id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-57wx-m983-2f88
|
Incomplete validation in boosted trees code
|
ImpactThe [code for boosted trees in TensorFlow](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc) is still missing validation. As a result, attackers can trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures) as well as abuse undefined behavior (binding references to `nullptr`s). An attacker can also read and write from heap buffers, depending on the API that gets used and the arguments that are passed to the call.**Note**: Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. Instead, please use the downstream [TensorFlow Decision Forests](https://github.com/tensorflow/decision-forests) project which is newer and supports more features. We will deprecate TensorFlow's boosted trees APIs in subsequent releases.PatchesWe have patched the issue in GitHub commit [5c8c9a8bfe750f9743d0c859bae112060b216f5c](https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c).The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
[] | null | 9.3 | null | null | null |
GHSA-6fhp-jhwr-cwgh
|
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiMail version 7.0.1 and 7.0.0, version 6.4.5 and below, version 6.3.7 and below, version 6.0.11 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the FortiGuard URI protection service.
|
[] | null | null | null | null | null |
|
CVE-2024-38613
|
m68k: Fix spinlock race in kernel thread creation
|
In the Linux kernel, the following vulnerability has been resolved:
m68k: Fix spinlock race in kernel thread creation
Context switching does take care to retain the correct lock owner across
the switch from 'prev' to 'next' tasks. This does rely on interrupts
remaining disabled for the entire duration of the switch.
This condition is guaranteed for normal process creation and context
switching between already running processes, because both 'prev' and
'next' already have interrupts disabled in their saved copies of the
status register.
The situation is different for newly created kernel threads. The status
register is set to PS_S in copy_thread(), which does leave the IPL at 0.
Upon restoring the 'next' thread's status register in switch_to() aka
resume(), interrupts then become enabled prematurely. resume() then
returns via ret_from_kernel_thread() and schedule_tail() where run queue
lock is released (see finish_task_switch() and finish_lock_switch()).
A timer interrupt calling scheduler_tick() before the lock is released
in finish_task_switch() will find the lock already taken, with the
current task as lock owner. This causes a spinlock recursion warning as
reported by Guenter Roeck.
As far as I can ascertain, this race has been opened in commit
533e6903bea0 ("m68k: split ret_from_fork(), simplify kernel_thread()")
but I haven't done a detailed study of kernel history so it may well
predate that commit.
Interrupts cannot be disabled in the saved status register copy for
kernel threads (init will complain about interrupts disabled when
finally starting user space). Disable interrupts temporarily when
switching the tasks' register sets in resume().
Note that a simple oriw 0x700,%sr after restoring sr is not enough here
- this leaves enough of a race for the 'spinlock recursion' warning to
still be observed.
Tested on ARAnyM and qemu (Quadra 800 emulation).
|
[] | null | null | null | null | null |
GHSA-qpv2-jxc7-3638
|
Exposure of Sensitive Information in snipe/snipe-it
|
Snipe-IT prior to v5.3.10 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor.
|
[] | null | 4.3 | null | null | null |
RHSA-2021:1150
|
Red Hat Security Advisory: OpenShift Container Platform 4.7.7 security update
|
containers/storage: DoS via malicious image
|
[
"cpe:/a:redhat:openshift:4.7::el7",
"cpe:/a:redhat:openshift:4.7::el8"
] | null | 6.5 | null | null | null |
CVE-2002-0909
|
Multiple buffer overflows in mnews 1.22 and earlier allow (1) a remote NNTP server to execute arbitrary code via long responses, or local users can gain privileges via long command line arguments (2) -f, (3) -n, (4) -D, (5) -M, or (6) -P, or via long environment variables (7) JNAMES or (8) MAILSERVER.
|
[
"cpe:2.3:a:matsushita_research:mnews:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2013-1904
|
Absolute path traversal vulnerability in steps/mail/sendmail.inc in Roundcube Webmail before 0.7.3 and 0.8.x before 0.8.6 allows remote attackers to read arbitrary files via a full pathname in the _value parameter for the generic_message_footer setting in a save-perf action to index.php, as exploited in the wild in March 2013.
|
[
"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:20050811:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:20050820:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:20051007:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:20051021:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1:stable:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2:stable:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.3:stable:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5:rc:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:0.8.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2020-9823
|
This issue was addressed with improved checks. This issue is fixed in iOS 13.5 and iPadOS 13.5. Users removed from an iMessage conversation may still be able to alter state.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2022-46717
|
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.2 and iPadOS 16.2. A user with physical access to a locked Apple Watch may be able to view user photos via accessibility features
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 2.4 | null | null | null |
|
CVE-2021-30163
|
Redmine before 4.0.8 and 4.1.x before 4.1.2 allows attackers to discover the names of private projects if issue-journal details exist that have changes to project_id values.
|
[
"cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2023:6138
|
Red Hat Security Advisory: Migration Toolkit for Runtimes security update
|
plexus-archiver: Arbitrary File Creation in AbstractUnArchiver
|
[
"cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8"
] | null | 8.1 | null | null | null |
CVE-2023-44318
|
Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that obtains a configuration backup to extract configuration information from the exported file.
|
[
"cpe:2.3:o:siemens:6gk5205-3bb00-2ab2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5205-3bb00-2ab2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5205-3bb00-2tb2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5205-3bb00-2tb2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5205-3bd00-2tb2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5205-3bd00-2tb2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5205-3bd00-2ab2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5205-3bd00-2ab2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5205-3bf00-2tb2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5205-3bf00-2tb2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5205-3bf00-2ab2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5205-3bf00-2ab2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ba00-2tb2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ba00-2tb2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ba00-2ab2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ba00-2ab2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5213-3bd00-2tb2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5213-3bd00-2tb2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5213-3bd00-2ab2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5213-3bd00-2ab2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5213-3bb00-2tb2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5213-3bb00-2tb2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5213-3bb00-2ab2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5213-3bb00-2ab2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5213-3bf00-2tb2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5213-3bf00-2tb2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5213-3bf00-2ab2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5213-3bf00-2ab2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-0ba00-2tb2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-0ba00-2tb2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-0ba00-2ab2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-0ba00-2ab2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5206-2bd00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5206-2bd00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5206-2bb00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5206-2bb00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5206-2rs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5206-2rs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5206-2rs00-5ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5206-2rs00-5ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5206-2rs00-5fc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5206-2rs00-5fc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5206-2bs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5206-2bs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5206-2bs00-2fc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5206-2bs00-2fc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5206-2gs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5206-2gs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5206-2gs00-2tc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5206-2gs00-2tc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5206-2gs00-2fc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5206-2gs00-2fc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ba00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ba00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ba00-2fc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ba00-2fc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ga00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ga00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ga00-2tc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ga00-2tc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ga00-2fc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ga00-2fc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ra00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ra00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ra00-5ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ra00-5ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-0ba00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-0ba00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-3rs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-3rs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-3rs00-5ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-3rs00-5ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-4bs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-4bs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-4gs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-4gs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-4gs00-2tc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-4gs00-2tc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-4gs00-2fc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-4gs00-2fc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-0ba00-2fc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-0ba00-2fc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5224-0ba00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5224-0ba00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5224-4gs00-2ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5224-4gs00-2ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5224-4gs00-2tc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5224-4gs00-2tc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5224-4gs00-2fc2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5224-4gs00-2fc2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5204-0ba00-2gf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5204-0ba00-2gf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5204-0ba00-2yf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5204-0ba00-2yf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5204-2aa00-2gf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5204-2aa00-2gf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5204-2aa00-2yf2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5204-2aa00-2yf2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ha00-2as6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ha00-2as6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ha00-2ts6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ha00-2ts6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ha00-2es6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ha00-2es6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5208-0ua00-5es6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5208-0ua00-5es6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-0ha00-2as6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-0ha00-2as6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-0ha00-2ts6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-0ha00-2ts6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-0ha00-2es6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-0ha00-2es6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5216-0ua00-5es6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5216-0ua00-5es6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5324-0ba00-3ar3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5324-0ba00-3ar3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5324-0ba00-2ar3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5324-0ba00-2ar3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5326-2qs00-3ar3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5326-2qs00-3ar3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5326-2qs00-3rr3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5326-2qs00-3rr3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5328-4fs00-3ar3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5328-4fs00-3ar3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5328-4fs00-3rr3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5328-4fs00-3rr3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5328-4fs00-2ar3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5328-4fs00-2ar3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5328-4fs00-2rr3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5328-4fs00-2rr3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5328-4ss00-3ar3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5328-4ss00-3ar3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6gk5328-4ss00-2ar3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6gk5328-4ss00-2ar3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6ag1206-2bb00-7ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6ag1206-2bb00-7ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6ag1206-2bs00-7ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6ag1206-2bs00-7ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6ag1208-0ba00-7ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6ag1208-0ba00-7ac2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:6ag1216-4bs00-7ac2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6ag1216-4bs00-7ac2:-:*:*:*:*:*:*:*"
] | 6.9 | 4.9 | null | null | null |
|
GHSA-24gg-vmf8-whvm
|
Memory leak in the __archive_read_get_extract function in archive_read_extract2.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service via a tar file.
|
[] | null | null | 5.5 | null | null |
|
GHSA-xj6f-hh7p-x6vm
|
The Yahoo! Japan Box (aka jp.co.yahoo.android.ybox) application 1.5.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-2wjr-vfmw-3fw7
|
HUAWEI Mate 20 versions earlier than 10.0.0.188(C00E74R3P8) have a buffer overflow vulnerability in the Bluetooth module. Due to insufficient input validation, an unauthenticated attacker may craft Bluetooth messages after successful paring, causing buffer overflow. Successful exploit may cause code execution.
|
[] | null | null | null | null | null |
|
GHSA-xj7c-p939-3474
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMinds Simple WP Events allows Stored XSS. This issue affects Simple WP Events: from n/a through 1.8.17.
|
[] | null | 6.5 | null | null | null |
|
RHSA-2015:0856
|
Red Hat Security Advisory: postgresql92-postgresql security update
|
postgresql: information leak through constraint violation errors postgresql: buffer overflow in the to_char() function postgresql: buffer overflow flaws in contrib/pgcrypto postgresql: loss of frontend/backend protocol synchronization after an error
|
[
"cpe:/a:redhat:network_satellite:5.7::el6",
"cpe:/a:redhat:network_satellite_managed_db:5.7::el6"
] | null | null | null | null | null |
GHSA-j5c2-pqjr-m8wh
|
The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement WebGL, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-mx54-78g5-6r6j
|
In vdec, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07671069; Issue ID: ALPS07671069.
|
[] | null | 6.4 | null | null | null |
|
GHSA-6vc7-fg29-7r6p
|
Janet before 1.22.0 mishandles arrays.
|
[] | null | 9.8 | null | null | null |
|
GHSA-v59g-cg7g-9v2h
|
An NIS domain name is easily guessable.
|
[] | null | null | null | null | null |
|
CVE-2018-20505
|
SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
|
[
"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2023-7150
|
Campcodes Chic Beauty Salon Product product-list.php unrestricted upload
|
A vulnerability classified as critical was found in Campcodes Chic Beauty Salon 20230703. Affected by this vulnerability is an unknown functionality of the file product-list.php of the component Product Handler. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249157 was assigned to this vulnerability.
|
[
"cpe:2.3:a:campcodes:chic_beauty_salon:20230703:*:*:*:*:*:*:*"
] | null | 4.7 | 4.7 | 5.8 | null |
GHSA-fr64-jq7c-57j4
|
In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629574; Issue ID: ALPS07629574.
|
[] | null | 6.7 | null | null | null |
|
GHSA-757p-vx43-fp9r
|
KubePi Privilege Escalation vulnerability
|
SummaryA normal user has permission to create/update users, they can become admin by editing the `isadmin` value in the requestPoCChange the value of the `isadmin` field in the request to true:
https://drive.google.com/file/d/1e8XJbIFIDXaFiL-dqn0a0b6u7o3CwqSG/previewImpactElevate user privileges
|
[] | null | 9.1 | null | null | null |
GHSA-vmr3-h27j-q58j
|
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3288.
|
[] | null | null | 7.5 | null | null |
|
GHSA-7qf7-6m7f-hv3w
|
Tokheim Profleet DiaLOG 11.005.02 is affected by SQL Injection. The component is the Field__UserLogin parameter on the logon page.
|
[] | null | 9.8 | null | null | null |
|
GHSA-mgjg-hm5j-p2wq
|
A blind XML External Entity (XXE) vulnerability exists in the Add UCS Device functionality of ManageEngine OpManager 12.6.168. A specially crafted XML file can lead to SSRF. An attacker can serve a malicious XML payload to trigger this vulnerability.
|
[] | null | 5.4 | null | null | null |
|
GHSA-vqh4-j3q2-7p9v
|
Out of bound access can occur while processing peer info in IBSS connection mode due to lack of upper bounds check to ensure that for loop further will not cause an overflow in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8053, APQ8096AU, MDM9607, MSM8996AU, QCA6574AU, QCN7605, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130
|
[] | null | null | null | null | null |
|
GHSA-w4xc-8www-f4gx
|
Buffer overflow in disable of HP-UX 11.0 may allow local users to execute arbitrary code via a long argument to the (1) -r or (2)-c options.
|
[] | null | null | null | null | null |
|
CVE-2017-9649
|
A Use of Hard-Coded Cryptographic Key issue was discovered in Mirion Technologies DMC 3000 Transmitter Module, iPam Transmitter f/DMC 2000, RDS-31 iTX and variants (including RSD31-AM Package), DRM-1/2 and variants (including Solar PWR Package), DRM and RDS Based Boundary Monitors, External Transmitters, Telepole II, and MESH Repeater (Telemetry Enabled Devices). An unchangeable, factory-set key is included in the 900 MHz transmitter firmware.
|
[
"cpe:2.3:o:mirion_technologies:dmc_3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mirion_technologies:dmc_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mirion_technologies:ipam_transmitter_f\\/dmc_2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mirion_technologies:ipam_transmitter_f\\/dmc_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mirion_technologies:telepole_ii_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mirion_technologies:telepole_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mirion_technologies:rds-31_itx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mirion_technologies:rds-31_itx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mirion_technologies:rsd31-am_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mirion_technologies:rsd31-am:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mirion_technologies:wrm2_mesh_repeater_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mirion_technologies:wrm2_mesh_repeater:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mirion_technologies:drm-1\\/2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mirion_technologies:drm-1\\/2:-:*:*:*:*:*:*:*"
] | null | null | 5 | 5.4 | null |
|
RHSA-2003:197
|
Red Hat Security Advisory: xpdf security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
CVE-2009-0929
|
Directory traversal vulnerability in the media manager in Nucleus CMS before 3.40 allows remote attackers to read arbitrary files via unknown vectors.
|
[
"cpe:2.3:a:nucleus_group:nucleus_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nucleus_group:nucleus_cms:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nucleus_group:nucleus_cms:3.0_1:*:*:*:*:*:*:*",
"cpe:2.3:a:nucleus_group:nucleus_cms:3.0_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:nucleus_group:nucleus_cms:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:nucleus_group:nucleus_cms:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:nucleus_group:nucleus_cms:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:nucleus_group:nucleus_cms:3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:nucleus_group:nucleus_cms:3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:nucleus_group:nucleus_cms:3.23:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2022-35261
|
A denial of service vulnerability exists in the web_server hashFirst functionality of Robustel R1510 3.1.16 and 3.3.0. A specially-crafted network request can lead to denial of service. An attacker can send a sequence of requests to trigger this vulnerability.This denial of service is in the `/action/import_authorized_keys/` API.
|
[
"cpe:2.3:o:robustel:r1510_firmware:3.1.16:*:*:*:*:*:*:*",
"cpe:2.3:o:robustel:r1510_firmware:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:robustel:r1510:-:*:*:*:*:*:*:*"
] | null | null | 4.9 | null | null |
|
CVE-2021-43685
|
libretime hv3.0.0-alpha.10 is affected by a path manipulation vulnerability in /blob/master/legacy/application/modules/rest/controllers/ShowImageController.php through the rename function.
|
[
"cpe:2.3:a:libretime:libretime_hv:3.0.0:alpha.10:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2005-2289
|
PHPCounter 7.2 allows remote attackers to obtain sensitive information via a direct request to prelims.php, which reveals the path in an error message.
|
[
"cpe:2.3:a:phpcounter:phpcounter:7.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-rf8m-7vjc-mj7p
|
IBM Integration Bus, under non default configurations, could allow a remote user to authenticate without providing valid credentials.
|
[] | null | null | 5.9 | null | null |
|
CVE-2024-43959
|
WordPress Super Testimonials plugin <= 3.0.8 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Themepoints Testimonials allows Reflected XSS.This issue affects Testimonials: from n/a through 3.0.8.
|
[] | null | 7.1 | null | null | null |
CVE-2020-5542
|
Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.
|
[
"cpe:2.3:o:mitsubishielectric:iu1-1m20-d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:iu1-1m20-d:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-5xjg-wggg-qh5w
|
Heap-based buffer overflow in the server in IBM Lotus Domino 7 and 8.5 FP1 allows remote attackers to cause a denial of service (daemon exit) and possibly have unspecified other impact via a long string in a crafted LDAP message to a TCP port, a different vulnerability than CVE-2009-3087.
|
[] | null | null | null | null | null |
|
PYSEC-2011-7
| null |
Multiple SQL injection vulnerabilities in the get_userinfo method in the MySQLAuthHandler class in DAVServer/mysqlauth.py in PyWebDAV before 0.9.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) user or (2) pw argument. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
RHSA-2017:2524
|
Red Hat Security Advisory: ansible security, bug fix, and enhancement update
|
ansible: Security issue with lookup return not tainting the jinja2 environment
|
[
"cpe:/a:redhat:rhev_manager:4"
] | null | null | 5.3 | null | null |
CVE-2021-44529
|
A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).
|
[
"cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:4.6:patch_512:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:4.6:-:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
RHSA-2023:0626
|
Red Hat Security Advisory: libksba security update
|
libksba: integer overflow to code execution
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 8.6 | null | null | null |
GHSA-gwxq-89pj-48g2
|
Multiple SQL injection vulnerabilities in index.php in PHP Support Tickets 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) password fields, and (3) id parameter.
|
[] | null | null | null | null | null |
|
GHSA-fppq-mj76-fpj2
|
fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)
|
ImpactA remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads.Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`.Please note: The option FLUENT_OJ_OPTION_MODE was introduced in Fluentd version 1.13.2. Earlier versions of Fluentd are not affected by this vulnerability.Patchesv1.15.3WorkaroundsDo not use `FLUENT_OJ_OPTION_MODE=object`.ReferencesGHSL-2022-067
|
[] | null | 3.1 | null | null | null |
GHSA-8jj8-g8wj-q299
|
IBM BigFix Platform could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free race condition. An attacker could exploit this vulnerability to execute arbitrary code on the system.
|
[] | null | null | 10 | null | null |
|
CVE-2019-14704
|
An SSRF issue was discovered in HTTPD on MicroDigital N-series cameras with firmware through 6400.0.8.5 via FTP commands following a newline character in the uploadfile field.
|
[
"cpe:2.3:o:microdigital:mdc-n4090_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:microdigital:mdc-n4090:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microdigital:mdc-n4090w_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:microdigital:mdc-n4090w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microdigital:mdc-n2190v_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:microdigital:mdc-n2190v:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
GHSA-xfp3-4xff-2988
|
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the setlogo_num parameter in the icp_setlogo_img (sub_41DBF4) function.
|
[] | null | 9.8 | null | null | null |
|
GHSA-jrhg-66xp-fmhv
|
A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device.This vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information.
Note: This vulnerability only affects Cisco Webex Desk Hub.
There are no workarounds that address this vulnerability.
|
[] | null | 4.3 | null | null | null |
|
CVE-2025-2685
|
TablePress – Tables in WordPress made easy <= 3.0.4 - Authenticated (Author+) Stored Cross-Site Scripting
|
The TablePress – Tables in WordPress made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘table-name’ parameter in all versions up to, and including, 3.0.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
CVE-2015-7286
|
CSL DualCom GPRS CS2300-R devices with firmware 1.25 through 3.53 rely on a polyalphabetic substitution cipher with hardcoded keys, which makes it easier for remote attackers to defeat a cryptographic protection mechanism by capturing IP or V.22bis PSTN protocol traffic.
|
[
"cpe:2.3:o:csl_dualcom:gprs_cs2300-r_firmware:1.25:*:*:*:*:*:*:*",
"cpe:2.3:o:csl_dualcom:gprs_cs2300-r_firmware:3.53:*:*:*:*:*:*:*",
"cpe:2.3:h:csl_dualcom:gprs:cs2300-r:*:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
CVE-2020-12014
|
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized and may allow an attacker to inject SQL commands.
|
[
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*",
"cpe:2.3:a:advantech:webaccess:9.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2014-7746
|
The Fusion Flowers - Weddings (aka com.triactivemedia.fusionweddings) application @7F0801AA for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:pocketmags:fusion_flowers_-_weddings:\\@7f0801aa:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-97wm-hr4h-jwm3
|
** DISPUTED ** The proxy DNS service in Symantec Gateway Security (SGS) allows remote attackers to make arbitrary DNS queries to third-party DNS servers, while hiding the source IP address of the attacker. NOTE: another researcher has stated that the default configuration does not proxy DNS queries received on the external interface.
|
[] | null | null | null | null | null |
|
GHSA-9c5m-2869-83j9
|
Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
|
[] | null | 7.3 | null | null | null |
|
CVE-2025-3766
|
Login Lockdown & Protection <= 2.11 - Missing Authorization to Authenticated (Subscriber+) Arbitrary IP Whitelisting
|
The Login Lockdown & Protection plugin for WordPress is vulnerable to unauthorized nonce access due to a missing capability check on the ajax_run_tool function in all versions up to, and including, 2.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to obtain a valid nonce that can be used to generate a global unlock key, which can in turn be used to add arbitrary IP address to the plugin allowlist. This can only by exploited on new installations where the site administrator hasn't visited the loginlockdown page yet.
|
[] | null | 5.4 | null | null | null |
CVE-2015-1421
|
Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-m674-2p86-mfgx
|
Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote attackers to affect confidentiality via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-hg7f-mj9p-7743
|
A vulnerability, which was classified as critical, was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected is the function cgi_s3_modify of the file /cgi-bin/s3.cgi of the component HTTP POST Request Handler. The manipulation of the argument f_job_name leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-3qq9-74gh-x46m
|
A vulnerability, which was classified as critical, was found in maku-boot up to 2.2.0. This affects the function doExecute of the file AbstractScheduleJob.java of the component Scheduled Task Handler. The manipulation leads to injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 446eb7294332efca2bfd791bc37281cedac0d0ff. It is recommended to apply a patch to fix this issue. The identifier VDB-215013 was assigned to this vulnerability.
|
[] | null | 7.2 | null | null | null |
|
CVE-2024-40983
|
tipc: force a dst refcount before doing decryption
|
In the Linux kernel, the following vulnerability has been resolved:
tipc: force a dst refcount before doing decryption
As it says in commit 3bc07321ccc2 ("xfrm: Force a dst refcount before
entering the xfrm type handlers"):
"Crypto requests might return asynchronous. In this case we leave the
rcu protected region, so force a refcount on the skb's destination
entry before we enter the xfrm type input/output handlers."
On TIPC decryption path it has the same problem, and skb_dst_force()
should be called before doing decryption to avoid a possible crash.
Shuang reported this issue when this warning is triggered:
[] WARNING: include/net/dst.h:337 tipc_sk_rcv+0x1055/0x1ea0 [tipc]
[] Kdump: loaded Tainted: G W --------- - - 4.18.0-496.el8.x86_64+debug
[] Workqueue: crypto cryptd_queue_worker
[] RIP: 0010:tipc_sk_rcv+0x1055/0x1ea0 [tipc]
[] Call Trace:
[] tipc_sk_mcast_rcv+0x548/0xea0 [tipc]
[] tipc_rcv+0xcf5/0x1060 [tipc]
[] tipc_aead_decrypt_done+0x215/0x2e0 [tipc]
[] cryptd_aead_crypt+0xdb/0x190
[] cryptd_queue_worker+0xed/0x190
[] process_one_work+0x93d/0x17e0
|
[] | null | null | null | null | null |
GHSA-2m2v-wq87-9h5c
|
Cross-Site Request Forgery (CSRF) vulnerability in PayForm PayForm allows Stored XSS.This issue affects PayForm: from n/a through 2.0.
|
[] | null | 7.1 | null | null | null |
|
CVE-2017-9977
|
AVG AntiVirus for MacOS with scan engine before 4668 might allow remote attackers to bypass malware detection by leveraging failure to scan inside disk image (aka DMG) files.
|
[
"cpe:2.3:a:avg:anti-virus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2022-22999
|
Cross-site Scripting Vulnerability in USB Backups App
|
Western Digital My Cloud devices are vulnerable to a cross side scripting vulnerability that can allow a malicious user with elevated privileges access to drives being backed up to construct and inject JavaScript payloads into an authenticated user's browser. As a result, it may be possible to gain control over the authenticated session, steal data, modify settings, or redirect the user to malicious websites. The scope of impact can extend to other components.
|
[
"cpe:2.3:o:westerndigital:my_cloud_pr2100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:my_cloud_pr4100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:my_cloud_ex4100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:my_cloud_ex2_ultra_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:my_cloud_mirror_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_mirror_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:my_cloud_dl2100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:my_cloud_dl4100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:westerndigital:my_cloud_ex2100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
GHSA-rh3p-m63q-4v6v
|
Buffer overflow in GO-Global for Windows 3.1.0.3270 and earlier allows remote attackers to execute arbitrary code via a data block that is longer than the specified data block size.
|
[] | null | null | null | null | null |
|
CVE-2023-2611
|
Advantech R-SeeNet Use of Hard-coded Credentials
|
Advantech R-SeeNet
versions 2.4.22
is installed with a hidden root-level user that is not available in the
users list. This hidden user has a password that cannot be changed by
users.
|
[
"cpe:2.3:a:advantech:r-seenet:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2019-16735
|
A stack-based buffer overflow in processCommandUploadLog in libcommon.so in Petwant PF-103 firmware 4.22.2.42 and Petalk AI 3.2.2.30 allows remote attackers to cause denial of service or run arbitrary code as the root user.
|
[
"cpe:2.3:o:skymee:petalk_ai_firmware:3.2.2.30:*:*:*:*:*:*:*",
"cpe:2.3:h:skymee:petalk_ai:-:*:*:*:*:*:*:*",
"cpe:2.3:o:petwant:pf-103_firmware:4.22.2.42:*:*:*:*:*:*:*",
"cpe:2.3:h:petwant:pf-103:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2022-27868
|
A maliciously crafted CAT file in Autodesk AutoCAD 2023 can be used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
|
[
"cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-fpg5-7w95-pcwj
|
A vulnerability was found in Netadmin Software NetAdmin IAM up to 3.5 and classified as problematic. Affected by this issue is some unknown functionality of the file /controller/api/Answer/ReturnUserQuestionsFilled of the component HTTP POST Request Handler. The manipulation of the argument username leads to information exposure through discrepancy. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 6.3 | 3.7 | null | null | null |
|
CVE-2024-33146
|
J2EEFAST v2.7.0 was discovered to contain a SQL injection vulnerability via the sql_filter parameter in the export function.
|
[
"cpe:2.3:a:j2eefast:j2eefast:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
|
GHSA-jj55-r28f-x5pv
|
A vulnerability has been found in SourceCodester Simple and Nice Shopping Cart Script and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /mkshope/login.php. The manipulation of the argument msg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206401 was assigned to this vulnerability.
|
[] | null | 6.1 | null | null | null |
|
GHSA-pjr8-522j-xrv6
|
An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. Processing a maliciously crafted image may lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2016-3341
|
The kernel-mode drivers in Transaction Manager in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "Windows Transaction Manager Elevation of Privilege Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2025-8374
|
code-projects Vehicle Management addcompany.php sql injection
|
A vulnerability was found in code-projects Vehicle Management 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /addcompany.php. The manipulation of the argument company leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2024-41834
|
ZDI-CAN-24311: Adobe Acrobat Reader DC Annotation Out-Of-Bounds Read Information Disclosure Vulnerability
|
Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:macos:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:windows:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-x9pv-h28p-55w8
|
compile in regexp.c in Artifex MuJS through 1.2.0 results in stack consumption because of unlimited recursion, a different issue than CVE-2019-11413.
|
[] | null | 5.5 | null | null | null |
|
GHSA-m8j4-7vqm-v48x
|
The upload functionality of ASUS Download Master does not properly filter user input. Remote attackers with administrative privilege can exploit this vulnerability to upload any file to any location. They may even upload malicious web page files to the website directory, allowing arbitrary system commands to be executed upon browsing the webpage.
|
[] | null | 7.2 | null | null | null |
|
CVE-2025-39586
|
WordPress ProfileGrid <= 5.9.4.8 - SQL Injection Vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Metagauss ProfileGrid allows SQL Injection. This issue affects ProfileGrid : from n/a through 5.9.4.8.
|
[] | null | 8.5 | null | null | null |
CVE-2024-31336
|
In PVRSRVBridgeRGXKickTA3D2 of server_rgxta3d_bridge.c, there is a possible arbitrary code execution due to improper input validation. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:a:imaginationtech:ddk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
|
GHSA-92j5-277h-r47f
|
The BulletProof Security WordPress plugin before 5.8 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
[] | null | 4.8 | null | null | null |
|
CVE-2025-9087
|
Tenda AC20 SetNetControlList Endpoint set_qosMib_list stack-based overflow
|
A vulnerability has been found in Tenda AC20 16.03.08.12. This affects the function set_qosMib_list of the file /goform/SetNetControlList of the component SetNetControlList Endpoint. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 8.7 | 8.8 | 8.8 | 9 | null |
GHSA-vp46-7xjp-2x37
|
Cisco IOS 12.2 through 12.4 and 15.0 through 15.2 and IOS XE 2.1.x through 2.6.x and 3.1.xS before 3.1.2S, 3.2.xS through 3.4.xS before 3.4.2S, 3.5.xS before 3.5.1S, and 3.1.xSG and 3.2.xSG before 3.2.2SG, when AAA authorization is enabled, allow remote authenticated users to bypass intended access restrictions and execute commands via a (1) HTTP or (2) HTTPS session, aka Bug ID CSCtr91106.
|
[] | null | 7.2 | null | null | null |
|
GHSA-j694-p476-7fp3
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mage Cast Mage Front End Forms allows Stored XSS.This issue affects Mage Front End Forms: from n/a through 1.1.4.
|
[] | null | 6.5 | null | null | null |
|
CVE-2010-3716
|
The be_user_creation task in TYPO3 4.2.x before 4.2.15 and 4.3.x before 4.3.7 allows remote authenticated users to gain privileges via a crafted POST request that creates a user account with arbitrary group memberships.
|
[
"cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3.6:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
GHSA-979v-wq6c-52q5
|
The mintToken function of a smart contract implementation for BTPCoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[] | null | null | 7.5 | null | null |
|
GHSA-vxvf-9hmc-wv8c
|
SQL injection vulnerability in the indexed_search system extension in TYPO3 3.x, 4.0 through 4.0.7, and 4.1 through 4.1.3 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-xqr2-65hp-h5j3
|
The Startklar Elementor Addons plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.7.15 via the 'dropzone_hash' parameter. This makes it possible for unauthenticated attackers to copy the contents of arbitrary files on the server, which can contain sensitive information, and to delete arbitrary directories, including the root WordPress directory.
|
[] | null | 9.1 | null | null | null |
|
GHSA-h4p3-9fc9-2447
|
The Ziteboard Online Whiteboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ziteboard' shortcode in versions up to, and including, 2.9.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 5.4 | null | null | null |
|
GHSA-f532-rj5q-c6j3
|
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol implementation of Cisco Aironet and Catalyst 9100 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to improper resource management during CAPWAP message processing. An attacker could exploit this vulnerability by sending a high volume of legitimate wireless management frames within a short time to an affected device. A successful exploit could allow the attacker to cause a device to restart unexpectedly, resulting in a DoS condition for clients associated with the AP.
|
[] | null | 6.5 | null | null | null |
|
CVE-2021-32702
|
Reflected XSS from the callback handler's error query parameter
|
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message. You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `1.4.1` or lower **unless** you are using custom error handling that does not return the error message in an HTML response. Upgrade to version `1.4.1` to resolve. The fix adds basic HTML escaping to the error message and it should not impact your users.
|
[
"cpe:2.3:a:auth0:nextjs-auth0:*:*:*:*:*:node.js:*:*"
] | null | 8 | null | null | null |
GHSA-hq75-pvpq-98xx
|
Due to an uncontrolled recursion in SAP Web Dispatcher and SAP Internet Communication Manager, the application may crash, leading to denial of service, but can be restarted automatically.
|
[] | null | 7.5 | null | null | null |
|
CVE-2021-40022
|
The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality.
|
[
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2021-27095
|
Windows Media Video Decoder Remote Code Execution Vulnerability
|
Windows Media Video Decoder Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null | null |
GHSA-5rrj-7ch9-25rj
|
u'Possible buffer overflow while updating output buffer for IMEI and Gateway Address due to lack of check of input validation for parameters received from server' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in Agatti, Kamorta, Nicobar, QCM6125, QCS610, Rennell, SA415M, Saipan, SC7180, SC8180X, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130
|
[] | null | null | null | null | null |
|
GHSA-6h8x-73fx-q2h9
|
Chameleon in Plone allows Authentication Bypass
|
Chameleon (five.pt) in Plone 5.0rc1 through 5.1a1 allows remote authenticated users to bypass Restricted Python by leveraging permissions to create or edit templates.
|
[] | 6.9 | null | 4.9 | null | null |
GHSA-29g9-48v7-9r7c
|
Authorization Bypass Through User-Controlled Key vulnerability in Paid Memberships Pro allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Paid Memberships Pro: from n/a through 3.0.4.
|
[] | null | 7.5 | null | null | null |
|
GHSA-w48x-694x-m8q8
|
The boost ASIO wrapper in net/asio.cpp in Pichi before 1.3.0 lacks TLS hostname verification.
|
[] | null | 5.9 | null | null | null |
|
GHSA-6j57-8pfh-4g36
|
Hardcoded credentials are used in specific BD Pyxis products. If exploited, threat actors may be able to gain access to the underlying file system and could potentially exploit application files for information that could be used to decrypt application credentials or gain access to electronic protected health information (ePHI) or other sensitive information.
|
[] | null | 5.5 | null | null | null |
|
GHSA-96fm-7x9f-hmmw
|
A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
|
[] | null | 7.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.