id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2022-44349 | NAVBLUE S.A.S N-Ops & Crew 22.5-rc.50 is vulnerable to Cross Site Scripting (XSS). | [
"cpe:2.3:a:navblue:s.a.s_n-ops_\\&_crew:22.5:rc_.50:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-2p57-w4x5-xmvp | ReadGRAYImage in coders/gray.c in GraphicsMagick 1.3.26 has a magick/import.c ImportGrayQuantumType heap-based buffer over-read via a crafted file. | [] | null | null | 8.8 | null |
|
GHSA-vwqq-85rp-rwj6 | An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "WindowServer" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [] | null | null | 7.8 | null |
|
GHSA-mmcg-c68q-4p38 | ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) vulnerability. | [] | null | null | null | null |
|
CVE-2016-6668 | The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages. | [
"cpe:2.3:a:atlassian:confluence_server:5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:5.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.26.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.26.10:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.29.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.29.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.12:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2023-0515 | SourceCodester Online Tours & Travels Management System Parameter forget_password.php sql injection | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/forget_password.php of the component Parameter Handler. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219335. | [
"cpe:2.3:a:online_tours_\\&_travels_management_system_project:online_tours_\\&_travels_management_system:1.0:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 |
CVE-2022-31519 | The Lukasavicus/WindMill repository through 1.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [
"cpe:2.3:a:windmill_project:windmill:1.0:*:*:*:*:*:*:*"
] | null | 9.3 | null | 6.4 |
|
GHSA-55p4-97hq-wgm9 | On the RICOH Aficio MP 305+ printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi. | [] | null | null | 6.1 | null |
|
GHSA-fr3q-v98q-fwq5 | In the Linux kernel, the following vulnerability has been resolved:drm/sched: fix null-ptr-deref in init entityThe bug can be triggered by sending an amdgpu_cs_wait_ioctl
to the AMDGPU DRM driver on any ASICs with valid context.
The bug was reported by Joonkyo Jung <[email protected]>.
For example the following code:The ioctl AMDGPU_WAIT_CS without previously submitted job could be assumed that
the error should be returned, but the following commit 1decbf6bb0b4dc56c9da6c5e57b994ebfc2be3aa
modified the logic and allowed to have sched_rq equal to NULL.As a result when there is no job the ioctl AMDGPU_WAIT_CS returns success.
The change fixes null-ptr-deref in init entity and the stack below demonstrates
the error condition:[ +0.000007] BUG: kernel NULL pointer dereference, address: 0000000000000028
[ +0.007086] #PF: supervisor read access in kernel mode
[ +0.005234] #PF: error_code(0x0000) - not-present page
[ +0.005232] PGD 0 P4D 0
[ +0.002501] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
[ +0.005034] CPU: 10 PID: 9229 Comm: amd_basic Tainted: G B W L 6.7.0+ #4
[ +0.007797] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[ +0.009798] RIP: 0010:drm_sched_entity_init+0x2d3/0x420 [gpu_sched]
[ +0.006426] Code: 80 00 00 00 00 00 00 00 e8 1a 81 82 e0 49 89 9c 24 c0 00 00 00 4c 89 ef e8 4a 80 82 e0 49 8b 5d 00 48 8d 7b 28 e8 3d 80 82 e0 <48> 83 7b 28 00 0f 84 28 01 00 00 4d 8d ac 24 98 00 00 00 49 8d 5c
[ +0.019094] RSP: 0018:ffffc90014c1fa40 EFLAGS: 00010282
[ +0.005237] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff8113f3fa
[ +0.007326] RDX: fffffbfff0a7889d RSI: 0000000000000008 RDI: ffffffff853c44e0
[ +0.007264] RBP: ffffc90014c1fa80 R08: 0000000000000001 R09: fffffbfff0a7889c
[ +0.007266] R10: ffffffff853c44e7 R11: 0000000000000001 R12: ffff8881a719b010
[ +0.007263] R13: ffff88810d412748 R14: 0000000000000002 R15: 0000000000000000
[ +0.007264] FS: 00007ffff7045540(0000) GS:ffff8883cc900000(0000) knlGS:0000000000000000
[ +0.008236] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ +0.005851] CR2: 0000000000000028 CR3: 000000011912e000 CR4: 0000000000350ef0
[ +0.007175] Call Trace:
[ +0.002561] <TASK>
[ +0.002141] ? show_regs+0x6a/0x80
[ +0.003473] ? __die+0x25/0x70
[ +0.003124] ? page_fault_oops+0x214/0x720
[ +0.004179] ? preempt_count_sub+0x18/0xc0
[ +0.004093] ? __pfx_page_fault_oops+0x10/0x10
[ +0.004590] ? srso_return_thunk+0x5/0x5f
[ +0.004000] ? vprintk_default+0x1d/0x30
[ +0.004063] ? srso_return_thunk+0x5/0x5f
[ +0.004087] ? vprintk+0x5c/0x90
[ +0.003296] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched]
[ +0.005807] ? srso_return_thunk+0x5/0x5f
[ +0.004090] ? _printk+0xb3/0xe0
[ +0.003293] ? __pfx__printk+0x10/0x10
[ +0.003735] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[ +0.005482] ? do_user_addr_fault+0x345/0x770
[ +0.004361] ? exc_page_fault+0x64/0xf0
[ +0.003972] ? asm_exc_page_fault+0x27/0x30
[ +0.004271] ? add_taint+0x2a/0xa0
[ +0.003476] ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched]
[ +0.005812] amdgpu_ctx_get_entity+0x3f9/0x770 [amdgpu]
[ +0.009530] ? finish_task_switch.isra.0+0x129/0x470
[ +0.005068] ? __pfx_amdgpu_ctx_get_entity+0x10/0x10 [amdgpu]
[ +0.010063] ? __kasan_check_write+0x14/0x20
[ +0.004356] ? srso_return_thunk+0x5/0x5f
[ +0.004001] ? mutex_unlock+0x81/0xd0
[ +0.003802] ? srso_return_thunk+0x5/0x5f
[ +0.004096] amdgpu_cs_wait_ioctl+0xf6/0x270 [amdgpu]
[ +0.009355] ? __pfx_
---truncated--- | [] | null | 5.5 | null | null |
|
GHSA-ccrm-vrwc-4795 | Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . | [] | null | null | null | null |
|
CVE-2022-44455 | The appspawn and nwebspawn services were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. | The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash. | [
"cpe:2.3:a:openharmony:openharmony:*:*:*:*:*:*:*:*",
"cpe:2.3:o:openatom:openharmony:*:*:*:*:lts:*:*:*"
] | null | 6.8 | null | null |
CVE-2015-8070 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-wwm3-cpmm-rjmw | Multiple cross-site scripting (XSS) vulnerabilities in jce.php in the JCE Admin Component in Ryan Demmer Joomla Content Editor (JCE) 1.1.0 beta 2 and earlier for Joomla! (com_jce) allow remote attackers to inject arbitrary web script or HTML via the (1) img, (2) title, (3) w, or (4) h parameter, different vectors than CVE-2006-6166. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
CVE-2025-31537 | WordPress Bulk NoIndex & NoFollow Toolkit plugin <= 2.16 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in madfishdigital Bulk NoIndex & NoFollow Toolkit allows Reflected XSS. This issue affects Bulk NoIndex & NoFollow Toolkit: from n/a through 2.16. | [] | null | 7.1 | null | null |
CVE-2017-6590 | An issue was discovered in network-manager-applet (aka network-manager-gnome) in Ubuntu 12.04 LTS, 14.04 LTS, 16.04 LTS, and 16.10. A local attacker could use this issue at the default Ubuntu login screen to access local files and execute arbitrary commands as the lightdm user. The exploitation requires physical access to the locked computer and the Wi-Fi must be turned on. An access point that lets you use a certificate to login is required as well, but it's easy to create one. Then, it's possible to open a nautilus window and browse directories. One also can open some applications such as Firefox, which is useful for downloading malicious binaries. | [
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*"
] | null | null | 6.3 | 6.9 |
|
GHSA-mccq-3m7h-fjxg | Roundup Cross-site Scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in the history display in Roundup before 1.4.20 allows remote attackers to inject arbitrary web script or HTML via a username, related to generating a link. | [] | 5.3 | null | null | null |
CVE-2022-2273 | Simple Membership < 4.1.3 - Membership Privilege Escalation | The Simple Membership WordPress plugin before 4.1.3 does not properly validate the membership_level parameter when editing a profile, allowing members to escalate to a higher membership level by using a crafted POST request. | [
"cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
CVE-2022-50014 | mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW | In the Linux kernel, the following vulnerability has been resolved:
mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW
Ever since the Dirty COW (CVE-2016-5195) security issue happened, we know
that FOLL_FORCE can be possibly dangerous, especially if there are races
that can be exploited by user space.
Right now, it would be sufficient to have some code that sets a PTE of a
R/O-mapped shared page dirty, in order for it to erroneously become
writable by FOLL_FORCE. The implications of setting a write-protected PTE
dirty might not be immediately obvious to everyone.
And in fact ever since commit 9ae0f87d009c ("mm/shmem: unconditionally set
pte dirty in mfill_atomic_install_pte"), we can use UFFDIO_CONTINUE to map
a shmem page R/O while marking the pte dirty. This can be used by
unprivileged user space to modify tmpfs/shmem file content even if the
user does not have write permissions to the file, and to bypass memfd
write sealing -- Dirty COW restricted to tmpfs/shmem (CVE-2022-2590).
To fix such security issues for good, the insight is that we really only
need that fancy retry logic (FOLL_COW) for COW mappings that are not
writable (!VM_WRITE). And in a COW mapping, we really only broke COW if
we have an exclusive anonymous page mapped. If we have something else
mapped, or the mapped anonymous page might be shared (!PageAnonExclusive),
we have to trigger a write fault to break COW. If we don't find an
exclusive anonymous page when we retry, we have to trigger COW breaking
once again because something intervened.
Let's move away from this mandatory-retry + dirty handling and rely on our
PageAnonExclusive() flag for making a similar decision, to use the same
COW logic as in other kernel parts here as well. In case we stumble over
a PTE in a COW mapping that does not map an exclusive anonymous page, COW
was not properly broken and we have to trigger a fake write-fault to break
COW.
Just like we do in can_change_pte_writable() added via commit 64fe24a3e05e
("mm/mprotect: try avoiding write faults for exclusive anonymous pages
when changing protection") and commit 76aefad628aa ("mm/mprotect: fix
soft-dirty check in can_change_pte_writable()"), take care of softdirty
and uffd-wp manually.
For example, a write() via /proc/self/mem to a uffd-wp-protected range has
to fail instead of silently granting write access and bypassing the
userspace fault handler. Note that FOLL_FORCE is not only used for debug
access, but also triggered by applications without debug intentions, for
example, when pinning pages via RDMA.
This fixes CVE-2022-2590. Note that only x86_64 and aarch64 are
affected, because only those support CONFIG_HAVE_ARCH_USERFAULTFD_MINOR.
Fortunately, FOLL_COW is no longer required to handle FOLL_FORCE. So
let's just get rid of it.
Thanks to Nadav Amit for pointing out that the pte_dirty() check in
FOLL_FORCE code is problematic and might be exploitable.
Note 1: We don't check for the PTE being dirty because it doesn't matter
for making a "was COWed" decision anymore, and whoever modifies the
page has to set the page dirty either way.
Note 2: Kernels before extended uffd-wp support and before
PageAnonExclusive (< 5.19) can simply revert the problematic
commit instead and be safe regarding UFFDIO_CONTINUE. A backport to
v5.19 requires minor adjustments due to lack of
vma_soft_dirty_enabled(). | [] | null | null | null | null |
CVE-2004-1268 | lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors. | [
"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-vg3q-rcxr-8qqv | Ubiquiti UCRM versions 2.3.0 to 2.7.7 allow an authenticated user to read arbitrary files in the local file system. Note that by default, the local file system is isolated in a docker container. Successful exploitation requires valid credentials to an account with "Edit" access to "System Customization". | [] | null | null | 4.7 | null |
|
CVE-2020-3641 | Integer overflow may occur if atom size is less than atom offset as there is improper validation of atom size in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, MSM8998, QCA6574AU, QCM2150, QCS405, QCS605, QM215, Rennell, SA6155P, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130 | [
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
GHSA-wj45-2qrw-hh28 | options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files. | [] | null | null | null | null |
|
GHSA-4qv6-37xq-mgq2 | Concrete CMS Cross-site Scripting vulnerability | Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CMS v.9.2.1 allow an attacker to execute arbitrary code via a crafted script to the Header and Footer Tracking Codes of the SEO & Statistics. | [] | null | 5.4 | null | null |
GHSA-6qcm-6865-m48v | ** DISPUTED ** PHP remote file inclusion vulnerability in index.php in Thomas Pequet phpPrintAnalyzer 1.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the rep_par_rapport_racine parameter. NOTE: this issue has been disputed by third party researchers, stating that the rep_par_rapport_racine variable is initialized before use. | [] | null | null | null | null |
|
GHSA-fmpq-jp35-g5hj | An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760 x64. To exploit the vulnerability, a authenticated user can create a SQL Sensor. When creating this sensor, the user can set the SQL message that should be sent from the PRTG device. This input parameter contains a path traversal vulnerability that allows an attacker to choose arbitrary files from the system. They will be transmitted over the internet to the attacker's machine. | [] | null | 5.4 | null | null |
|
GHSA-498h-r594-whxx | IBM Security Verify Governance, Identity Manager 10.0.1 stores sensitive information including user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 225007. | [] | null | 4.4 | null | null |
|
GHSA-947q-v9mc-gqp3 | A memory corruption vulnerability in Skia that can occur when using transforms to make gradients, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 51. | [] | null | null | 9.8 | null |
|
CVE-2005-4389 | search.cfm in CONTENS 3.0 and earlier allows remote attackers to obtain the full server path via invalid (1) submit.y, (2) bool, (3) itemsperpage, (4) submit, (5) submit.x, (6) criteria, (7) advanced, and (8) intern parameters. | [
"cpe:2.3:a:contens:contens:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:contens:contens:3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jq3q-fh3p-mc57 | Stack-based buffer overflow in Mini-stream WM Downloader 3.0.0.9 allows remote attackers to execute arbitrary code via a long URI in a playlist (.m3u) file. | [] | null | null | null | null |
|
GHSA-3gcm-3fg6-x94w | A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. This affects an unknown part of the file /admin/category.php. The manipulation of the argument state leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
GHSA-wcf6-rgr3-qr83 | Order processing in SAP ERP Sales (corrected in SAP_APPL 6.0, 6.02, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18) and S4HANA Sales (corrected in S4CORE 1.0, 1.01, 1.02, 1.03, 1.04) does not execute the required authorization checks for an authenticated user, which can result in an escalation of privileges. | [] | null | null | null | null |
|
PYSEC-2017-24 | null | In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asymmetric key confusion attacks against users using the PKCS1 PEM encoded public keys, which would allow an attacker to craft JWTs from scratch. | [] | null | null | null | null |
CVE-2022-21893 | Remote Desktop Protocol Remote Code Execution Vulnerability | Remote Desktop Protocol Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 8 | null | null |
CVE-2018-4929 | Adobe Experience Manager versions 6.2 and earlier have an exploitable stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2011-3325 | ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet. | [
"cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.16:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.17:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2017-7486 | PostgreSQL versions 8.4 - 9.6 are vulnerable to information leak in pg_user_mappings view which discloses foreign server passwords to any user having USAGE privilege on the associated foreign server. | [
"cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2018-18025 | In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the EncodeImage function of coders/pict.c, which allows attackers to cause a denial of service via a crafted SVG image file. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.8-13:q16:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2009-2558 | system/message.php in Admin News Tools 2.5 does not properly restrict access, which allows remote attackers to post news messages via a direct request. | [
"cpe:2.3:a:adminnewstools:admin_news_tools:2.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-m7cc-6vhg-39wr | Moodle improper access control | Moodle 2.9.x before 2.9.3 does not properly check the contact list before authorizing message transmission, which allows remote authenticated users to bypass intended access restrictions and conduct spam attacks via the messaging API. | [] | null | null | 4.3 | null |
CVE-2022-49767 | 9p/trans_fd: always use O_NONBLOCK read/write | In the Linux kernel, the following vulnerability has been resolved:
9p/trans_fd: always use O_NONBLOCK read/write
syzbot is reporting hung task at p9_fd_close() [1], for p9_mux_poll_stop()
from p9_conn_destroy() from p9_fd_close() is failing to interrupt already
started kernel_read() from p9_fd_read() from p9_read_work() and/or
kernel_write() from p9_fd_write() from p9_write_work() requests.
Since p9_socket_open() sets O_NONBLOCK flag, p9_mux_poll_stop() does not
need to interrupt kernel_read()/kernel_write(). However, since p9_fd_open()
does not set O_NONBLOCK flag, but pipe blocks unless signal is pending,
p9_mux_poll_stop() needs to interrupt kernel_read()/kernel_write() when
the file descriptor refers to a pipe. In other words, pipe file descriptor
needs to be handled as if socket file descriptor.
We somehow need to interrupt kernel_read()/kernel_write() on pipes.
A minimal change, which this patch is doing, is to set O_NONBLOCK flag
from p9_fd_open(), for O_NONBLOCK flag does not affect reading/writing
of regular files. But this approach changes O_NONBLOCK flag on userspace-
supplied file descriptors (which might break userspace programs), and
O_NONBLOCK flag could be changed by userspace. It would be possible to set
O_NONBLOCK flag every time p9_fd_read()/p9_fd_write() is invoked, but still
remains small race window for clearing O_NONBLOCK flag.
If we don't want to manipulate O_NONBLOCK flag, we might be able to
surround kernel_read()/kernel_write() with set_thread_flag(TIF_SIGPENDING)
and recalc_sigpending(). Since p9_read_work()/p9_write_work() works are
processed by kernel threads which process global system_wq workqueue,
signals could not be delivered from remote threads when p9_mux_poll_stop()
from p9_conn_destroy() from p9_fd_close() is called. Therefore, calling
set_thread_flag(TIF_SIGPENDING)/recalc_sigpending() every time would be
needed if we count on signals for making kernel_read()/kernel_write()
non-blocking.
[Dominique: add comment at Christian's suggestion] | [] | null | null | null | null |
CVE-2021-45452 | Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it. | [
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2011-1539 | Unspecified vulnerability in HP Proliant Support Pack (PSP) before 8.7 allows remote attackers to obtain sensitive information via unknown vectors. | [
"cpe:2.3:a:hp:proliant_support_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:proliant_support_pack:8.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-gmc4-hh9v-xwm4 | An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. The vulnerability is caused by a buffer over-read in the exif processing module for a PNG file (during XPS conversion). Invalid input leads to a computation where pointer arithmetic results in a location outside valid memory locations belonging to the buffer. An attack can be used to obtain sensitive information, such as object heap addresses, etc. | [] | null | null | 8.8 | null |
|
GHSA-rp2q-vm9w-w2jm | The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.8. This is due to missing or incorrect nonce validation on the update_assistant, add_new_assistant, and delete_assistant functions. This makes it possible for unauthenticated attackers to modify assistants via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 4.3 | null | null |
|
CVE-2025-21972 | net: mctp: unshare packets when reassembling | In the Linux kernel, the following vulnerability has been resolved:
net: mctp: unshare packets when reassembling
Ensure that the frag_list used for reassembly isn't shared with other
packets. This avoids incorrect reassembly when packets are cloned, and
prevents a memory leak due to circular references between fragments and
their skb_shared_info.
The upcoming MCTP-over-USB driver uses skb_clone which can trigger the
problem - other MCTP drivers don't share SKBs.
A kunit test is added to reproduce the issue. | [] | null | null | null | null |
CVE-2017-18135 | In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile MDM9650, MDM9655, SD 450, SD 625, SD 650/52, SD 835, SD 845, SD 850, in the Wireless Data Service (WDS) module, a buffer overflow can occur. | [
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2011-4346 | Cross-site scripting (XSS) vulnerability in the web interface in Red Hat Network (RHN) Satellite 5.4.1 allows remote authenticated users to inject arbitrary web script or HTML via the Description field of the asset tag in a Custom Info page. | [
"cpe:2.3:a:redhat:satellite:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2017-6140 | On the BIG-IP 2000s, 2200s, 4000s, 4200v, i5600, i5800, i7600, i7800, i10600,i10800, and VIPRION 4450 blades, running version 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.5.4, 11.6.0, 11.6.1, 12.0.0, 12.1.0, 12.1.1 or 12.1.2 of BIG-IP LTM, AAM, AFM, Analytics, ASM, DNS, GTM or PEM, an undisclosed sequence of packets sent to Virtual Servers with client or server SSL profiles may cause disruption of data plane services. | [
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_2000s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_2200s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_4000s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_4200v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_i10600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_i10800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_i5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_i5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_i7600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:big-ip_i7800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:f5:viprion_4450_blades:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_dns:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2011-2932 | Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability." | [
"cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2020-18126 | Multiple stored cross-site scripting (XSS) vulnerabilities in the Sections module of Indexhibit 2.1.5 allows attackers to execute arbitrary web scripts or HTML. | [
"cpe:2.3:a:indexhibit:indexhibit:2.1.5:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-1999-1209 | Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges. | [
"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2024-47772 | Cross-site Scripting (XSS) via chat excerpts when content security policy (CSP) disabled in Discourse | Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by sending a maliciously crafted chat message and replying to it. This issue only affects sites with CSP disabled. This problem is patched in the latest version of Discourse. All users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum. Users who do upgrade should also consider enabling a CSP as well as a proactive measure. | [
"cpe:2.3:a:discourse:discourse:-:*:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:*:*:*:*:stable:*:*:*",
"cpe:2.3:a:discourse:discourse:*:*:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.4.0:-:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.4.0:beta1:*:*:beta:*:*:*"
] | null | 6.5 | null | null |
GHSA-7m29-23h6-ccwp | An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized. | [] | null | 6.5 | null | null |
|
CVE-2004-1566 | Cross-site scripting (XSS) vulnerability in index.php in Silent Storm Portal 2.1 and 2.2 allows remote attackers to execute arbitrary web script or HTML via the module parameter. | [
"cpe:2.3:a:silent-storm:silent-storm_portal:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:silent-storm:silent-storm_portal:2.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2019:1862 | Red Hat Security Advisory: Red Hat OpenShift Enterprise one-month end-of-life notice | This is the one-month notification for the end of the maintenance phase for Red Hat OpenShift Enterprise 3.6 and 3.7. This notification applies only to customers with subscriptions for Red Hat OpenShift Enterprise 3.6 and 3.7. | [
"cpe:/a:redhat:openshift:3.6::el7",
"cpe:/a:redhat:openshift:3.7::el7"
] | null | null | null | null |
CVE-2020-26168 | The LDAP authentication method in LdapLoginModule in Hazelcast IMDG Enterprise 4.x before 4.0.3, and Jet Enterprise 4.x through 4.2, doesn't verify properly the password in some system-user-dn scenarios. As a result, users (clients/members) can be authenticated even if they provide invalid passwords. | [
"cpe:2.3:a:hazelcast:hazelcast:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:hazelcast:jet:*:*:*:*:enterprise:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2019-4552 | IBM Security Access Manager 9.0.7 and IBM Security Verify Access 10.0.0 are vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 165960. | [
"cpe:2.3:a:ibm:security_access_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
RHSA-2023:7858 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update | keycloak: reflected XSS via wildcard in OIDC redirect_uri keycloak: redirect_uri validation bypass keycloak: offline session token DoS | [
"cpe:/a:redhat:red_hat_single_sign_on:7.6.6"
] | null | 7.7 | null | null |
GHSA-ff82-542x-8q28 | Cross-site scripting (XSS) vulnerability in Drupal 5.x before 5.17 and 6.x before 6.11, as used in vbDrupal before 5.17.0, allows remote attackers to inject arbitrary web script or HTML via crafted UTF-8 byte sequences before the Content-Type meta tag, which are treated as UTF-7 by Internet Explorer 6 and 7. | [] | null | null | null | null |
|
CVE-2023-42456 | sudo-rs Session File Relative Path Traversal vulnerability | Sudo-rs, a memory safe implementation of sudo and su, allows users to not have to enter authentication at every sudo attempt, but instead only requiring authentication every once in a while in every terminal or process group. Only once a configurable timeout has passed will the user have to re-authenticate themselves. Supporting this functionality is a set of session files (timestamps) for each user, stored in `/var/run/sudo-rs/ts`. These files are named according to the username from which the sudo attempt is made (the origin user).
An issue was discovered in versions prior to 0.2.1 where usernames containing the `.` and `/` characters could result in the corruption of specific files on the filesystem. As usernames are generally not limited by the characters they can contain, a username appearing to be a relative path can be constructed. For example we could add a user to the system containing the username `../../../../bin/cp`. When logged in as a user with that name, that user could run `sudo -K` to clear their session record file. The session code then constructs the path to the session file by concatenating the username to the session file storage directory, resulting in a resolved path of `/bin/cp`. The code then clears that file, resulting in the `cp` binary effectively being removed from the system.
An attacker needs to be able to login as a user with a constructed username. Given that such a username is unlikely to exist on an existing system, they will also need to be able to create the users with the constructed usernames.
The issue is patched in version 0.2.1 of sudo-rs. Sudo-rs now uses the uid for the user instead of their username for determining the filename. Note that an upgrade to this version will result in existing session files being ignored and users will be forced to re-authenticate. It also fully eliminates any possibility of path traversal, given that uids are always integer values.
The `sudo -K` and `sudo -k` commands can run, even if a user has no sudo access. As a workaround, make sure that one's system does not contain any users with a specially crafted username. While this is the case and while untrusted users do not have the ability to create arbitrary users on the system, one should not be able to exploit this issue. | [
"cpe:2.3:a:memorysafety:sudo:*:*:*:*:*:rust:*:*"
] | null | 3.1 | null | null |
CVE-2023-24145 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the plugin_version parameter in the setUnloadUserData function. | [
"cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2017-18782 | Certain NETGEAR devices are affected by CSRF. This affects D6200 before 1.1.00.24, D7000 before 1.0.1.52, JR6150 before 1.0.1.12, JNR1010v2 before 1.1.0.44, JWNR2010v5 before 1.1.0.44, PR2000 before 1.0.0.20, R6020 before 1.0.0.26, R6050 before 1.0.1.12, R6080 before 1.0.0.26, R6120 before 1.0.0.36, R6220 before 1.1.0.60, R6700v2 before 1.2.0.12, R6800 before 1.2.0.12, R6900v2 before 1.2.0.12, WNDR3700v5 before 1.1.0.50, WNR1000v4 before 1.1.0.44, WNR2020 before 1.1.0.44, and WNR2050 before 1.1.0.44. | [
"cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jnr1010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jnr1010:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:jwnr2010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:jwnr2010:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:pr2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:pr2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6900:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v5:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr1000:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wnr2050_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wnr2050:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
GHSA-mjwp-56xv-r5f3 | index.php in mAlbum 0.3 and earlier allows remote attackers to obtain the installation path via an invalid gal parameter. | [] | null | null | null | null |
|
CVE-2022-39910 | Improper access control vulnerability in Samsung Pass prior to version 4.0.06.7 allow physical attackers to access data of Samsung Pass on a certain state of an unlocked device using pop-up view. | [
"cpe:2.3:a:samsung:pass:*:*:*:*:*:*:*:*"
] | null | 3.9 | null | null |
|
GHSA-cjw6-jvpm-42v2 | A vulnerability was found in Project Worlds Online Lawyer Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /save_user_edit_profile.php. The manipulation of the argument first_Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
CVE-2020-18451 | Cross Site Scripting (XSS) vulnerability exists in DamiCMS v6.0.6 via the title parameter in the doadd function in LabelAction.class.php. | [
"cpe:2.3:a:damicms:damicms:6.0.6:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
CVE-2019-1155 | Jet Database Engine Remote Code Execution Vulnerability | A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.
An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.
The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
| [
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_1803:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x86:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:x64:*"
] | null | 7.8 | null | null |
GHSA-p3g4-236j-7mqc | Google Chrome before 26.0.1410.43 does not ensure that an extension has the tabs (aka APIPermission::kTab) permission before providing a URL to this extension, which has unspecified impact and remote attack vectors. | [] | null | null | null | null |
|
CVE-2011-2728 | The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference. | [
"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.32:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.43:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.46:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.47:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.48:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:1.49:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:2.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.10.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.12.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.4:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.5:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.6:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.7:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.8:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.9:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.10:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.13.11:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:perl:perl:5.14.0:rc3:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-mvgc-43g2-23jm | Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null |
|
GHSA-9gx4-xhr5-rc9m | An exploitable integer overflow exists in the Joyent SmartOS 20161110T013148Z Hyprlofs file system. The vulnerability is present in the Ioctl system call with the command HYPRLOFS_ADD_ENTRIES when dealing with native file systems. An attacker can craft an input that can cause a kernel panic and potentially be leveraged into a full privilege escalation vulnerability. This vulnerability is distinct from CVE-2016-9031. | [] | null | null | 8.8 | null |
|
GHSA-5886-r5hr-c2v4 | A Missing Release of Memory after Effective Lifetime vulnerability in the Anti-Virus processing of Juniper Networks Junos OS on SRX Seriesallows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).On all SRX platforms with Anti-Virus enabled, if a server sends specific content in the HTTP body of a response to a client request, these packets are queued by Anti-Virus processing in Juniper Buffers (jbufs) which are never released. When these jbufs are exhausted, the device stops forwarding all transit traffic.A jbuf memory leak can be noticed from the following logs:(<node>.)<fpc> Warning: jbuf pool id <#> utilization level (<current level>%) is above <threshold>%!To recover from this issue, the affected device needs to be manually rebooted to free the leaked jbufs.This issue affects Junos OS on SRX Series:all versions before 21.2R3-S9,21.4 versions before 21.4R3-S10,22.2 versions before 22.2R3-S6,22.4 versions before 22.4R3-S6,23.2 versions before 23.2R2-S3,23.4 versions before 23.4R2-S3,24.2 versions before 24.2R2. | [] | 8.7 | 7.5 | null | null |
|
GHSA-qhw9-qrjp-wx8q | In TG Soft Vir.IT eXplorer Lite 8.5.65, the driver file (VIRAGTLT.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8273E060. | [] | null | null | 7.8 | null |
|
CVE-2019-5936 | Directory traversal vulnerability in Cybozu Garoon 4.0.0 to 4.10.1 allows remote authenticated attackers to obtain files without access privileges via the application 'Work Flow'. | [
"cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 5.5 |
|
GHSA-w534-6frw-3r76 | Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor. | [] | null | null | null | null |
|
GHSA-rqjr-fpm9-pwx5 | PowerShell Elevation of Privilege Vulnerability | [] | null | 7.8 | null | null |
|
CVE-2017-3846 | A vulnerability in the Client Manager Server of Cisco Workload Automation and Cisco Tidal Enterprise Scheduler could allow an unauthenticated, remote attacker to retrieve any file from the Client Manager Server. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted URL to the Client Manager Server. An exploit could allow the attacker to retrieve any file from the Cisco Workload Automation or Cisco Tidal Enterprise Scheduler Client Manager Server. This vulnerability affects the following products: Cisco Tidal Enterprise Scheduler Client Manager Server releases 6.2.1.435 and later, Cisco Workload Automation Client Manager Server releases 6.3.0.116 and later. Cisco Bug IDs: CSCvc90789. | [
"cpe:2.3:a:cisco:tidal_enterprise_scheduler:6.2.1.435:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:tidal_enterprise_scheduler:6.2.1.510:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:tidal_enterprise_scheduler:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:tidal_enterprise_scheduler:6.3.0.116:*:*:*:*:*:*:*"
] | null | null | 8.6 | 5 |
|
CVE-2020-10443 | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/report-article-printed.php by adding a question mark (?) followed by the payload. | [
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
CVE-2015-3006 | Junos: QFX Series: Insufficient entropy on QFX3500 and QFX3600 platforms when the system boots up | On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for some time, but immediately after boot, the entropy is very low. This issue only affects the QFX3500 and QFX3600 switches. No other Juniper Networks products or platforms are affected by this weak entropy vulnerability. | [
"cpe:2.3:o:juniper:junos:12.2x50:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.2x50:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.2x50:d41.1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.2x50:d42.1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:12.2x50:d56.1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.1x50:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.1x50:d25:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.2x51:d15:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.2x51:d20:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.2x51:d20.2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.2x51:d21:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.2x52:d10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:13.2x52:d5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:14.1x53:-:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx3500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:qfx3600:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-36cr-wp3c-5h2p | A stored cross-site scripting (XSS) vulnerability in the Create Power Panels (/dcim/power-panels/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | [] | null | 5.4 | null | null |
|
RHSA-2024:6268 | Red Hat Security Advisory: kernel-rt security update | kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq kernel: gfs2: Fix potential glock use-after-free on unmount kernel: ionic: fix use after netif_napi_del() kernel: mm/huge_memory: don't unpoison huge_zero_folio kernel: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list kernel: scsi: qedi: Fix crash while reading debugfs attribute kernel: tipc: force a dst refcount before doing decryption kernel: ppp: reject claimed-as-LCP but actually malformed packets kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" kernel: mm: avoid overflows in dirty throttling logic | [
"cpe:/a:redhat:rhel_eus:9.2::nfv",
"cpe:/a:redhat:rhel_eus:9.2::realtime"
] | null | 4.4 | null | null |
GHSA-55qq-wp4m-g5qv | Fiserv Prologue through 2020-12-16 does not properly protect the database password. If an attacker were to gain access to the configuration file (specifically, the LogPassword attribute within appconfig.ini), they would be able to decrypt the password stored within the configuration file. This would yield cleartext credentials for the database (to gain access to financial records of customers stored within the database), and in some cases would allow remote login to the database. | [] | null | 6.5 | null | null |
|
CVE-2022-43517 | A vulnerability has been identified in Simcenter STAR-CCM+ (All versions < V2306). The affected application improperly assigns file permissions to installation folders.
This could allow a local attacker with an unprivileged account to override or modify the service executables and subsequently gain elevated privileges. | [
"cpe:2.3:a:siemens:star-ccm\\+:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-cw89-q5w8-fv4x | Multiple cross-site scripting (XSS) vulnerabilities in Leif M. Wright's Blog 3.5 allow remote attackers to inject arbitrary web script or HTML via the (1) Referer and (2) User-Agent HTTP headers, which are stored in a log file and not sanitized when the administrator views the "Log" page, possibly using the ViewCommentsLog function. | [] | null | null | null | null |
|
CVE-2024-21765 | Electronic Delivery Check System (Doboku) Ver.18.1.0 and earlier, Electronic Delivery Check System (Dentsu) Ver.12.1.0 and earlier, Electronic Delivery Check System (Kikai) Ver.10.1.0 and earlier, and Electronic delivery item Inspection Support SystemVer.4.0.31 and earlier improperly restrict XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the system may be read by an attacker. | [
"cpe:2.3:a:cals-ed:electronic_delivery_check_system:*:*:*:*:mechanical:*:*:*",
"cpe:2.3:a:cals-ed:electronic_delivery_check_system:*:*:*:*:dentsu:*:*:*",
"cpe:2.3:a:cals-ed:electronic_delivery_check_system:*:*:*:*:doboku:*:*:*",
"cpe:2.3:a:cals-ed:electronic_delivery_item_inspection_support_system:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-x87j-cm3v-h473 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh Elementor Addons by Livemesh allows Stored XSS.This issue affects Elementor Addons by Livemesh: from n/a through 8.3.5. | [] | null | 6.5 | null | null |
|
cisco-sa-lsplus-Z6AQEOjk | Cisco IOS XR Software for ASR 9000 Series Routers Lightspeed-Plus Line Cards Denial of Service Vulnerability | A vulnerability in the data plane microcode of Lightspeed-Plus line cards for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause the line card to reset.
This vulnerability is due to the incorrect handling of malformed packets that are received on the Lightspeed-Plus line cards. An attacker could exploit this vulnerability by sending a crafted IPv4 or IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the Lightspeed-Plus line card to reset, resulting in a denial of service (DoS) condition for any traffic that traverses that line card.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the April 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74835"]. | [] | null | 8.6 | null | null |
CVE-2024-34831 | cross-site scripting (XSS) vulnerability in Gibbon Core v26.0.00 allows an attacker to execute arbitrary code via the imageLink parameter in the library_manage_catalog_editProcess.php component. | [
"cpe:2.3:a:gibbon:core:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2000-0525 | OpenSSH does not properly drop privileges when the UseLogin option is enabled, which allows local users to execute arbitrary commands by providing the command to the ssh daemon. | [
"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-4cxv-wp2w-88h7 | Privatefirewall 5.0.14.2 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via kernel SSDT hooks for (1) NtOpenProcess and (2) NtOpenThread. | [] | null | null | null | null |
|
GHSA-8mvv-3xxr-4jvf | Certain NETGEAR devices are affected by command injection by an authenticated user . This affects RAX200 before 1.0.3.106, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | [] | null | null | null | null |
|
CVE-2022-38434 | Adobe Photoshop SVG File Parsing Use-After-Free Remote Code Execution Vulnerability | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-pjrg-f3w2-rfw3 | Path traversal vulnerability in share_link in QSAN Storage Manager allows remote attackers to download arbitrary files. | [] | null | null | null | null |
|
GHSA-9xh4-23q4-v6wr | Heap buffer overflow and undefined behavior in `FusedBatchNorm` | ImpactThe implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow:If the tensors are empty, the same implementation can trigger undefined behavior by dereferencing null pointers:The [implementation](https://github.com/tensorflow/tensorflow/blob/57d86e0db5d1365f19adcce848dfc1bf89fdd4c7/tensorflow/core/kernels/fused_batch_norm_op.cc) fails to validate that `scale`, `offset`, `mean` and `variance` (the last two only when required) all have the same number of elements as the number of channels of `x`. This results in heap out of bounds reads when the buffers backing these tensors are indexed past their boundary.If the tensors are empty, the validation mentioned in the above paragraph would also trigger and prevent the undefined behavior.PatchesWe have patched the issue in GitHub commit [6972f9dfe325636b3db4e0bc517ee22a159365c0](https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0).The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team. | [] | 2 | 2.5 | null | null |
GHSA-62mp-wgh2-4h5x | The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0165 and CVE-2016-0167. | [] | null | null | 7.8 | null |
|
RHSA-2014:1073 | Red Hat Security Advisory: nss, nss-util, nss-softokn security, bug fix, and enhancement update | nss: IDNA hostname matching code does not follow RFC 6125 recommendation (MFSA 2014-45) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
GHSA-m4vp-q257-m88x | Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below. | [] | null | 8.1 | null | null |
|
GHSA-hmx7-jfhv-cvpp | An improper neutralization of input during web page generation [CWE-79] in the FortiWeb web interface 7.0.0 through 7.0.3, 6.3.0 through 6.3.21, 6.4 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow an unauthenticated and remote attacker to perform a reflected cross site scripting attack (XSS) via injecting malicious payload in log entries used to build report. | [] | null | 6.1 | null | null |
|
GHSA-pc87-fj52-xq29 | SQL injection vulnerability in index.cfm in Mercury CMS 4.0 and earlier allows remote attackers to execute arbitrary SQL commands via the page parameter. | [] | null | null | null | null |
|
CVE-2002-1720 | SQL injection vulnerability in Spooky Login 2.0 through 2.5 allows remote attackers to bypass authentication and gain privileges via the password field. | [
"cpe:2.3:a:outfront:spooky_login:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:outfront:spooky_login:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:outfront:spooky_login:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:outfront:spooky_login:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:outfront:spooky_login:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:outfront:spooky_login:2.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.