005034] CPU: 10 PID: 9229 Comm: amd_basic Tainted: G B W L 6.7.0+ #4 [ +0.007797] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020 [ +0.009798] RIP: 0010:drm_sched_entity_init+0x2d3/0x420 [gpu_sched] [ +0.006426] Code: 80 00 00 00 00 00 00 00 e8 1a 81 82 e0 49 89 9c 24 c0 00 00 00 4c 89 ef e8 4a 80 82 e0 49 8b 5d 00 48 8d 7b 28 e8 3d 80 82 e0 <48> 83 7b 28 00 0f 84 28 01 00 00 4d 8d ac 24 98 00 00 00 49 8d 5c [ +0.019094] RSP: 0018:ffffc90014c1fa40 EFLAGS: 00010282 [ +0.005237] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff8113f3fa [ +0.007326] RDX: fffffbfff0a7889d RSI: 0000000000000008 RDI: ffffffff853c44e0 [ +0.007264] RBP: ffffc90014c1fa80 R08: 0000000000000001 R09: fffffbfff0a7889c [ +0.007266] R10: ffffffff853c44e7 R11: 0000000000000001 R12: ffff8881a719b010 [ +0.007263] R13: ffff88810d412748 R14: 0000000000000002 R15: 0000000000000000 [ +0.007264] FS: 00007ffff7045540(0000) GS:ffff8883cc900000(0000) knlGS:0000000000000000 [ +0.008236] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.005851] CR2: 0000000000000028 CR3: 000000011912e000 CR4: 0000000000350ef0 [ +0.007175] Call Trace: [ +0.002561] <TASK> [ +0.002141] ? show_regs+0x6a/0x80 [ +0.003473] ? __die+0x25/0x70 [ +0.003124] ? page_fault_oops+0x214/0x720 [ +0.004179] ? preempt_count_sub+0x18/0xc0 [ +0.004093] ? __pfx_page_fault_oops+0x10/0x10 [ +0.004590] ? srso_return_thunk+0x5/0x5f [ +0.004000] ? vprintk_default+0x1d/0x30 [ +0.004063] ? srso_return_thunk+0x5/0x5f [ +0.004087] ? vprintk+0x5c/0x90 [ +0.003296] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched] [ +0.005807] ? srso_return_thunk+0x5/0x5f [ +0.004090] ? _printk+0xb3/0xe0 [ +0.003293] ? __pfx__printk+0x10/0x10 [ +0.003735] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ +0.005482] ? do_user_addr_fault+0x345/0x770 [ +0.004361] ? exc_page_fault+0x64/0xf0 [ +0.003972] ? asm_exc_page_fault+0x27/0x30 [ +0.004271] ? add_taint+0x2a/0xa0 [ +0.003476] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched] [ +0.005812] amdgpu_ctx_get_entity+0x3f9/0x770 [amdgpu] [ +0.009530] ? finish_task_switch.isra.0+0x129/0x470 [ +0.005068] ? __pfx_amdgpu_ctx_get_entity+0x10/0x10 [amdgpu] [ +0.010063] ? __kasan_check_write+0x14/0x20 [ +0.004356] ? srso_return_thunk+0x5/0x5f [ +0.004001] ? mutex_unlock+0x81/0xd0 [ +0.003802] ? srso_return_thunk+0x5/0x5f [ +0.004096] amdgpu_cs_wait_ioctl+0xf6/0x270 [amdgpu] [ +0.009355] ? __pfx_ ---truncated---
[]
null
5.5
null
null
GHSA-ccrm-vrwc-4795
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
null
null
null
null
CVE-2022-44455
The appspawn and nwebspawn services were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation.
The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash.
[ "cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*", "cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*" ]
null
6.8
null
null
CVE-2015-8070
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-wwm3-cpmm-rjmw
Multiple cross-site scripting (XSS) vulnerabilities in jce.php in the JCE Admin Component in Ryan Demmer Joomla Content Editor (JCE) 1.1.0 beta 2 and earlier for Joomla! (com_jce) allow remote attackers to inject arbitrary web script or HTML via the (1) img, (2) title, (3) w, or (4) h parameter, different vectors than CVE-2006-6166. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
CVE-2025-31537
WordPress Bulk NoIndex & NoFollow Toolkit plugin <= 2.16 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in madfishdigital Bulk NoIndex & NoFollow Toolkit allows Reflected XSS. This issue affects Bulk NoIndex & NoFollow Toolkit: from n/a through 2.16.
[]
null
7.1
null
null
CVE-2017-6590
An issue was discovered in network-manager-applet (aka network-manager-gnome) in Ubuntu 12.04 LTS, 14.04 LTS, 16.04 LTS, and 16.10. A local attacker could use this issue at the default Ubuntu login screen to access local files and execute arbitrary commands as the lightdm user. The exploitation requires physical access to the locked computer and the Wi-Fi must be turned on. An access point that lets you use a certificate to login is required as well, but it's easy to create one. Then, it's possible to open a nautilus window and browse directories. One also can open some applications such as Firefox, which is useful for downloading malicious binaries.
[ "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*" ]
null
null
6.3
6.9
GHSA-mccq-3m7h-fjxg
Roundup Cross-site Scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in the history display in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via a username, related to generating a link.
[]
5.3
null
null
null
CVE-2022-2273
Simple Membership < 4.1.3 - Membership Privilege Escalation
The Simple Membership WordPress plugin before 4.1.3 does not properly validate the membership_level parameter when editing a profile, allowing members to escalate to a higher membership level by using a crafted POST request.
[ "cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
CVE-2022-50014
mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW
In the Linux kernel, the following vulnerability has been resolved: mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW Ever since the Dirty COW (CVE-2016-5195) security issue happened, we know that FOLL_FORCE can be possibly dangerous, especially if there are races that can be exploited by user space. Right now, it would be sufficient to have some code that sets a PTE of a R/O-mapped shared page dirty, in order for it to erroneously become writable by FOLL_FORCE. The implications of setting a write-protected PTE dirty might not be immediately obvious to everyone. And in fact ever since commit 9ae0f87d009c ("mm/shmem: unconditionally set pte dirty in mfill_atomic_install_pte"), we can use UFFDIO_CONTINUE to map a shmem page R/O while marking the pte dirty. This can be used by unprivileged user space to modify tmpfs/shmem file content even if the user does not have write permissions to the file, and to bypass memfd write sealing -- Dirty COW restricted to tmpfs/shmem (CVE-2022-2590). To fix such security issues for good, the insight is that we really only need that fancy retry logic (FOLL_COW) for COW mappings that are not writable (!VM_WRITE). And in a COW mapping, we really only broke COW if we have an exclusive anonymous page mapped. If we have something else mapped, or the mapped anonymous page might be shared (!PageAnonExclusive), we have to trigger a write fault to break COW. If we don't find an exclusive anonymous page when we retry, we have to trigger COW breaking once again because something intervened. Let's move away from this mandatory-retry + dirty handling and rely on our PageAnonExclusive() flag for making a similar decision, to use the same COW logic as in other kernel parts here as well. In case we stumble over a PTE in a COW mapping that does not map an exclusive anonymous page, COW was not properly broken and we have to trigger a fake write-fault to break COW. Just like we do in can_change_pte_writable() added via commit 64fe24a3e05e ("mm/mprotect: try avoiding write faults for exclusive anonymous pages when changing protection") and commit 76aefad628aa ("mm/mprotect: fix soft-dirty check in can_change_pte_writable()"), take care of softdirty and uffd-wp manually. For example, a write() via /proc/self/mem to a uffd-wp-protected range has to fail instead of silently granting write access and bypassing the userspace fault handler. Note that FOLL_FORCE is not only used for debug access, but also triggered by applications without debug intentions, for example, when pinning pages via RDMA. This fixes CVE-2022-2590. Note that only x86_64 and aarch64 are affected, because only those support CONFIG_HAVE_ARCH_USERFAULTFD_MINOR. Fortunately, FOLL_COW is no longer required to handle FOLL_FORCE. So let's just get rid of it. Thanks to Nadav Amit for pointing out that the pte_dirty() check in FOLL_FORCE code is problematic and might be exploitable. Note 1: We don't check for the PTE being dirty because it doesn't matter for making a "was COWed" decision anymore, and whoever modifies the page has to set the page dirty either way. Note 2: Kernels before extended uffd-wp support and before PageAnonExclusive (< 5.19) can simply revert the problematic commit instead and be safe regarding UFFDIO_CONTINUE. A backport to v5.19 requires minor adjustments due to lack of vma_soft_dirty_enabled().
[]
null
null
null
null
CVE-2004-1268
lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.
[ "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-vg3q-rcxr-8qqv
Ubiquiti UCRM versions 2.3.0 to 2.7.7 allow an authenticated user to read arbitrary files in the local file system. Note that by default, the local file system is isolated in a docker container. Successful exploitation requires valid credentials to an account with "Edit" access to "System Customization".
[]
null
null
4.7
null
CVE-2020-3641
Integer overflow may occur if atom size is less than atom offset as there is improper validation of atom size in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, MSM8998, QCA6574AU, QCM2150, QCS405, QCS605, QM215, Rennell, SA6155P, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130
[ "cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
GHSA-wj45-2qrw-hh28
options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.
[]
null
null
null
null
GHSA-4qv6-37xq-mgq2
Concrete CMS Cross-site Scripting vulnerability
Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS v.9.2.1 allow an attacker to execute arbitrary code via a crafted script to the Header and Footer Tracking Codes of the SEO & Statistics.
[]
null
5.4
null
null
GHSA-6qcm-6865-m48v
** DISPUTED ** PHP remote file inclusion vulnerability in index.php in Thomas Pequet phpPrintAnalyzer 1.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the rep_par_rapport_racine parameter. NOTE: this issue has been disputed by third party researchers, stating that the rep_par_rapport_racine variable is initialized before use.
[]
null
null
null
null
GHSA-fmpq-jp35-g5hj
An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a SQL Sensor. When creating this sensor, the user can set the SQL message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system. They will be transmitted over the internet to the attacker's machine.
[]
null
5.4
null
null
GHSA-498h-r594-whxx
IBM Security Verify Governance, Identity Manager 10.0.1 stores sensitive information including user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 225007.
[]
null
4.4
null
null
GHSA-947q-v9mc-gqp3
A memory corruption vulnerability in Skia that can occur when using transforms to make gradients, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 51.
[]
null
null
9.8
null
CVE-2005-4389
search.cfm in CONTENS 3.0 and earlier allows remote attackers to obtain the full server path via invalid (1) submit.y, (2) bool, (3) itemsperpage, (4) submit, (5) submit.x, (6) criteria, (7) advanced, and (8) intern parameters.
[ "cpe:2.3:a:contens:contens:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:contens:contens:3.0:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-jq3q-fh3p-mc57
Stack-based buffer overflow in Mini-stream WM Downloader 3.0.0.9 allows remote attackers to execute arbitrary code via a long URI in a playlist (.m3u) file.
[]
null
null
null
null
GHSA-3gcm-3fg6-x94w
A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. This affects an unknown part of the file /admin/category.php. The manipulation of the argument state leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
GHSA-wcf6-rgr3-qr83
Order processing in SAP ERP Sales (corrected in SAP_APPL 6.0, 6.02, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18) and S4HANA Sales (corrected in S4CORE 1.0, 1.01, 1.02, 1.03, 1.04) does not execute the required authorization checks for an authenticated user, which can result in an escalation of privileges.
[]
null
null
null
null
PYSEC-2017-24
null
In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asymmetric key confusion attacks against users using the PKCS1 PEM encoded public keys, which would allow an attacker to craft JWTs from scratch.
[]
null
null
null
null
CVE-2022-21893
Remote Desktop Protocol Remote Code Execution Vulnerability
Remote Desktop Protocol Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*", "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
8
null
null
CVE-2018-4929
Adobe Experience Manager versions 6.2 and earlier have an exploitable stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2011-3325
ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.
[ "cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.16:*:*:*:*:*:*:*", "cpe:2.3:a:quagga:quagga:0.99.17:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2017-7486
PostgreSQL versions 8.4 - 9.6 are vulnerable to information leak in pg_user_mappings view which discloses foreign server passwords to any user having USAGE privilege on the associated foreign server.
[ "cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.20:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.21:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.22:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.23:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.1.24:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2018-18025
In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the EncodeImage function of coders/pict.c, which allows attackers to cause a denial of service via a crafted SVG image file.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.8-13:q16:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2009-2558
system/message.php in Admin News Tools 2.5 does not properly restrict access, which allows remote attackers to post news messages via a direct request.
[ "cpe:2.3:a:adminnewstools:admin_news_tools:2.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-m7cc-6vhg-39wr
Moodle improper access control
Moodle 2.9.x before 2.9.3 does not properly check the contact list before authorizing message transmission, which allows remote authenticated users to bypass intended access restrictions and conduct spam attacks via the messaging API.
[]
null
null
4.3
null
CVE-2022-49767
9p/trans_fd: always use O_NONBLOCK read/write
In the Linux kernel, the following vulnerability has been resolved: 9p/trans_fd: always use O_NONBLOCK read/write syzbot is reporting hung task at p9_fd_close() [1], for p9_mux_poll_stop() from p9_conn_destroy() from p9_fd_close() is failing to interrupt already started kernel_read() from p9_fd_read() from p9_read_work() and/or kernel_write() from p9_fd_write() from p9_write_work() requests. Since p9_socket_open() sets O_NONBLOCK flag, p9_mux_poll_stop() does not need to interrupt kernel_read()/kernel_write(). However, since p9_fd_open() does not set O_NONBLOCK flag, but pipe blocks unless signal is pending, p9_mux_poll_stop() needs to interrupt kernel_read()/kernel_write() when the file descriptor refers to a pipe. In other words, pipe file descriptor needs to be handled as if socket file descriptor. We somehow need to interrupt kernel_read()/kernel_write() on pipes. A minimal change, which this patch is doing, is to set O_NONBLOCK flag from p9_fd_open(), for O_NONBLOCK flag does not affect reading/writing of regular files. But this approach changes O_NONBLOCK flag on userspace- supplied file descriptors (which might break userspace programs), and O_NONBLOCK flag could be changed by userspace. It would be possible to set O_NONBLOCK flag every time p9_fd_read()/p9_fd_write() is invoked, but still remains small race window for clearing O_NONBLOCK flag. If we don't want to manipulate O_NONBLOCK flag, we might be able to surround kernel_read()/kernel_write() with set_thread_flag(TIF_SIGPENDING) and recalc_sigpending(). Since p9_read_work()/p9_write_work() works are processed by kernel threads which process global system_wq workqueue, signals could not be delivered from remote threads when p9_mux_poll_stop() from p9_conn_destroy() from p9_fd_close() is called. Therefore, calling set_thread_flag(TIF_SIGPENDING)/recalc_sigpending() every time would be needed if we count on signals for making kernel_read()/kernel_write() non-blocking. [Dominique: add comment at Christian's suggestion]
[]
null
null
null
null
CVE-2021-45452
Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.
[ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2011-1539
Unspecified vulnerability in HP Proliant Support Pack (PSP) before 8.7 allows remote attackers to obtain sensitive information via unknown vectors.
[ "cpe:2.3:a:hp:proliant_support_pack:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:proliant_support_pack:8.5:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-gmc4-hh9v-xwm4
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. The vulnerability is caused by a buffer over-read in the exif processing module for a PNG file (during XPS conversion). Invalid input leads to a computation where pointer arithmetic results in a location outside valid memory locations belonging to the buffer. An attack can be used to obtain sensitive information, such as object heap addresses, etc.
[]
null
null
8.8
null
GHSA-rp2q-vm9w-w2jm
The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.8. This is due to missing or incorrect nonce validation on the update_assistant, add_new_assistant, and delete_assistant functions. This makes it possible for unauthenticated attackers to modify assistants via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
CVE-2025-21972
net: mctp: unshare packets when reassembling
In the Linux kernel, the following vulnerability has been resolved: net: mctp: unshare packets when reassembling Ensure that the frag_list used for reassembly isn't shared with other packets. This avoids incorrect reassembly when packets are cloned, and prevents a memory leak due to circular references between fragments and their skb_shared_info. The upcoming MCTP-over-USB driver uses skb_clone which can trigger the problem - other MCTP drivers don't share SKBs. A kunit test is added to reproduce the issue.
[]
null
null
null
null
CVE-2017-18135
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile MDM9650, MDM9655, SD 450, SD 625, SD 650/52, SD 835, SD 845, SD 850, in the Wireless Data Service (WDS) module, a buffer overflow can occur.
[ "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2011-4346
Cross-site scripting (XSS) vulnerability in the web interface in Red Hat Network (RHN) Satellite 5.4.1 allows remote authenticated users to inject arbitrary web script or HTML via the Description field of the asset tag in a Custom Info page.
[ "cpe:2.3:a:redhat:satellite:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2017-6140
On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services.
[ "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*", "cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:11.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:11.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:11.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:11.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_dns:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2011-2932
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability."
[ "cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2020-18126
Multiple stored cross-site scripting (XSS) vulnerabilities in the Sections module of Indexhibit 2.1.5 allows attackers to execute arbitrary web scripts or HTML.
[ "cpe:2.3:a:indexhibit:indexhibit:2.1.5:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-1999-1209
Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges.
[ "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2024-47772
Cross-site Scripting (XSS) via chat excerpts when content security policy (CSP) disabled in Discourse
Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by sending a maliciously crafted chat message and replying to it. This issue only affects sites with CSP disabled. This problem is patched in the latest version of Discourse. All users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum. Users who do upgrade should also consider enabling a CSP as well as a proactive measure.
[ "cpe:2.3:a:discourse:discourse:-:*:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*", "cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.4.0:-:*:*:beta:*:*:*", "cpe:2.3:a:discourse:discourse:3.4.0:beta1:*:*:beta:*:*:*" ]
null
6.5
null
null
GHSA-7m29-23h6-ccwp
An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized.
[]
null
6.5
null
null
CVE-2004-1566
Cross-site scripting (XSS) vulnerability in index.php in Silent Storm Portal 2.1 and 2.2 allows remote attackers to execute arbitrary web script or HTML via the module parameter.
[ "cpe:2.3:a:silent-storm:silent-storm_portal:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:silent-storm:silent-storm_portal:2.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
RHSA-2019:1862
Red Hat Security Advisory: Red Hat OpenShift Enterprise one-month end-of-life notice
This is the one-month notification for the end of the maintenance phase for Red Hat OpenShift Enterprise 3.6 and 3.7. This notification applies only to customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and 3.7.
[ "cpe:/a:redhat:openshift:3.6::el7", "cpe:/a:redhat:openshift:3.7::el7" ]
null
null
null
null
CVE-2020-26168
The LDAP authentication method in LdapLoginModule in Hazelcast IMDG Enterprise 4.x before 4.0.3, and Jet Enterprise 4.x through 4.2, doesn't verify properly the password in some system-user-dn scenarios. As a result, users (clients/members) can be authenticated even if they provide invalid passwords.
[ "cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:hazelcast:jet:*:*:*:*:enterprise:*:*:*" ]
null
9.8
null
7.5
CVE-2019-4552
IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 are vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 165960.
[ "cpe:2.3:a:ibm:security_access_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*" ]
null
null
6.1
null
RHSA-2023:7858
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update
keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS
[ "cpe:/a:redhat:red_hat_single_sign_on:7.6.6" ]
null
7.7
null
null
GHSA-ff82-542x-8q28
Cross-site scripting (XSS) vulnerability in Drupal 5.x before 5.17 and 6.x before 6.11, as used in vbDrupal before 5.17.0, allows remote attackers to inject arbitrary web script or HTML via crafted UTF-8 byte sequences before the Content-Type meta tag, which are treated as UTF-7 by Internet Explorer 6 and 7.
[]
null
null
null
null
CVE-2023-42456
sudo-rs Session File Relative Path Traversal vulnerability
Sudo-rs, a memory safe implementation of sudo and su, allows users to not have to enter authentication at every sudo attempt, but instead only requiring authentication every once in a while in every terminal or process group. Only once a configurable timeout has passed will the user have to re-authenticate themselves. Supporting this functionality is a set of session files (timestamps) for each user, stored in `/var/run/sudo-rs/ts`. These files are named according to the username from which the sudo attempt is made (the origin user). An issue was discovered in versions prior to 0.2.1 where usernames containing the `.` and `/` characters could result in the corruption of specific files on the filesystem. As usernames are generally not limited by the characters they can contain, a username appearing to be a relative path can be constructed. For example we could add a user to the system containing the username `../../../../bin/cp`. When logged in as a user with that name, that user could run `sudo -K` to clear their session record file. The session code then constructs the path to the session file by concatenating the username to the session file storage directory, resulting in a resolved path of `/bin/cp`. The code then clears that file, resulting in the `cp` binary effectively being removed from the system. An attacker needs to be able to login as a user with a constructed username. Given that such a username is unlikely to exist on an existing system, they will also need to be able to create the users with the constructed usernames. The issue is patched in version 0.2.1 of sudo-rs. Sudo-rs now uses the uid for the user instead of their username for determining the filename. Note that an upgrade to this version will result in existing session files being ignored and users will be forced to re-authenticate. It also fully eliminates any possibility of path traversal, given that uids are always integer values. The `sudo -K` and `sudo -k` commands can run, even if a user has no sudo access. As a workaround, make sure that one's system does not contain any users with a specially crafted username. While this is the case and while untrusted users do not have the ability to create arbitrary users on the system, one should not be able to exploit this issue.
[ "cpe:2.3:a:memorysafety:sudo:*:*:*:*:*:rust:*:*" ]
null
3.1
null
null
CVE-2023-24145
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the plugin_version parameter in the setUnloadUserData function.
[ "cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2017-18782
Certain NETGEAR devices are affected by CSRF. This affects D6200 before 1.1.00.24, D7000 before 1.0.1.52, JR6150 before 1.0.1.12, JNR1010v2 before 1.1.0.44, JWNR2010v5 before 1.1.0.44, PR2000 before 1.0.0.20, R6020 before 1.0.0.26, R6050 before 1.0.1.12, R6080 before 1.0.0.26, R6120 before 1.0.0.36, R6220 before 1.1.0.60, R6700v2 before 1.2.0.12, R6800 before 1.2.0.12, R6900v2 before 1.2.0.12, WNDR3700v5 before 1.1.0.50, WNR1000v4 before 1.1.0.44, WNR2020 before 1.1.0.44, and WNR2050 before 1.1.0.44.
[ "cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jwnr2010_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jwnr2010:v5:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:pr2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:pr2000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3700:v5:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2050:-:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-mjwp-56xv-r5f3
index.php in mAlbum 0.3 and earlier allows remote attackers to obtain the installation path via an invalid gal parameter.
[]
null
null
null
null
CVE-2022-39910
Improper access control vulnerability in Samsung Pass prior to version 4.0.06.7 allow physical attackers to access data of Samsung Pass on a certain state of an unlocked device using pop-up view.
[ "cpe:2.3:a:samsung:pass:*:*:*:*:*:*:*:*" ]
null
3.9
null
null
GHSA-cjw6-jvpm-42v2
A vulnerability was found in Project Worlds Online Lawyer Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /save_user_edit_profile.php. The manipulation of the argument first_Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
CVE-2020-18451
Cross Site Scripting (XSS) vulnerability exists in DamiCMS v6.0.6 via the title parameter in the doadd function in LabelAction.class.php.
[ "cpe:2.3:a:damicms:damicms:6.0.6:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
CVE-2019-1155
Jet Database Engine Remote Code Execution Vulnerability
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
[ "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_1803:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*", "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*" ]
null
7.8
null
null
GHSA-p3g4-236j-7mqc
Google Chrome before 26.0.1410.43 does not ensure that an extension has the tabs (aka APIPermission::kTab) permission before providing a URL to this extension, which has unspecified impact and remote attack vectors.
[]
null
null
null
null
CVE-2011-2728
The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
[ "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.20:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.21:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.22:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.31:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.32:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.40:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.41:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.42:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.43:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.44:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.45:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.46:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.47:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.48:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:1.49:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.10.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.10.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.11.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.11.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.11.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.15.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.16.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.17.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.18.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:2.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-mvgc-43g2-23jm
Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
GHSA-9gx4-xhr5-rc9m
An exploitable integer overflow exists in the Joyent SmartOS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFS_ADD_ENTRIES when dealing with native file systems. An attacker can craft an input that can cause a kernel panic and potentially be leveraged into a full privilege escalation vulnerability. This vulnerability is distinct from CVE-2016-9031.
[]
null
null
8.8
null
GHSA-5886-r5hr-c2v4
A Missing Release of Memory after Effective Lifetime vulnerability in the Anti-Virus processing of Juniper Networks Junos OS on SRX Seriesallows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).On all SRX platforms with Anti-Virus enabled, if a server sends specific content in the HTTP body of a response to a client request, these packets are queued by Anti-Virus processing in Juniper Buffers (jbufs) which are never released. When these jbufs are exhausted, the device stops forwarding all transit traffic.A jbuf memory leak can be noticed from the following logs:(<node>.)<fpc> Warning: jbuf pool id <#> utilization level (<current level>%) is above <threshold>%!To recover from this issue, the affected device needs to be manually rebooted to free the leaked jbufs.This issue affects Junos OS on SRX Series:all versions before 21.2R3-S9,21.4 versions before 21.4R3-S10,22.2 versions before 22.2R3-S6,22.4 versions before 22.4R3-S6,23.2 versions before 23.2R2-S3,23.4 versions before 23.4R2-S3,24.2 versions before 24.2R2.
[]
8.7
7.5
null
null
GHSA-qhw9-qrjp-wx8q
In TG Soft Vir.IT eXplorer Lite 8.5.65, the driver file (VIRAGTLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8273E060.
[]
null
null
7.8
null
CVE-2019-5936
Directory traversal vulnerability in Cybozu Garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to obtain files without access privileges via the application 'Work Flow'.
[ "cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*" ]
null
null
5.4
5.5
GHSA-w534-6frw-3r76
Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.
[]
null
null
null
null
GHSA-rqjr-fpm9-pwx5
PowerShell Elevation of Privilege Vulnerability
[]
null
7.8
null
null
CVE-2017-3846
A vulnerability in the Client Manager Server of Cisco Workload Automation and Cisco Tidal Enterprise Scheduler could allow an unauthenticated, remote attacker to retrieve any file from the Client Manager Server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted URL to the Client Manager Server. An exploit could allow the attacker to retrieve any file from the Cisco Workload Automation or Cisco Tidal Enterprise Scheduler Client Manager Server. This vulnerability affects the following products: Cisco Tidal Enterprise Scheduler Client Manager Server releases 6.2.1.435 and later, Cisco Workload Automation Client Manager Server releases 6.3.0.116 and later. Cisco Bug IDs: CSCvc90789.
[ "cpe:2.3:a:cisco:tidal_enterprise_scheduler:6.2.1.435:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:tidal_enterprise_scheduler:6.2.1.510:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:tidal_enterprise_scheduler:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:tidal_enterprise_scheduler:6.3.0.116:*:*:*:*:*:*:*" ]
null
null
8.6
5
CVE-2020-10443
The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article-printed.php by adding a question mark (?) followed by the payload.
[ "cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
CVE-2015-3006
Junos: QFX Series: Insufficient entropy on QFX3500 and QFX3600 platforms when the system boots up
On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for some time, but immediately after boot, the entropy is very low. This issue only affects the QFX3500 and QFX3600 switches. No other Juniper Networks products or platforms are affected by this weak entropy vulnerability.
[ "cpe:2.3:o:juniper:junos:12.2x50:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.2x50:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.2x50:d41.1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.2x50:d42.1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:12.2x50:d56.1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.1x50:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.1x50:d25:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2x51:d15:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2x51:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2x51:d20.2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2x51:d21:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2x52:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:13.2x52:d5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:14.1x53:-:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-36cr-wp3c-5h2p
A stored cross-site scripting (XSS) vulnerability in the Create Power Panels (/dcim/power-panels/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
[]
null
5.4
null
null
RHSA-2024:6268
Red Hat Security Advisory: kernel-rt security update
kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: gfs2: Fix potential glock use-after-free on unmount kernel: ionic: fix use after netif_napi_del() kernel: mm/huge_memory: don&#39;t unpoison huge_zero_folio kernel: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list kernel: scsi: qedi: Fix crash while reading debugfs attribute kernel: tipc: force a dst refcount before doing decryption kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: Revert &#34;mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again&#34; kernel: mm: avoid overflows in dirty throttling logic
[ "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime" ]
null
4.4
null
null
GHSA-55qq-wp4m-g5qv
Fiserv Prologue through 2020-12-16 does not properly protect the database password. If an attacker were to gain access to the configuration file (specifically, the LogPassword attribute within appconfig.ini), they would be able to decrypt the password stored within the configuration file. This would yield cleartext credentials for the database (to gain access to financial records of customers stored within the database), and in some cases would allow remote login to the database.
[]
null
6.5
null
null
CVE-2022-43517
A vulnerability has been identified in Simcenter STAR-CCM+ (All versions < V2306). The affected application improperly assigns file permissions to installation folders. This could allow a local attacker with an unprivileged account to override or modify the service executables and subsequently gain elevated privileges.
[ "cpe:2.3:a:siemens:star-ccm\\+:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-cw89-q5w8-fv4x
Multiple cross-site scripting (XSS) vulnerabilities in Leif M. Wright's Blog 3.5 allow remote attackers to inject arbitrary web script or HTML via the (1) Referer and (2) User-Agent HTTP headers, which are stored in a log file and not sanitized when the administrator views the "Log" page, possibly using the ViewCommentsLog function.
[]
null
null
null
null
CVE-2024-21765
Electronic Delivery Check System (Doboku) Ver.18.1.0 and earlier, Electronic Delivery Check System (Dentsu) Ver.12.1.0 and earlier, Electronic Delivery Check System (Kikai) Ver.10.1.0 and earlier, and Electronic delivery item Inspection Support SystemVer.4.0.31 and earlier improperly restrict XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker.
[ "cpe:2.3:a:cals-ed:electronic_delivery_check_system:*:*:*:*:mechanical:*:*:*", "cpe:2.3:a:cals-ed:electronic_delivery_check_system:*:*:*:*:dentsu:*:*:*", "cpe:2.3:a:cals-ed:electronic_delivery_check_system:*:*:*:*:doboku:*:*:*", "cpe:2.3:a:cals-ed:electronic_delivery_item_inspection_support_system:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-x87j-cm3v-h473
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh Elementor Addons by Livemesh allows Stored XSS.This issue affects Elementor Addons by Livemesh: from n/a through 8.3.5.
[]
null
6.5
null
null
cisco-sa-lsplus-Z6AQEOjk
Cisco IOS XR Software for ASR 9000 Series Routers Lightspeed-Plus Line Cards Denial of Service Vulnerability
A vulnerability in the data plane microcode of Lightspeed-Plus line cards for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause the line card to reset. This vulnerability is due to the incorrect handling of malformed packets that are received on the Lightspeed-Plus line cards. An attacker could exploit this vulnerability by sending a crafted IPv4 or IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the Lightspeed-Plus line card to reset, resulting in a denial of service (DoS) condition for any traffic that traverses that line card. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the April 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74835"].
[]
null
8.6
null
null
CVE-2024-34831
cross-site scripting (XSS) vulnerability in Gibbon Core v26.0.00 allows an attacker to execute arbitrary code via the imageLink parameter in the library_manage_catalog_editProcess.php component.
[ "cpe:2.3:a:gibbon:core:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2000-0525
OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon.
[ "cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-4cxv-wp2w-88h7
Privatefirewall 5.0.14.2 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via kernel SSDT hooks for (1) NtOpenProcess and (2) NtOpenThread.
[]
null
null
null
null
GHSA-8mvv-3xxr-4jvf
Certain NETGEAR devices are affected by command injection by an authenticated user . This affects RAX200 before 1.0.3.106, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
[]
null
null
null
null
CVE-2022-38434
Adobe Photoshop SVG File Parsing Use-After-Free Remote Code Execution Vulnerability
Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-pjrg-f3w2-rfw3
Path traversal vulnerability in share_link in QSAN Storage Manager allows remote attackers to download arbitrary files.
[]
null
null
null
null
GHSA-9xh4-23q4-v6wr
Heap buffer overflow and undefined behavior in `FusedBatchNorm`
ImpactThe implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow:If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers:The [implementation](https://github.com/tensorflow/tensorflow/blob/57d86e0db5d1365f19adcce848dfc1bf89fdd4c7/tensorflow/core/kernels/fused_batch_norm_op.cc) fails to validate that `scale`, `offset`, `mean` and `variance` (the last two only when required) all have the same number of elements as the number of channels of `x`. This results in heap out of bounds reads when the buffers backing these tensors are indexed past their boundary.If the tensors are empty, the validation mentioned in the above paragraph would also trigger and prevent the undefined behavior.PatchesWe have patched the issue in GitHub commit [6972f9dfe325636b3db4e0bc517ee22a159365c0](https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0).The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
[]
2
2.5
null
null
GHSA-62mp-wgh2-4h5x
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0165 and CVE-2016-0167.
[]
null
null
7.8
null
RHSA-2014:1073
Red Hat Security Advisory: nss, nss-util, nss-softokn security, bug fix, and enhancement update
nss: IDNA hostname matching code does not follow RFC 6125 recommendation (MFSA 2014-45)
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
GHSA-m4vp-q257-m88x
Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below.
[]
null
8.1
null
null
GHSA-hmx7-jfhv-cvpp
An improper neutralization of input during web page generation [CWE-79] in the FortiWeb web interface 7.0.0 through 7.0.3, 6.3.0 through 6.3.21, 6.4 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow an unauthenticated and remote attacker to perform a reflected cross site scripting attack (XSS) via injecting malicious payload in log entries used to build report.
[]
null
6.1
null
null
GHSA-pc87-fj52-xq29
SQL injection vulnerability in index.cfm in Mercury CMS 4.0 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter.
[]
null
null
null
null
CVE-2002-1720
SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field.
[ "cpe:2.3:a:outfront:spooky_login:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:outfront:spooky_login:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:outfront:spooky_login:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:outfront:spooky_login:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:outfront:spooky_login:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:outfront:spooky_login:2.5:*:*:*:*:*:*:*" ]
null
null
null
7.5