id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2019-20873
An issue was discovered in Mattermost Server before 5.9.0, 5.8.1, 5.7.3, and 4.10.8. It allows attackers to obtain sensitive information during user activation/deactivation.
[ "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:mattermost:mattermost_server:5.9.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mattermost:mattermost_server:5.9.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mattermost:mattermost_server:5.9.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mattermost:mattermost_server:5.9.0:rc4:*:*:*:*:*:*" ]
null
6.5
null
4
cisco-sa-esa-tls-dos-xW53TBhb
Cisco Email Security Appliance Denial of Service Vulnerability
A vulnerability in the Transport Layer Security (TLS) protocol implementation of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to inefficient processing of incoming TLS traffic. An attacker could exploit this vulnerability by sending a series of crafted TLS packets to an affected device. A successful exploit could allow the attacker to trigger a prolonged state of high CPU utilization. The affected device would still be operative, but response time and overall performance may be degraded. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-tls-dos-xW53TBhb ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-tls-dos-xW53TBhb"]
[]
null
5.3
null
null
CVE-2004-0666
Off-by-one error in the POP3_readmsg function in popclient 3.0b6 allows remote attackers to cause a denial of service (application crash) via an e-mail message with a certain line length, which leads to a buffer overflow.
[ "cpe:2.3:a:popclient:popclient:3.0_b6:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2005-0244
PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command.
[ "cpe:2.3:a:postgresql:postgresql:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*" ]
null
null
null
6.5
RHSA-2009:1106
Red Hat Security Advisory: kernel security and bug fix update
kernel: nfsd should drop CAP_MKNOD for non-root kernel: agp: zero pages before sending to userspace kernel: cifs: memory overwrite when saving nativeFileSystem field during mount kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server kernel: xen: local denial of service kernel: random: add robust get_random_u32, remove weak get_random_int
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-p5vm-wp92-93c6
Windows Remote Access Connection Manager Information Disclosure Vulnerability.
[]
null
5.5
null
null
GHSA-3r86-pp9h-4fh6
Ingredients Stock Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=user/manage_user&id=.
[]
null
8.8
null
null
CVE-2006-2851
Cross-site scripting (XSS) vulnerability in index.php in dotProject 2.0.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, which are not properly handled when the client is using Internet Explorer.
[ "cpe:2.3:a:dotproject:dotproject:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:dotproject:dotproject:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotproject:dotproject:2.0.2:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2022-42397
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XPS files. Crafted data in an XPS file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18279.
[ "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*" ]
null
null
3.3
null
CVE-2023-4606
An authenticated XCC user with Read-Only permission can change a different user’s password through a crafted API command.   This affects ThinkSystem v2 and v3 servers with XCC; ThinkSystem v1 servers are not affected.
[ "cpe:2.3:o:lenovo:thinkagile_hx5530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3375:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3376:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3330-f_all-flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3330-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3330-h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3330-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3331-f_all-flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3331-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3331-h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3331-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3530_f_all_flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3530_f_all_flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3530-h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3530-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3531_h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3531_h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3531-f_all-flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3531-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx2330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3530-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd630_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650-n_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd650-n_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd665_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sn550_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sn550_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr250_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr258_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr258_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr630_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr630_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr635_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr645:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr645_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr645_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr655_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr665:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr665_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr670:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr675_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr860_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr860_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st250_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st250_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st258_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st258_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st658_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st658_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st658_v3_firmware:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2007-4152
The Visionsoft Audit on Demand Service (VSAOD) in Visionsoft Audit 12.4.0.0 allows remote attackers to conduct replay attacks by capturing and resending data from the DETAILS and PROCESS sections of a session that schedules an audit.
[ "cpe:2.3:a:visionsoft:audit:12.4.0.0:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-qhc2-3cg3-6xhg
** DISPUTED ** October CMS through 1.0.428 does not prevent use of .htaccess in themes, which allows remote authenticated users to execute arbitrary PHP code by downloading a theme ZIP archive from /backend/cms/themes, and then uploading and importing a modified archive with two new files: a .php file and a .htaccess file. NOTE: the vendor says "I don't think [an attacker able to login to the system under an account that has access to manage/upload themes] is a threat model that we need to be considering."
[]
null
null
8.8
null
GHSA-fggc-gj4v-g5xq
On BIG-IP 14.0.x, 13.x, 12.x, and 11.x, Enterprise Manager 3.1.1, BIG-IQ 6.x, 5.x, and 4.x, and iWorkflow 2.x, the passphrases for SNMPv3 users and trap destinations that are used for authentication and privacy are not handled by the BIG-IP system Secure Vault feature; they are written in the clear to the various configuration files.
[]
null
null
7.5
null
CVE-2022-0808
Use after free in Chrome OS Shell in Google Chrome on Chrome OS prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in a series of user interaction to potentially exploit heap corruption via user interactions.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-w4qw-rxr9-pgfx
The Hawk Console and Hawk Agent components of TIBCO Software Inc.'s TIBCO Hawk, TIBCO Hawk Distribution for TIBCO Silver Fabric, TIBCO Operational Intelligence Hawk RedTail, and TIBCO Runtime Agent contain a vulnerability that theoretically allows an attacker with access to the Hawk Console’s and Agent’s log to obtain credentials used to access associated EMS servers. Affected releases are TIBCO Software Inc.'s TIBCO Hawk: versions 6.2.2 and below, TIBCO Hawk Distribution for TIBCO Silver Fabric: versions 6.2.2 and below, TIBCO Operational Intelligence Hawk RedTail: versions 7.2.1 and below, and TIBCO Runtime Agent: versions 5.12.2 and below.
[]
null
7.4
null
null
CVE-2023-23579
Datakit CrossCAD/Ware
Datakit CrossCadWare_x64.dll contains an out-of-bounds write past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This could allow an attacker to execute code in the context of the current process.
[ "cpe:2.3:a:datakit:crosscadware:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2009-1789
mod/server.mod/servmsg.c in Eggheads Eggdrop and Windrop 1.6.19 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PRIVMSG that causes an empty string to trigger a negative string length copy. NOTE: this issue exists because of an incorrect fix for CVE-2007-2807.
[ "cpe:2.3:a:eggheads:eggdrop:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.14:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.15:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.16:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.17:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.18:*:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop:1.6.18:rc1:*:*:*:*:*:*", "cpe:2.3:a:eggheads:eggdrop_irc_bot:*:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:*:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.4.4:*:final:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.5.4:*:final:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.5.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.5.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.5.4a:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.0:*:final:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.0:rc1-rel2:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.2\\+bindsfix:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.4:sr1:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.15:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.16:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.17:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.18:*:*:*:*:*:*:*", "cpe:2.3:a:philip_moore:windrop:1.6.19\\+ctcpfix:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2020-10225
An unauthenticated file upload vulnerability has been identified in admin/gallery.php in PHPGurukul Job Portal 1.0. The vulnerability could be exploited by an unauthenticated remote attacker to upload content to the server, including PHP files, which could result in command execution.
[ "cpe:2.3:a:phpgurukul:job_portal:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2023-43118
Cross Site Request Forgery (CSRF) vulnerability in Chalet application in Extreme Networks Switch Engine (EXOS) before 32.5.1.5, fixed in 31.7.2 and 32.5.1.5 allows attackers to run arbitrary code and cause other unspecified impacts via /jsonrpc API.
[ "cpe:2.3:o:extremenetworks:exos:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-7gmp-pxhm-rr39
In Euicc, there is a possible information disclosure due to an included test Certificate. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143232031
[]
null
null
null
null
GHSA-wqjh-wx4q-gr96
Vulnerability in the Oracle Secure Global Desktop product of Oracle Virtualization (component: Client). The supported version that is affected is 5.6. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Oracle Secure Global Desktop. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Secure Global Desktop accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Secure Global Desktop. CVSS 3.1 Base Score 4.6 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L).
[]
null
null
null
null
CVE-2015-2876
Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware before 3.4.1.105 allows remote attackers to execute arbitrary code by uploading a file to /media/sda2 during a Wi-Fi session.
[ "cpe:2.3:h:lacie:lac9000436u:*:*:*:*:*:*:*:*", "cpe:2.3:h:lacie:lac9000464u:*:*:*:*:*:*:*:*", "cpe:2.3:o:lacie:lac9000436u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:lacie:lac9000464u_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:seagate:wireless_mobile_storage:*:*:*:*:*:*:*:*", "cpe:2.3:h:seagate:wireless_plus_mobile_storage:*:*:*:*:*:*:*:*", "cpe:2.3:h:seagate:goflex_sattelite:*:*:*:*:*:*:*:*" ]
null
null
8.8
8.3
GHSA-5wgp-vjxm-3x2r
Navidrome allows SQL Injection via role parameter
🛡 **Security Advisory: SQL Injection Vulnerability in Navidrome v0.55.2****Overview**This vulnerability arises due to improper input validation on the **`role`** parameter within the API endpoint **`/api/artist`**. Attackers can exploit this flaw to inject arbitrary SQL queries, potentially gaining unauthorized access to the backend database and compromising sensitive user information.**Details****Vulnerable Component**: API endpoint → `/api/artist` Parameter → `role`**Vulnerability Type**: SQL Injection (stacked queries, UNION queries)**Database Affected**: SQLite (confirmed exploitation via SQLite-specific payloads)**Impact**: Successful exploitation allows an unauthenticated attacker to:Execute arbitrary SQL commandsExtract or manipulate sensitive data (e.g., user records, playlists)Potentially escalate privileges or disrupt service availability**Proof of Concept (PoC)****Example Exploit Command**:**Sample Payloads**:**Stacked Queries**:**UNION-Based Query**:**Example HTTP Request**:
[]
8.9
null
null
null
CVE-2025-1152
GNU Binutils ld xstrdup.c xstrdup memory leak
A vulnerability classified as problematic has been found in GNU Binutils 2.43. Affected is the function xstrdup of the file xstrdup.c of the component ld. The manipulation leads to memory leak. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
[]
2.3
3.1
3.1
2.6
GHSA-p878-qvqr-h9fp
Use after free in Bookmarks in Google Chrome prior to 102.0.5005.61 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension and specific user interaction.
[]
null
8.8
null
null
CVE-2019-0674
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2019-0672, CVE-2019-0673, CVE-2019-0675.
[ "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-qjw7-2jwf-rhcv
In btm_sec_disconnected of btm_sec.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution in the Bluetooth server with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-162497143
[]
null
null
null
null
CVE-2020-3124
Cisco Hosted Collaboration Mediation Fulfillment Cross-Site Request Forgery Vulnerability
A vulnerability in the web-based interface of Cisco Hosted Collaboration Mediation Fulfillment (HCM-F) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections by the affected software. An attacker could exploit this vulnerability by persuading a targeted user to click a malicious link. A successful exploit could allow the attacker to send arbitrary requests that could change the password of a targeted user. An attacker could then take unauthorized actions on behalf of the targeted user.
[ "cpe:2.3:a:cisco:hosted_collaboration_mediation_fulfillment:*:*:*:*:*:*:*:*" ]
null
null
6.5
null
CVE-2007-6755
The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE.
[ "cpe:2.3:a:dell:bsafe_crypto-c-micro-edition:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:bsafe_crypto-j:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:dell:bsafe_crypto-j:5.0.1:*:*:*:*:*:*:*" ]
null
null
null
5.8
GHSA-qp77-44wf-mg85
Possible buffer overflow in Ontario fingerprint code due to lack of input validation for the parameters coming into TZ from HLOS in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear in versions MDM9206, MDM9607, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820, SD 820A, SD 835, SDA660.
[]
null
null
7.8
null
CVE-2017-15112
keycloak-httpd-client-install versions before 0.8 allow users to insecurely pass password through command line, leaking it via command history and process info to other local users.
[ "cpe:2.3:a:keycloak-httpd-client-install_project:keycloak-httpd-client-install:*:*:*:*:*:*:*:*" ]
null
null
7.8
2.1
CVE-2005-3856
The Popular URL capability (popularurls.cpp) in Krusader 1.60.0 and 1.70.0-beta1 saves passwords in cleartext in the krusaderrc file when the user enters URLs containing passwords in the panel URL field, which might allow attackers to access other sites.
[ "cpe:2.3:a:krusader:krusader:1.60.0:*:*:*:*:*:*:*", "cpe:2.3:a:krusader:krusader:1.70.0_beta1:*:*:*:*:*:*:*" ]
null
null
null
4
GHSA-w8pp-x465-w792
SQL Injection vulnerability in Sourcecodester php task management system v1.0, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via crafted payload to update-admin.php.
[]
null
9.8
null
null
GHSA-h557-5h69-jf25
In the Linux kernel, the following vulnerability has been resolved:perf: Improve missing SIGTRAP checkingTo catch missing SIGTRAP we employ a WARN in __perf_event_overflow(), which fires if pending_sigtrap was already set: returning to user space without consuming pending_sigtrap, and then having the event fire again would re-enter the kernel and trigger the WARN.This, however, seemed to miss the case where some events not associated with progress in the user space task can fire and the interrupt handler runs before the IRQ work meant to consume pending_sigtrap (and generate the SIGTRAP).syzbot gifted us this stack trace:| WARNING: CPU: 0 PID: 3607 at kernel/events/core.c:9313 __perf_event_overflow | Modules linked in: | CPU: 0 PID: 3607 Comm: syz-executor100 Not tainted 6.1.0-rc2-syzkaller-00073-g88619e77b33d #0 | Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 | RIP: 0010:__perf_event_overflow+0x498/0x540 kernel/events/core.c:9313 | <...> | Call Trace: | <TASK> | perf_swevent_hrtimer+0x34f/0x3c0 kernel/events/core.c:10729 | __run_hrtimer kernel/time/hrtimer.c:1685 [inline] | __hrtimer_run_queues+0x1c6/0xfb0 kernel/time/hrtimer.c:1749 | hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811 | local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1096 [inline] | __sysvec_apic_timer_interrupt+0x17c/0x640 arch/x86/kernel/apic/apic.c:1113 | sysvec_apic_timer_interrupt+0x40/0xc0 arch/x86/kernel/apic/apic.c:1107 | asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 | <...> | </TASK>In this case, syzbot produced a program with event type PERF_TYPE_SOFTWARE and config PERF_COUNT_SW_CPU_CLOCK. The hrtimer manages to fire again before the IRQ work got a chance to run, all while never having returned to user space.Improve the WARN to check for real progress in user space: approximate this by storing a 32-bit hash of the current IP into pending_sigtrap, and if an event fires while pending_sigtrap still matches the previous IP, we assume no progress (false negatives are possible given we could return to user space and trigger again on the same IP).
[]
null
null
null
null
RHSA-2023:6849
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ Fuse 6.3 R20 HF1 security and bug fix update
activemq-openwire: OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack
[ "cpe:/a:redhat:jboss_amq:6.3" ]
null
9.8
null
null
CVE-2020-26167
In FUEL CMS 11.4.12 and before, the page preview feature allows an anonymous user to take complete ownership of any account including an administrator one.
[ "cpe:2.3:a:thedaylightstudio:fuel_cms:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2023-3520
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in it-novum/openitcockpit
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository it-novum/openitcockpit prior to 4.6.6.
[ "cpe:2.3:a:it-novum:openitcockpit:*:*:*:*:*:*:*:*" ]
null
null
4.3
null
CVE-2002-0852
Buffer overflows in Cisco Virtual Private Network (VPN) Client 3.5.4 and earlier allows remote attackers to cause a denial of service via (1) an Internet Key Exchange (IKE) with a large Security Parameter Index (SPI) payload, or (2) an IKE packet with a large number of valid payloads.
[ "cpe:2.3:a:cisco:vpn_client:3.5.1:*:linux:*:*:*:*:*", "cpe:2.3:a:cisco:vpn_client:3.5.1:*:mac_os_x:*:*:*:*:*", "cpe:2.3:a:cisco:vpn_client:3.5.1:*:solaris:*:*:*:*:*", "cpe:2.3:a:cisco:vpn_client:3.5.1:*:windows:*:*:*:*:*", "cpe:2.3:a:cisco:vpn_client:3.5.2:*:linux:*:*:*:*:*", "cpe:2.3:a:cisco:vpn_client:3.5.2:*:mac_os_x:*:*:*:*:*", "cpe:2.3:a:cisco:vpn_client:3.5.2:*:solaris:*:*:*:*:*", "cpe:2.3:a:cisco:vpn_client:3.5.2:*:windows:*:*:*:*:*" ]
null
null
null
5
CVE-2025-20187
Cisco SD-WAN Manager Software Arbitrary File Creation Vulnerability
A vulnerability in the application data endpoints of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to write arbitrary files to an affected system. This vulnerability is due to improper validation of requests to APIs. An attacker could exploit this vulnerability by sending malicious requests to an API within the affected system. A successful exploit could allow the attacker to conduct directory traversal attacks and write files to an arbitrary location on the affected system.
[]
null
6.5
null
null
CVE-2021-36689
An issue discovered in com.samourai.wallet.PinEntryActivity.java in Streetside Samourai Wallet 0.99.96i allows attackers to view sensitive information and decrypt data via a brute force attack that uses a recovered samourai.dat file. The PIN is 5 to 8 digits, which may be insufficient in this situation.
[ "cpe:2.3:a:samourai-wallet-android_project:samourai-wallet-android:0.99.96i:*:*:*:*:android:*:*" ]
null
5.5
null
null
CVE-2019-3587
DLL Search Order Hijacking vulnerability
DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.18 allows local users to execute arbitrary code via execution from a compromised folder.
[ "cpe:2.3:a:mcafee:total_protection:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.2
null
CVE-2018-19349
In SeaCMS v6.64, there is SQL injection via the admin_makehtml.php topic parameter because of mishandling in include/mkhtml.func.php.
[ "cpe:2.3:a:seacms:seacms:6.64:*:*:*:*:*:*:*" ]
null
null
7.2
6.5
CVE-2021-30319
Possible integer overflow due to improper validation of command length parameters while processing WMI command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music
[ "cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fsm10055_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fsm10055:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6175a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6175a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx12:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6225_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6225:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm6375:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2017-11211
Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability in the JPEG parser. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
GHSA-fw9w-g53w-5v3p
An Externally Controlled Format String issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. String format specifiers based on user provided input are not properly validated, which could allow an attacker to execute arbitrary code.
[]
null
null
8.8
null
GHSA-xhf4-qqf8-2pw6
Cross-site request forgery (CSRF) vulnerability in NEC Corporation UNIVERGE IX from Ver9.2 to Ver10.10.21, for Ver10.8 up to Ver10.8.27 and for Ver10.9 up to Ver10.9.14 allows a attacker to hijack the authentication of screens on the device via the management interface.
[]
null
4.3
null
null
RHSA-2023:6077
Red Hat Security Advisory: toolbox security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
7.5
null
null
CVE-2013-3076
The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c.
[ "cpe:2.3:o:linux:linux_kernel:*:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*" ]
null
null
null
4.9
GHSA-3hw4-hh3h-jx7q
libxml2 in Apple iOS before 9.2, OS X before 10.11.2, and tvOS before 9.1 allows remote attackers to obtain sensitive information or cause a denial of service (memory corruption) via a crafted XML document, a different vulnerability than CVE-2015-7115.
[]
null
null
4.3
null
CVE-2007-6395
Flat PHP Board 1.2 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain credentials via a direct request for the username php file for any user account in users/.
[ "cpe:2.3:a:flat_php:board:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-45rx-p9fm-3wgm
Cybonet - PineApp Mail Relay Local File Inclusion. Attacker can send a request to : /manage/mailpolicymtm/log/eml_viewer/email.content.body.php?filesystem_path=ENCDODED PATH and by doing that, the attacker can read Local Files inside the server.
[]
null
7.5
null
null
CVE-2006-4793
Multiple SQL injection vulnerabilities in icerik.asp in TualBLOG 1.0 allow remote attackers to execute arbitrary SQL commands, as demonstrated by the icerikno parameter.
[ "cpe:2.3:a:tualblog:tualblog:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-mj59-82hp-pgf4
A post-authentication command injection vulnerability exists in the PPTP client functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability and gain access to an unrestricted shell.
[]
null
7.2
null
null
CVE-2010-0685
The design of the dialplan functionality in Asterisk Open Source 1.2.x, 1.4.x, and 1.6.x; and Asterisk Business Edition B.x.x and C.x.x, when using the ${EXTEN} channel variable and wildcard pattern matches, allows context-dependent attackers to inject strings into the dialplan using metacharacters that are injected when the variable is expanded, as demonstrated using the Dial application to process a crafted SIP INVITE message that adds an unintended outgoing channel leg. NOTE: it could be argued that this is not a vulnerability in Asterisk, but a class of vulnerabilities that can occur in any program that uses this feature without the associated filtering functionality that is already available.
[ "cpe:2.3:a:digium:asterisk:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.2:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.3:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.10:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.11:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.12:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.12.1:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.13:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.15:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.16:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.17:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.18:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.19:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.20:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.21:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.21:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.21.1:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.22:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.22:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.23:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.23:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.24:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.24:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.25:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.25:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.26:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.26:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.26.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.26.1:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.26.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.26.2:netsec:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.27:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.28:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.28.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.29:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.30:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.30.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.30.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.30.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.30.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.31:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.31.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.32:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.33:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.34:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.35:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.2.36:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.24:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.25:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.26:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.27:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.1.3.2:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.1.3.3:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.2.0:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.2.1:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.3.1:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.3.2:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.3.3:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.3.4:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.3.5:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.3.6:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.5.0:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.5.1:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.5.2:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:b.2.5.3:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:c.1.0:beta7:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:c.1.0:beta8:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:c.1.6:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:c.1.6.1:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:c.1.6.2:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:c.1.8.0:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:c.1.8.1:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:c.3.0:-:business:*:*:*:*:*" ]
null
null
null
5
CVE-2024-45519
The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.
[ "cpe:2.3:a:zimbra:zimbra_collaboration_suite:*:*:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p43:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p44:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p45:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p36:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p37:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p38:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p39:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p40:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:*", "cpe:2.3:a:zimbra:collaboration:10.1.0:*:*:*:*:*:*:*" ]
null
10
null
null
GHSA-rhwg-2g63-9m63
SQL injection vulnerability in searchresult.php in Softbiz Link Directory Script allows remote attackers to execute arbitrary SQL commands via the sbcat_id parameter, a related issue to CVE-2007-5449.
[]
null
null
null
null
CVE-2022-23770
WISA Smart Wing CMS Remote Command Execution Vulnerability
This vulnerability could allow a remote attacker to execute remote commands with improper validation of parameters of certain API constructors. Remote attackers could use this vulnerability to execute malicious commands such as directory traversal.
[ "cpe:2.3:a:wisa:smart_wing_cms:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-h5xr-379w-chrw
If multiple instances of resource exhaustion occurred at the incorrect time, the garbage collector could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
[]
null
6.5
null
null
GHSA-cvgw-fpmw-hr5x
A vulnerability was found in ContiNew Admin 3.2.0 and classified as critical. Affected by this issue is the function top.continew.starter.extension.crud.controller.BaseController#page of the file /api/system/user?deptId=1&page=1&size=10. The manipulation of the argument sort leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.1
4.7
null
null
GHSA-35pr-gqm6-r366
Moodle allows attackers to obtain sensitive personal-contact and unread-message-count information
message/index.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 does not consider the moodle/site:readallmessages capability before accessing arbitrary conversations, which allows remote authenticated users to obtain sensitive personal-contact and unread-message-count information via a modified URL.
[]
null
null
null
null
CVE-2002-0214
Compaq Intel PRO/Wireless 2011B LAN USB Device Driver 1.5.16.0 through 1.5.18.0 stores the 128-bit WEP (Wired Equivalent Privacy) key in plaintext in a registry key with weak permissions, which allows local users to decrypt network traffic by reading the WEP key from the registry key.
[ "cpe:2.3:o:intel:intel_pro_wireless_2011b_lan_usb_device_driver:1.5.16.0:*:*:*:*:*:*:*", "cpe:2.3:o:intel:intel_pro_wireless_2011b_lan_usb_device_driver:1.5.18.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-vpm4-9j9m-vhjv
Huawei OSD product with versions earlier than OSD_uwp_9.0.32.0 have a local privilege escalation vulnerability. An authenticated, local attacker can constructs a specific file path to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege.
[]
null
null
null
null
CVE-2022-44641
In Linaro Automated Validation Architecture (LAVA) before 2022.11, users with valid credentials can submit crafted XMLRPC requests that cause a recursive XML entity expansion, leading to excessive use of memory on the server and a Denial of Service.
[ "cpe:2.3:a:linaro:lava:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2022-24977
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
[ "cpe:2.3:a:impresscms:impresscms:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2024-2471
The FooGallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image attachment fields (such as 'Title', 'Alt Text', 'Custom URL', 'Custom Class', and 'Override Type') in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2009-1308
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey allows remote attackers to inject arbitrary web script or HTML via vectors involving XBL JavaScript bindings and remote stylesheets, as exploited in the wild by a March 2009 eBay listing.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:preview_release:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:linux:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.0beta5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-rw62-mpgh-xjjx
The Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via vectors related to an argument with multiple null bytes.
[]
null
null
5.5
null
CVE-2016-7627
An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "CoreGraphics" component. It allows attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted font.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-fgm8-jrv2-6fww
WEPA Print Away is vulnerable to a stored XSS. It does not properly sanitize uploaded filenames, allowing an attacker to deceive a user into uploading a document with a malicious filename, which will be included in subsequent HTTP responses, allowing a stored XSS to occur. This attack is persistent across victim sessions.
[]
null
5.4
null
null
GHSA-6mp3-g6v4-83w7
In vow, there is a possible read of uninitialized data due to a improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is no needed for exploitation. Patch ID: ALPS05837742; Issue ID: ALPS05857289.
[]
null
4.4
null
null
CVE-2022-3976
MZ Automation libiec61850 MMS File Services mms_client_files.c path traversal
A vulnerability has been found in MZ Automation libiec61850 up to 1.4 and classified as critical. This vulnerability affects unknown code of the file src/mms/iso_mms/client/mms_client_files.c of the component MMS File Services. The manipulation of the argument filename leads to path traversal. Upgrading to version 1.5 is able to address this issue. The name of the patch is 10622ba36bb3910c151348f1569f039ecdd8786f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213556.
[ "cpe:2.3:a:mz-automation:libiec61850:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-1999-1380
Symantec Norton Utilities 2.0 for Windows 95 marks the TUNEOCX.OCX ActiveX control as safe for scripting, which allows remote attackers to execute arbitrary commands via the run option through malicious web pages that are accessed by browsers such as Internet Explorer 3.0.
[ "cpe:2.3:a:symantec:norton_utilities:2.0:*:*:*:*:*:*:*" ]
null
null
null
5.1
CVE-2016-4359
Stack-based buffer overflow in mchan.dll in the agent in HPE LoadRunner 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.02 through patch 2, and 12.50 through patch 3 and Performance Center 11.52 through patch 3, 12.00 through patch 1, 12.01 through patch 3, 12.20 through patch 2, and 12.50 through patch 1 allows remote attackers to execute arbitrary code via a long -server_name value, aka ZDI-CAN-3516.
[ "cpe:2.3:a:hp:loadrunner:11.52:p3:*:*:*:*:*:*", "cpe:2.3:a:hp:loadrunner:12.00:p1:*:*:*:*:*:*", "cpe:2.3:a:hp:loadrunner:12.01:p3:*:*:*:*:*:*", "cpe:2.3:a:hp:loadrunner:12.02:p2:*:*:*:*:*:*", "cpe:2.3:a:hp:loadrunner:12.50:p1:*:*:*:*:*:*", "cpe:2.3:a:hp:performance_center:11.52:p3:*:*:*:*:*:*", "cpe:2.3:a:hp:performance_center:12.00:p1:*:*:*:*:*:*", "cpe:2.3:a:hp:performance_center:12.01:p3:*:*:*:*:*:*", "cpe:2.3:a:hp:performance_center:12.20:p2:*:*:*:*:*:*", "cpe:2.3:a:hp:performance_center:12.50:p1:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-9crx-xc3m-v3x2
The smart proxy in Foreman before 1.1 uses a umask set to 0, which allows local users to modify files created by the daemon via unspecified vectors.
[]
null
null
null
null
GHSA-mrh2-5fx2-7rv8
Auth. (subscriber+) Broken Access Control vulnerability in Plugin for Google Reviews plugin <= 2.2.2 on WordPress.
[]
null
4.3
null
null
GHSA-3gj6-gfv8-qhwj
Cross-Site Request Forgery (CSRF) vulnerability in Bill Minozzi Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan.This issue affects Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan: from n/a through 4.34.
[]
null
5.4
null
null
CVE-2005-4169
Multiple SQL injection vulnerabilities in eFiction 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) let parameter in a viewlist action to authors.php and (2) sid parameter to viewstory.php.
[ "cpe:2.3:a:efiction_project:efiction:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-5fcg-g7jg-hx9p
Cross-Site Request Forgery (CSRF) vulnerability in hosting.io, campaigns.io WP Controller allows Stored XSS.This issue affects WP Controller: from n/a through 3.2.0.
[]
null
7.1
null
null
CVE-2024-44242
The issue was addressed with improved bounds checks. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to cause unexpected system termination or arbitrary code execution in DCP firmware.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-87jf-8g46-rh2g
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dylan James Zephyr Project Manager allows Reflected XSS.This issue affects Zephyr Project Manager: from n/a through .3.102.
[]
null
5.5
null
null
GHSA-6rgv-qr47-8w9g
flatCore-CMS version 2.0.8 calls dangerous functions, causing server-side request forgery vulnerabilities.
[]
null
9.8
null
null
GHSA-wh99-hh68-w2m5
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layerThis commit addresses a potential null pointer dereference issue in the `dcn201_acquire_free_pipe_for_layer` function. The issue could occur when `head_pipe` is null.The fix adds a check to ensure `head_pipe` is not null before asserting it. If `head_pipe` is null, the function returns NULL to prevent a potential null pointer dereference.Reported by smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn201/dcn201_resource.c:1016 dcn201_acquire_free_pipe_for_layer() error: we previously assumed 'head_pipe' could be null (see line 1010)
[]
null
5.5
null
null
GHSA-x9w5-5hgv-7jm8
A permissions issue was addressed with improved redaction of sensitive information. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to read sensitive location information.
[]
null
3.3
null
null
GHSA-6pc8-vwcr-fgvw
Directory traversal vulnerability in the third party tool from SafeStone, as used to secure the iSeries AS/400 FTP server, allows remote attackers to access arbitrary files, including those from qsys.lib, via ".." sequences in a GET request.
[]
null
null
null
null
RHSA-2010:0147
Red Hat Security Advisory: kernel security and bug fix update
kernel: ext4: Avoid null pointer dereference when decoding EROFS w/o a journal kernel: infoleak if print-fatal-signals=1 kernel: netfilter: ebtables: enforce CAP_NET_ADMIN kernel: sctp remote denial of service kernel: sys_move_pages infoleak kernel: ipv6: fix ip6_dst_lookup_tail() NULL pointer dereference
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
RHSA-2023:7050
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
python: tarfile module directory traversal python-requests: Unintended leak of Proxy-Authorization header
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
6.1
null
null
CVE-2015-1899
IBM WebSphere Portal 8.5 through CF05 allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
[ "cpe:2.3:a:ibm:websphere_portal:8.5.0.0:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2023-33792
A stored cross-site scripting (XSS) vulnerability in the Create Site Groups (/dcim/site-groups/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
[ "cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2018-11783
sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. This problem was discovered in versions 6.0.0 to 6.0.3, 7.0.0 to 7.1.5, and 8.0.0 to 8.0.1.
[ "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2018-20618
ok-file-formats through 2018-10-16 has a heap-based buffer over-read in the ok_mo_decode2 function in ok_mo.c.
[ "cpe:2.3:a:ok-file-formats_project:ok-file-formats:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-m852-pj36-5xhg
The Microsoft Server Message Block 1.0 (SMBv1) allows denial of service when an attacker sends specially crafted requests to the server, aka "Windows SMB Denial of Service Vulnerability". This CVE ID is unique from CVE-2017-0269 and CVE-2017-0273.
[]
null
null
5.9
null
CVE-2023-31414
Kibana versions 8.0.0 through 8.7.0 contain an arbitrary code execution flaw. An attacker with write access to Kibana yaml or env configuration could add a specific payload that will attempt to execute JavaScript code. This could lead to the attacker executing arbitrary commands on the host system with permissions of the Kibana process.
[ "cpe:2.3:a:elastic:kibana:*:*:*:*:*:*:*:*" ]
null
8.2
null
null
CVE-2022-20640
Cisco Security Manager Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Security Manager could allow an unauthenticated, remote attacker to conduct cross-site scripting attacks against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
[ "cpe:2.3:a:cisco:security_manager:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2023-2690
SourceCodester Personnel Property Equipment System GET Parameter returned_reuse_form.php sql injection
A vulnerability, which was classified as critical, has been found in SourceCodester Personnel Property Equipment System 1.0. This issue affects some unknown processing of the file admin/returned_reuse_form.php of the component GET Parameter Handler. The manipulation of the argument client_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228971.
[ "cpe:2.3:a:personnel_property_equipment_system_project:personnel_property_equipment_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
CVE-2012-4712
Moxa EDR-G903 series routers with firmware before 2.11 have a hardcoded account, which allows remote attackers to obtain unspecified device access via unknown vectors.
[ "cpe:2.3:o:moxa:edr-g903_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:edr-g903:-:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-rq2w-c7m2-92hw
In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid.
[]
null
5.5
null
null
GHSA-4m72-rmm9-2qjr
feedparser Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via an unexpected URI scheme, as demonstrated by a javascript: URI.
[]
5.3
6.1
null
null
GHSA-m6cx-g6qm-p2cx
Arbitrary File Write in npm
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when the package is installed. It is only possible to affect files that the user running `npm install` has access to and it is not possible to over write files that already exist on disk.This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.RecommendationUpgrade to version 6.13.3 or later.
[]
null
7.7
null
null
GHSA-38c3-hhmq-4vwf
Cross-site scripting (XSS) vulnerability in Cisco Unified Operations Manager allows remote attackers to inject arbitrary web script or HTML via a crafted URL in an unspecified HTTP header field, aka Bug ID CSCud80182.
[]
null
null
null
null
GHSA-fqvv-84gm-c2c5
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
[]
null
null
null
null