id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-8c6j-52q3-w3c5
The LeadConnector plugin for WordPress is vulnerable to unauthorized modification & loss of data due to a missing capability check on the lc_public_api_proxy() function in all versions up to, and including, 1.7. This makes it possible for unauthenticated attackers to delete arbitrary posts.
[]
null
6.5
null
null
null
GHSA-p6rw-7v7m-xm65
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
[]
null
8.8
null
null
null
CVE-2025-30850
WordPress Dr. Flex plugin <= 2.0.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sfaerber Dr. Flex allows Stored XSS. This issue affects Dr. Flex: from n/a through 2.0.0.
[]
null
6.5
null
null
null
GHSA-vvww-6fqh-6jvq
A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions). Affected devices do not properly validate incoming Profinet packets. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted malicious packet, which leads to a crash of the dcpd process.
[]
5.3
4.3
null
null
null
CVE-2021-23954
Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2023-40542
BIG-IP TCP Profile vulnerability
When TCP Verified Accept is enabled on a TCP profile that is configured on a Virtual Server, undisclosed requests can cause an increase in memory resource utilization.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
[ "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-jgj9-6v78-6g8m
Improper Authentication In Apache NiFi
In Apache NiFi before 0.7.2 and 1.x before 1.1.2 in a cluster environment, if an anonymous user request is replicated to another node, the originating node identity is used rather than the "anonymous" user.
[]
null
null
7.5
null
null
RHSA-2022:6152
Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update
golang: net/http: improper sanitization of Transfer-Encoding header golang: go/parser: stack exhaustion in all Parse* functions golang: encoding/pem: fix stack overflow in Decode golang: encoding/xml: stack exhaustion in Decoder.Skip golang: crypto/elliptic: panic caused by oversized scalar golang: crypto/tls: session tickets lack random ticket_age_add golang: io/fs: stack exhaustion in Glob golang: compress/gzip: stack exhaustion in Reader.Read golang: path/filepath: stack exhaustion in Glob golang: encoding/xml: stack exhaustion in Unmarshal golang: encoding/gob: stack exhaustion in Decoder.Decode golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
[ "cpe:/a:redhat:openshift_secondary_scheduler:1.1::el8" ]
null
6.5
null
null
null
GHSA-rqv8-76v6-fcx2
The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.
[]
null
null
null
null
null
GHSA-2fcc-jc2g-q7h3
A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.&nbsp; This vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
[]
null
7.7
null
null
null
CVE-2024-37528
IBM Cloud Pak for Business Automation cross-site scripting
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2, 23.0.1, and 23.0.2 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 294293.
[ "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:18.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:19.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:20.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_001:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_002:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_003:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_004:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_005:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_006:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_007:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.1:interim_fix_008:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_001:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_002:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_003:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_004:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_005:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_006:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_007:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_008:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_009:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_010:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_011:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_012:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_013:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_014:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_015:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_016:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_017:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_018:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_019:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_020:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_021:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_022:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_023:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_024:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_025:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_026:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_028:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_029:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_030:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_031:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_032:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:21.0.3:interim_fix_033:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_001:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_002:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_003:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_004:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_005:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.1:interim_fix_006:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_001:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_002:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_003:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_004:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_005:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:22.0.2:interim_fix_006:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_001:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_002:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_003:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.1:interim_fix_004:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_001:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_002:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_003:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_004:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_pak_for_business_automation:23.0.2:interim_fix_005:*:*:*:*:*:*" ]
null
4.8
null
null
null
CVE-2016-3704
Pulp before 2.8.5 uses bash's $RANDOM in an unsafe way to generate passwords.
[ "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "cpe:2.3:a:pulpproject:pulp:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2012-2128
Cross-site request forgery (CSRF) vulnerability in doku.php in DokuWiki 2012-01-25 Angua allows remote attackers to hijack the authentication of administrators for requests that add arbitrary users. NOTE: this issue has been disputed by the vendor, who states that it is resultant from CVE-2012-2129: "the exploit code simply uses the XSS hole to extract a valid CSRF token."
[ "cpe:2.3:a:andreas_gohr:dokuwiki:2012-01-25:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-wrw9-r95r-fm43
Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `riscv64-elf-toolchain` package.
[]
null
8.1
null
null
null
PYSEC-2019-227
null
In TensorFlow before 1.15, a heap buffer overflow in UnsortedSegmentSum can be produced when the Index template argument is int32. In this case data_size and num_segments fields are truncated from int64 to int32 and can produce negative numbers, resulting in accessing out of bounds heap memory. This is unlikely to be exploitable and was detected and fixed internally in TensorFlow 1.15 and 2.0.
[]
null
null
null
null
null
GHSA-pwrj-f53c-f89j
OpenStack Glance v2 API unrestricted path traversal through filesystem:// scheme
The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.1.4 and 2014.2.x before 2014.2.2 allows remote authenticated users to read or delete arbitrary files via a full pathname in a `filesystem://` URL in the image location property. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9493.
[]
null
null
null
null
null
GHSA-vh44-3832-vcr2
IBM Cognos Analytics 11.1.7 and 11.2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209706.
[]
null
null
null
null
null
CVE-2016-0679
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53, 8.54, and 8.55 allows remote authenticated users to affect integrity and availability via vectors related to PIA Grids.
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:54:*:*:*:*:*:*:*" ]
null
null
8.7
5.5
null
GHSA-j856-jfgj-fvvf
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
CVE-2020-36778
i2c: xiic: fix reference leak when pm_runtime_get_sync fails
In the Linux kernel, the following vulnerability has been resolved: i2c: xiic: fix reference leak when pm_runtime_get_sync fails The PM reference count is not expected to be incremented on return in xiic_xfer and xiic_i2c_remove. However, pm_runtime_get_sync will increment the PM reference count even failed. Forgetting to putting operation will result in a reference leak here. Replace it with pm_runtime_resume_and_get to keep usage counter balanced.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2024-2196
CSRF Vulnerability in aimhubio/aim
aimhubio/aim is vulnerable to Cross-Site Request Forgery (CSRF), allowing attackers to perform actions such as deleting runs, updating data, and stealing data like log records and notes without the user's consent. The vulnerability stems from the lack of CSRF and CORS protection in the aim dashboard. An attacker can exploit this by tricking a user into executing a malicious script that sends unauthorized requests to the aim server, leading to potential data loss and unauthorized data manipulation.
[ "cpe:2.3:a:aimhubio:aim:3.17.5:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
CVE-2011-2950
Heap-based buffer overflow in qcpfformat.dll in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5 and RealPlayer SP 1.0 through 1.1.5 allows remote attackers to execute arbitrary code via a crafted QCP file.
[ "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-5p33-p2v6-hj8p
Deno before 0.107.0 allows Code Injection via an untrusted YAML file in certain configurations.
[]
null
null
null
null
null
CVE-2024-44135
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to access protected files within an App Sandbox container.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2021-40881
An issue in the BAT file parameters of PublicCMS v4.0 allows attackers to execute arbitrary code.
[ "cpe:2.3:a:publiccms:publiccms:4.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2023-36400
Windows HMAC Key Derivation Elevation of Privilege Vulnerability
Windows HMAC Key Derivation Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2023-35880
WordPress WooCommerce Brands Plugin <= 1.6.49 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce WooCommerce Brands plugin <= 1.6.49 versions.
[ "cpe:2.3:a:woocommerce:brands:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
GHSA-23w4-f563-4m2j
A heap buffer overflow in /src/dds_stream.c of Eclipse IOT Cyclone DDS Project v0.1.0 causes the DDS subscriber server to crash.
[]
null
null
null
null
null
CVE-2023-30623
Arbitrary command injection in embano1/wip
`embano1/wip` is a GitHub Action written in Bash. Prior to version 2, the `embano1/wip` action uses the `github.event.pull_request.title` parameter in an insecure way. The title parameter is used in a run statement - resulting in a command injection vulnerability due to string interpolation. This vulnerability can be triggered by any user on GitHub. They just need to create a pull request with a commit message containing an exploit. (Note that first-time PR requests will not be run - but the attacker can submit a valid PR before submitting an invalid PR). The commit can be genuine, but the commit message can be malicious. This can be used to execute code on the GitHub runners and can be used to exfiltrate any secrets used in the CI pipeline, including repository tokens. Version 2 has a fix for this issue.
[ "cpe:2.3:a:wip_project:wip:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2023-5038
Unauthenticated DoS
badmonkey, a Security Researcher has found a flaw that allows for a unauthenticated DoS attack on the camera. An attacker runs a crafted URL, nobody can access the web management page of the camera. and must manually restart the device or re-power it. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
[ "cpe:2.3:h:hanwhavision:ano-l6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ano-l6022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:anv-l6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ano-l6082r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ane-l6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:anv-l6082r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ano-l7082r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ane-l7012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:anv-l7082r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ano-l7012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:ano-l7022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:anv-l7012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-c9022rv:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9000qb:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-7002vd:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-8082vt:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9002vq:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9022v:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9031rv:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9084qz:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9084rqz:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9085rqz:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9084qz1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9084rqz1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9085rqz1:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-9322vqp:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-7082rvd:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:pnm-12082rvd:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lno-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnd-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lno-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnv-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnd-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnd-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lno-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnv-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnv-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnd-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lnv-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:lno-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6011:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6021:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:anv-l6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l6082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ane-l6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:anv-l6082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l7082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ane-l7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:anv-l7082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:ano-l7022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:anv-l7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-c9022rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9000qb_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-7002vd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-8082vt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9002vq_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9022v_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9031rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9084qz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9084rqz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9085rqz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9084qz1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9084rqz1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9085rqz1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-9322vqp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-7082rvd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:pnm-12082rvd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lno-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnd-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lno-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnv-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnd-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnd-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lno-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnv-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnv-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnd-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lnv-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:lno-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6011_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6021_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6073r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6073r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6073r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6073r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6012r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6022r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6072r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6072r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6073r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6073r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6012r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6012r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6022r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6022r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6032r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6032r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6072r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6072r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-6082r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-6082r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6012r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6012r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6022r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6022r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6032r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6032r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6072r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6072r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6082r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6082r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6012r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6012r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6022r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6022r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6032r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6032r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6072r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6072r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6082r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6082r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-7082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-7082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-7082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-7082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-7082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-7082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-7012r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-7022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-7022r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-7032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-7032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-7012r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-7022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-7022r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-7032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-7032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-7012r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-7012r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-7022r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-7022r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-7032r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-7032r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6014r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6014r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6084r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6084r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6014r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6014r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-6084r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-6084r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6024rm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6024rm:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-6023r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-6023r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:anv-l6023r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:anv-l6023r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnb-8002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnb-8002:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8010r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8010r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8011_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8011:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8020r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8020r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8021_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8021:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8030r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8030r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnd-8080r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnd-8080r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qne-8011r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qne-8011r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qne-8021r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qne-8021r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-8010r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-8010r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-8020r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-8020r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-8030r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-8030r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qno-8080r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qno-8080r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-8010r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-8010r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-8020r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-8020r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-8030r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-8030r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:qnv-8080r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:qnv-8080r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-9083rz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-9083rz:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-8083rz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-8083rz:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-8083z_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-8083z:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-6083rz_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-6083rz:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-6083z_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-6083z:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-6002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-6002:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-6083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-6083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-6003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-6003:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-9083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-9083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-8093r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-8093r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-8083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-8083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-9083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-9083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-8093rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-8093rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-8083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-8083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-9083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-9083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-8083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-8083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-9003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-9003:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-8003_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-8003:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-c6083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-c6083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-c7083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-c7083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-c6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-c6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-c7083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-c7083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-c6083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-c6083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-c7083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-c7083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-c6083_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-c6083:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-c8083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-c8083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-c9083rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-c9083rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-c8083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-c8083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-c9083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-c9083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-c8083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-c8083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-c9083r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-c9083r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-9250r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-9250r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-8250r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-8250r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-9250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-9250:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-8250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-8250:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-6400r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-6400r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-9300rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-9300rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-8300rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-8300rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-6400rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-6400rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:tnv-c7013rc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:tnv-c7013rc:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c6403_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c6403:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c6403r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c6403r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c6403rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c6403rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c8253_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c8253:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c8253r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c8253r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c8303rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c8303rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c9253_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c9253:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c9253r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c9253r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c9303rw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c9303rw:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-6123r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-6123r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-6123r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-6123r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-8002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-8002:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnb-9002_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnb-9002:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-8082rf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-8082rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-8082rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-8082rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-9082rf_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-9082rf:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnd-9082rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnd-9082rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-8082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-8082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xno-9082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xno-9082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-8082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-8082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnv-9082r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnv-9082r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnp-c9310r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnp-c9310r:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnf-9010rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnf-9010rv:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnf-9010rvm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnf-9010rvm:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnf-9010rs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnf-9010rs:-:*:*:*:*:*:*:*", "cpe:2.3:o:hanwhavision:xnf-9013rv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hanwhavision:xnf-9013rv:-:*:*:*:*:*:*:*" ]
8.7
null
null
null
null
RHSA-2022:0968
Red Hat Security Advisory: java-1.8.0-ibm security update
OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
[ "cpe:/a:redhat:rhel_extras:7" ]
null
5.3
null
null
null
GHSA-fh4v-qfgj-jxxw
A vulnerability has been identified in Location Intelligence Perpetual Large (9DE5110-8CA13-1AX0) (All versions < V4.3), Location Intelligence Perpetual Medium (9DE5110-8CA12-1AX0) (All versions < V4.3), Location Intelligence Perpetual Non-Prod (9DE5110-8CA10-1AX0) (All versions < V4.3), Location Intelligence Perpetual Small (9DE5110-8CA11-1AX0) (All versions < V4.3), Location Intelligence SUS Large (9DE5110-8CA13-1BX0) (All versions < V4.3), Location Intelligence SUS Medium (9DE5110-8CA12-1BX0) (All versions < V4.3), Location Intelligence SUS Non-Prod (9DE5110-8CA10-1BX0) (All versions < V4.3), Location Intelligence SUS Small (9DE5110-8CA11-1BX0) (All versions < V4.3). Affected products use a hard-coded secret value for the computation of a Keyed-Hash Message Authentication Code. This could allow an unauthenticated remote attacker to gain full administrative access to the application.
[]
null
9.8
null
null
null
GHSA-qq2w-vpgq-jp7x
In JetBrains TeamCity before 2021.2.1, an unauthenticated attacker can cancel running builds via an XML-RPC request to the TeamCity server.
[]
null
5.3
null
null
null
CVE-2019-19921
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
[ "cpe:2.3:a:linuxfoundation:runc:*:*:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc7:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc8:*:*:*:*:*:*", "cpe:2.3:a:linuxfoundation:runc:1.0.0:rc9:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*" ]
null
7
null
4.4
null
GHSA-x737-cfqc-6rg4
This vulnerability allows an authenticated attacker to upload malicious files by bypassing the restrictions of the upload functionality, compromising the entire device.
[]
null
7.2
null
null
null
GHSA-pwwc-8qxc-5w7f
In the Linux kernel, the following vulnerability has been resolved:net: qrtr: Avoid potential use after free in MHI sendIt is possible that the MHI ul_callback will be invoked immediately following the queueing of the skb for transmission, leading to the callback decrementing the refcount of the associated sk and freeing the skb.As such the dereference of skb and the increment of the sk refcount must happen before the skb is queued, to avoid the skb to be used after free and potentially the sk to drop its last refcount..
[]
null
8.4
null
null
null
GHSA-6qvq-5969-5wrp
The LevelOne WBR-6012 router firmware R0.40e6 suffers from an input validation vulnerability within its FTP functionality, enabling attackers to cause a denial of service through a series of malformed FTP commands. This can lead to device reboots and service disruption.
[]
null
7.5
null
null
null
RHSA-2020:5639
Red Hat Security Advisory: openssl security update
openssl: EDIPARTYNAME NULL pointer de-reference
[ "cpe:/o:redhat:rhel_aus:7.2::server" ]
null
5.9
null
null
null
CVE-2018-4246
An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages type confusion.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
null
8.8
6.8
null
CVE-2018-15707
Advantech WebAccess 8.3.1 and 8.3.2 are vulnerable to cross-site scripting in the Bwmainleft.asp page. An attacker could leverage this vulnerability to disclose credentials amongst other things.
[ "cpe:2.3:a:advantech:webaccess:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:advantech:webaccess:8.3.2:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
GHSA-94xm-wvmm-qp2g
SSH Secure Shell before 3.2.9 allows remote attackers to cause a denial of service via malformed BER/DER packets.
[]
null
null
null
null
null
GHSA-jh6v-7wrw-4xxr
A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints Brocade Fabric OS switch encrypted passwords in the Brocade SANnav Standby node's support save.
[]
null
8.6
null
null
null
GHSA-3823-hjpv-24g4
An Unquoted Service Path vulnerability exists in Ext2Fsd v0.68 via a specially crafted file in the Ext2Srv Service executable service path.
[]
null
7.8
null
null
null
CVE-2024-33879
An issue was discovered in VirtoSoftware Virto Bulk File Download 5.5.44 for SharePoint 2019. The Virto.SharePoint.FileDownloader/Api/Download.ashx isCompleted method allows arbitrary file download and deletion via absolute path traversal in the path parameter.
[ "cpe:2.3:a:virtosoftware:virto_bulk_file_download:5.5.44:*:*:*:*:*:*:*", "cpe:2.3:a:virtosoftware:sharepoint_bulk_file_download:5.5.44:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-rgjr-66p4-3793
Acrobat Reader DC version 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
null
GHSA-w3w9-w55m-2gwf
Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the GetDIACloudList endpoint. An authenticated attacker can exploit this issue to potentially compromise the system on which DIAEnergie is deployed.
[]
null
8.8
null
null
null
GHSA-4pxw-3px9-5fg9
An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093.
[]
null
9.1
null
null
null
GHSA-rjjv-8xhv-gg57
The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.
[]
null
null
null
null
null
CVE-2022-36527
Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the post title text field under the publish blog module.
[ "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-8vhf-hgr9-gmr5
Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.
[]
null
null
8.8
null
null
CVE-2019-12123
An issue was discovered in ONAP SDNC before Dublin. By executing sla/printAsXml with a crafted module parameter, an authenticated user can execute an arbitrary command. All SDC setups that include admportal are affected.
[ "cpe:2.3:a:onap:open_network_automation_platform:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.5
null
GHSA-p8vw-ggr8-6jc5
IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 125155.
[]
null
null
5.4
null
null
CVE-2013-3269
Cross-site request forgery (CSRF) vulnerability in Cybozu Office before 8.1.6 and 9.x before 9.3.0 allows remote attackers to hijack the authentication of arbitrary users for requests that change mobile passwords, a different vulnerability than CVE-2013-2305.
[ "cpe:2.3:a:cybozu:cybozu_office:*:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:cybozu_office:6:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:cybozu_office:7:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:cybozu_office:9:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:cybozu_office:9.2.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2015-9539
The Fast Secure Contact Form plugin before 4.0.38 for WordPress allows fs_contact_form1[welcome] XSS.
[ "cpe:2.3:a:fast_secure_contact_form_project:fast_secure_contact_form:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
null
GHSA-r9cx-xf3c-4pvx
Multiple SQL injection vulnerabilities in Absolut Engine 1.73 allow remote authenticated users to execute arbitrary SQL commands via the (1) sectionID parameter to admin/managersection.php, (2) userID parameter to admin/edituser.php, (3) username parameter to admin/admin.php, or (4) title parameter to admin/managerrelated.php.
[]
null
null
null
null
null
GHSA-wpg9-vg72-4v62
In JetBrains IntelliJ IDEA before 2022.1 HTML injection into IDE messages was possible
[]
null
3.3
null
null
null
GHSA-7gxg-p47h-8xph
Reflected Cross-Site Scripting (XSS) vulnerability in Dmytriy.Cooperman MagicForm plugin <= 0.1 versions.
[]
null
6.1
null
null
null
CVE-2006-0488
The VDM (Virtual DOS Machine) emulation environment for MS-DOS applications in Windows 2000, Windows XP SP2, and Windows Server 2003 allows local users to read the first megabyte of memory and possibly obtain sensitive information, as demonstrated by dumper.asm.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2019-12666
Cisco IOS XE Software Path Traversal Vulnerability
A vulnerability in the Guest Shell of Cisco IOS XE Software could allow an authenticated, local attacker to perform directory traversal on the base Linux operating system of Cisco IOS XE Software. The vulnerability is due to incomplete validation of certain commands. An attacker could exploit this vulnerability by first accessing the Guest Shell and then entering specific commands. A successful exploit could allow the attacker to execute arbitrary code on the base Linux operating system.
[ "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*" ]
null
null
6.7
null
null
CVE-2021-47449
ice: fix locking for Tx timestamp tracking flush
In the Linux kernel, the following vulnerability has been resolved: ice: fix locking for Tx timestamp tracking flush Commit 4dd0d5c33c3e ("ice: add lock around Tx timestamp tracker flush") added a lock around the Tx timestamp tracker flow which is used to cleanup any left over SKBs and prepare for device removal. This lock is problematic because it is being held around a call to ice_clear_phy_tstamp. The clear function takes a mutex to send a PHY write command to firmware. This could lead to a deadlock if the mutex actually sleeps, and causes the following warning on a kernel with preemption debugging enabled: [ 715.419426] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:573 [ 715.427900] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3100, name: rmmod [ 715.435652] INFO: lockdep is turned off. [ 715.439591] Preemption disabled at: [ 715.439594] [<0000000000000000>] 0x0 [ 715.446678] CPU: 52 PID: 3100 Comm: rmmod Tainted: G W OE 5.15.0-rc4+ #42 bdd7ec3018e725f159ca0d372ce8c2c0e784891c [ 715.458058] Hardware name: Intel Corporation S2600STQ/S2600STQ, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020 [ 715.468483] Call Trace: [ 715.470940] dump_stack_lvl+0x6a/0x9a [ 715.474613] ___might_sleep.cold+0x224/0x26a [ 715.478895] __mutex_lock+0xb3/0x1440 [ 715.482569] ? stack_depot_save+0x378/0x500 [ 715.486763] ? ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.494979] ? kfree+0xc1/0x520 [ 715.498128] ? mutex_lock_io_nested+0x12a0/0x12a0 [ 715.502837] ? kasan_set_free_info+0x20/0x30 [ 715.507110] ? __kasan_slab_free+0x10b/0x140 [ 715.511385] ? slab_free_freelist_hook+0xc7/0x220 [ 715.516092] ? kfree+0xc1/0x520 [ 715.519235] ? ice_deinit_lag+0x16c/0x220 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.527359] ? ice_remove+0x1cf/0x6a0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.535133] ? pci_device_remove+0xab/0x1d0 [ 715.539318] ? __device_release_driver+0x35b/0x690 [ 715.544110] ? driver_detach+0x214/0x2f0 [ 715.548035] ? bus_remove_driver+0x11d/0x2f0 [ 715.552309] ? pci_unregister_driver+0x26/0x250 [ 715.556840] ? ice_module_exit+0xc/0x2f [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.564799] ? __do_sys_delete_module.constprop.0+0x2d8/0x4e0 [ 715.570554] ? do_syscall_64+0x3b/0x90 [ 715.574303] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 715.579529] ? start_flush_work+0x542/0x8f0 [ 715.583719] ? ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.591923] ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.599960] ? wait_for_completion_io+0x250/0x250 [ 715.604662] ? lock_acquire+0x196/0x200 [ 715.608504] ? do_raw_spin_trylock+0xa5/0x160 [ 715.612864] ice_sbq_rw_reg+0x1e6/0x2f0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.620813] ? ice_reset+0x130/0x130 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.628497] ? __debug_check_no_obj_freed+0x1e8/0x3c0 [ 715.633550] ? trace_hardirqs_on+0x1c/0x130 [ 715.637748] ice_write_phy_reg_e810+0x70/0xf0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.646220] ? do_raw_spin_trylock+0xa5/0x160 [ 715.650581] ? ice_ptp_release+0x910/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.658797] ? ice_ptp_release+0x255/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.667013] ice_clear_phy_tstamp+0x2c/0x110 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.675403] ice_ptp_release+0x408/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.683440] ice_remove+0x560/0x6a0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d] [ 715.691037] ? _raw_spin_unlock_irqrestore+0x46/0x73 [ 715.696005] pci_device_remove+0xab/0x1d0 [ 715.700018] __device_release_driver+0x35b/0x690 [ 715.704637] driver_detach+0x214/0x2f0 [ 715.708389] bus_remove_driver+0x11d/0x2f0 [ 715.712489] pci_unregister_driver+0x26/0x250 [ 71 ---truncated---
[ "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
GHSA-m4r6-hfwj-vc65
The remote-access VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.6.x before 8.6(1.12), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.5), when an override-account-disable option is enabled, does not properly parse AAA LDAP responses, which allows remote attackers to bypass authentication via a VPN connection attempt, aka Bug ID CSCug83401.
[]
null
null
null
null
null
GHSA-8rx2-c38v-6hm8
Onlyoffice Community Server before v12.5.2 was discovered to contain a remote code execution (RCE) vulnerability via the component UploadProgress.ashx.
[]
null
9.8
null
null
null
CVE-2024-43301
WordPress Fonts plugin <= 3.7.7 - Cross Site Request Forgery (CSRF) to Stored XSSvulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Fonts Plugin Fonts allows Stored XSS.This issue affects Fonts: from n/a through 3.7.7.
[ "cpe:2.3:a:fontsplugin:fonts_plugin:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
CVE-2017-6966
readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.
[ "cpe:2.3:a:gnu:binutils:2.28:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2013-3976
The (1) Data Protection for Exchange component 6.1 before 6.1.3.4 and 6.3 before 6.3.1 in IBM Tivoli Storage Manager for Mail and the (2) FlashCopy Manager for Exchange component 2.2 and 3.1 before 3.1.1 in IBM Tivoli Storage FlashCopy Manager do not properly constrain mailbox contents during certain PST restore operations, which allows remote authenticated users to read the personal e-mail of other users in opportunistic circumstances by launching an e-mail client after an administrator performs a multiple-mailbox restore.
[ "cpe:2.3:a:ibm:data_protection:6.1:*:*:*:*:exchange_server:*:*", "cpe:2.3:a:ibm:data_protection:6.3:*:*:*:*:exchange_server:*:*", "cpe:2.3:a:ibm:flashcopy_manager:2.1:*:*:*:*:exchange_server:*:*", "cpe:2.3:a:ibm:flashcopy_manager:2.2:*:*:*:*:exchange_server:*:*", "cpe:2.3:a:ibm:flashcopy_manager:3.1:*:*:*:*:exchange_server:*:*", "cpe:2.3:a:ibm:tivoli_storage_flashcopy_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager_for_mail:-:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
CVE-2019-2935
Vulnerability in the Siebel UI Framework product of Oracle Siebel CRM (component: EAI). Supported versions that are affected are 19.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel UI Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Siebel UI Framework accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-mj23-7m3m-wqph
Cross Site Scripting vulnerabilty in LimeSurvey 4.1.11+200316 via the (1) name and (2) description parameters in application/controllers/admin/PermissiontemplatesController.php.
[]
null
null
null
null
null
GHSA-6c69-pg7v-m2fj
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of X_B files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18349.
[]
null
7.8
null
null
null
GHSA-rw65-rjcx-2cc2
IOAcceleratorFamily in Apple iOS before 9.3.3 and watchOS before 2.2.2 allows local users to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
[]
null
null
5.5
null
null
CVE-2020-1009
An elevation of privilege vulnerability exists in the way that the Microsoft Store Install Service handles file operations in protected locations, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0934, CVE-2020-0983, CVE-2020-1011, CVE-2020-1015.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
null
CVE-2024-2537
Electron Code Injection in Logi Tune macOS Application
Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech Logi Tune on MacOS allows Local Code Inclusion.
[]
null
4.4
null
null
null
CVE-2024-56726
octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c Add error pointer check after calling otx2_mbox_get_rsp().
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2005-2892
Directory traversal vulnerability in setcookie.php in PBLang 4.65, and possibly earlier versions, allows remote attackers to read arbitrary files via ".." sequences and "%00" (trailing null byte) in the u parameter.
[ "cpe:2.3:a:pblang:pblang:4.65:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2025-49861
WordPress Kama Click Counter plugin <= 4.0.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Timur Kamaev Kama Click Counter allows Stored XSS. This issue affects Kama Click Counter: from n/a through 4.0.3.
[]
null
6.5
null
null
null
GHSA-hx98-fgmp-472p
FutureNet NXR series, VXR series and WXR series provided by Century Systems Co., Ltd. contain an active debug code vulnerability. If a user who knows how to use the debug function logs in to the product, the debug function may be used and an arbitrary OS command may be executed.
[]
null
7.2
null
null
null
GHSA-48f8-hxqq-cjj3
The image upload component allows SVG files and the regular expression used to remove script tags can be bypassed by using a Cross Site Scripting payload which does not match the regular expression; one example of this is the inclusion of whitespace within the script tag. An attacker must target an authenticated user with permissions to access this feature, however once uploaded the payload is also accessible to unauthenticated users.
[]
null
5.4
null
null
null
CVE-2023-1626
Jianming Antivirus IoControlCode kvcore.sys memory corruption
A vulnerability was found in Jianming Antivirus 16.2.2022.418. It has been declared as critical. This vulnerability affects unknown code in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224008.
[ "cpe:2.3:a:jiangmin:jiangmin_antivirus:16.2.2022.418:*:*:*:*:*:*:*" ]
null
5.3
5.3
4.3
null
GHSA-4f48-qjgq-932g
The Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "OpenType Font Parsing Vulnerability."
[]
null
null
8.8
null
null
CVE-2016-7289
Microsoft Publisher 2010 SP2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:publisher:2010:sp2:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
CVE-2023-48622
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:-:*:*:*:cloud_service:*:*:*" ]
null
5.4
null
null
null
CVE-2008-3683
Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors.
[ "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp1:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp2:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp3:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp4:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4:sp5:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.1:sp5:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp1:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp2:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp3:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp4:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.2:sp5:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp1:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp2:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp3:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp4:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.3:sp5:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp1:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp2:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp3:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp4:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.4:sp5:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp1:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp2:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp3:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp4:*:*:*:*:*:*", "cpe:2.3:a:sun:java_system_web_proxy_server:4.0.5:sp5:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2019-12126
In ONAP DCAE through Dublin, by accessing an applicable port (30234, 30290, 32010, 30270, 30224, 30281, 30254, 30285, and/or 30271), an attacker gains full access to the respective ONAP services without any authentication. All ONAP Operations Manager (OOM) setups are affected.
[ "cpe:2.3:a:onap:open_network_automation_platform:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2024-34474
Clario through 2024-04-11 for Desktop has weak permissions for %PROGRAMDATA%\Clario and tries to load DLLs from there as SYSTEM.
[ "cpe:2.3:a:clario:clario:2024-04-11:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-vpv3-mggc-9fwh
A local code execution vulnerability is possible in Telerik UI for WinForms beginning in v2021.1.122 but prior to v2024.2.514. This vulnerability could allow an untrusted theme assembly to execute arbitrary code on the local Windows system.
[]
null
7.2
null
null
null
GHSA-g928-9c86-8mr8
Cross-site scripting (XSS) vulnerability in Opera.dll in Opera before 9.61 allows remote attackers to inject arbitrary web script or HTML via the anchor identifier (aka the "optional fragment"), which is not properly escaped before storage in the History Search database (aka md.dat).
[]
null
null
null
null
null
GHSA-pc39-7549-89wv
ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected by an Information Exposure vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to gain access to sensitive information which could be used to further compromise the system or bypass security mechanisms. Exploitation of this issue does not require user interaction.
[]
null
6.2
null
null
null
CVE-2020-1049
A cross site scripting vulnerability exists when Microsoft Dynamics 365 (on-premises) does not properly sanitize a specially crafted web request to an affected Dynamics server, aka 'Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability'. This CVE ID is unique from CVE-2020-1050.
[ "cpe:2.3:a:microsoft:dynamics_365_server:9.0:-:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2024-9830
Bard <= 2.216 - Reflected Cross-Site Scripting via add_query_arg Parameter
The Bard theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.216. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
null
GHSA-j2p4-5vr6-m8qq
The DCP ETSI dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors.
[]
null
null
null
null
null
CVE-2023-29134
An issue was discovered in the Cargo extension for MediaWiki through 1.39.3. There is mishandling of backticks to smartSplit.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*" ]
null
8.6
null
null
null
CVE-2022-2684
SourceCodester Apartment Visitor Management System manage-apartment.php cross site scripting
A vulnerability has been found in SourceCodester Apartment Visitor Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /manage-apartment.php. The manipulation of the argument Apartment Number with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-205672.
[ "cpe:2.3:a:apartment_visitors_management_system_project:apartment_visitors_management_system:1.0:*:*:*:*:*:*:*" ]
null
3.5
null
null
null
CVE-2008-7151
Cross-site request forgery (CSRF) vulnerability in Live 5.x before 5.x-0.1, a module for Drupal, allows remote attackers to hijack the authentication of unspecified privileged users for requests that can be leveraged to execute arbitrary PHP code.
[ "cpe:2.3:a:gurpartap_singh:live:5.x-1.x-dev:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-x7gp-j833-2pjx
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071.
[]
null
null
5.5
null
null
CVE-2018-6121
Insufficient validation of input in Blink in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to perform privilege escalation via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-3x6c-8mj8-xj2q
The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
[]
null
null
6.2
null
null
GHSA-hvcx-qqg5-776h
JRequest in Joomla! 1.5 before 1.5.7 does not sanitize variables that were set with JRequest::setVar, which allows remote attackers to conduct "variable injection" attacks and have unspecified other impact.
[]
null
null
null
null
null
GHSA-4fhx-m3mx-qm88
Format string vulnerability in the message catalog library functions in UnixWare 7.1.1 allows local users to gain privileges by modifying the LC_MESSAGE environment variable to read other message catalogs containing format strings from setuid programs such as vxprint.
[]
null
null
null
null
null
CVE-2023-23774
Motorola EBTS/MBTS Site Controller drops to debug prompt on unhandled exception. The Motorola MBTS Site Controller exposes a debug prompt on the device's serial port in case of an unhandled exception. This allows an attacker with physical access that is able to trigger such an exception to extract secret key material and/or gain arbitrary code execution on the device.
[ "cpe:2.3:a:motorola:ebts_mbts_base_radio:*:*:*:*:*:*:*:*", "cpe:2.3:o:motorola:ebts_site_controller_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:motorola:ebts_site_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:motorola:mbts_site_controller_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:motorola:mbts_site_controller:-:*:*:*:*:*:*:*" ]
null
8.4
null
null
null
CVE-2011-2158
The SmarterTools SmarterStats 6.0 web server sends incorrect Content-Type headers for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving (1) Admin/frmSite.aspx, (2) Admin/frmSites.aspx, (3) Admin/frmViewReports.aspx, (4) App_Themes/AboutThisFolder.txt, (5) Client/frmViewReports.aspx, (6) Temp/AboutThisFolder.txt, (7) default.aspx, (8) login.aspx, or (9) certain .jpg URIs under Temp/. NOTE: it is possible that only clients, not the SmarterStats product, could be affected by this issue.
[ "cpe:2.3:a:smartertools:smarterstats:6.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2009-4898
Cross-site request forgery (CSRF) vulnerability in TWiki before 4.3.2 allows remote attackers to hijack the authentication of arbitrary users for requests that update pages, as demonstrated by a URL for a save script in the ACTION attribute of a FORM element, in conjunction with a call to the submit method in the onload attribute of a BODY element. NOTE: this issue exists because of an insufficient fix for CVE-2009-1339.
[ "cpe:2.3:a:twiki:twiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:twiki:twiki:4.3.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
null