id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2009-4164
|
Cross-site scripting (XSS) vulnerability in the simple Glossar (simple_glossar) extension 1.0.3 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:simple_glossar:simple_glossar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2020-14404
|
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rre.c allows out-of-bounds access via encodings.
|
[
"cpe:2.3:a:libvnc_project:libvncserver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc1500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc1500_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc1900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc1900_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc2200_pro:-:*:*:*:*:*:*:*"
] | null | 5.4 | null | 5.5 | null |
|
GHSA-xxc2-vvph-qprf
|
An issue was discovered on D-Link DSL-3782 EU 1.01 devices. An authenticated user can pass a long buffer as a 'get' parameter to the '/userfs/bin/tcapi' binary (in the Diagnostics component) using the 'get <node_name attr>' function and cause memory corruption. Furthermore, it is possible to redirect the flow of the program and execute arbitrary code.
|
[] | null | null | 8.8 | null | null |
|
CVE-2018-10740
|
Axublog 1.1.0 allows remote Code Execution as demonstrated by injection of PHP code (contained in the webkeywords parameter) into the cmsconfig.php file.
|
[
"cpe:2.3:a:axublog:axublog:1.1.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2025-42994
|
Multiple vulnerabilities in SAP MDM Server
|
SAP MDM Server ReadString function allows an attacker to send specially crafted packets which could trigger a memory read access violation in the server process that would then fail and exit unexpectedly causing high impact on availability with no impact on confidentiality and integrity of the application.
|
[] | null | 7.5 | null | null | null |
CVE-2024-1360
|
The Colibri WP theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.94. This is due to missing or incorrect nonce validation on the colibriwp_install_plugin() function. This makes it possible for unauthenticated attackers to install recommended plugins via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[] | null | 4.3 | null | null | null |
|
GHSA-6jv4-h5x3-vxf3
|
Missing Authorization vulnerability in Zakaria Binsaifullah Easy Accordion Gutenberg Block allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Accordion Gutenberg Block: from n/a through 1.2.3.
|
[] | null | 4.3 | null | null | null |
|
CVE-2006-5286
|
Unspecified vulnerability in IKE.NLM in Novell BorderManager 3.8 allows attackers to cause a denial of service (crash) via unknown attack vectors related to "VPN issues" for certain "IKE and IPsec settings."
|
[
"cpe:2.3:a:novell:bordermanager:3.8:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-pp62-53mh-6rf2
|
A heap based buffer overflow vulnerability exits in GNU LibreDWG 0.10 via bit_search_sentinel ../../src/bits.c:1985.
|
[] | null | null | null | null | null |
|
GHSA-p66f-w4wx-5w76
|
Buffer overflow in Opera 6.01 allows remote attackers to cause a denial of service (crash) via an IMG tag with large width and height attributes.
|
[] | null | null | null | null | null |
|
GHSA-qccq-vp6j-f2x6
|
Sun ONE (aka iPlanet) Web Server 6 on Windows, when DNS resolution is enabled for client IP addresses, uses a logging format that does not identify whether a dotted quad represents an unresolved IP address, which allows remote attackers to spoof IP addresses via crafted DNS responses containing numerical top-level domains, as demonstrated by a forged 123.123.123.123 domain name, related to an "Inverse Lookup Log Corruption (ILLC)" issue.
|
[] | null | null | null | null | null |
|
GHSA-wwcg-f5f8-7hpj
|
In the Linux kernel, the following vulnerability has been resolved:ip: Fix data-races around sysctl_ip_prot_sock.sysctl_ip_prot_sock is accessed concurrently, and there is always a chance
of data-race. So, all readers and writers need some basic protection to
avoid load/store-tearing.
|
[] | null | 4.7 | null | null | null |
|
GHSA-gqqg-cjfr-pqq6
|
doorGets 7.0 has a sensitive information disclosure vulnerability in /setup/temp/admin.php and /setup/temp/database.php. A remote unauthenticated attacker could exploit this vulnerability to obtain the administrator password.
|
[] | null | null | 9.8 | null | null |
|
GHSA-ff96-c62j-3543
|
Multiple buffer overflows in the QIP Server Service (aka qipsrvr.exe) in LANDesk Management Suite, Security Suite, and Server Manager 8.8 and earlier allow remote attackers to execute arbitrary code via a crafted heal request, related to the StringToMap and StringSize arguments.
|
[] | null | null | null | null | null |
|
GHSA-3rmp-xjxw-cprh
|
A heap out of bounds read vulnerability exists in the OpenImageIO master-branch-9aeece7a when parsing the image file directory part of a PSD image file. A specially-crafted .psd file can cause a read of arbitrary memory address which can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability.
|
[] | null | 5.5 | null | null | null |
|
GHSA-qg9f-x569-p4r7
|
A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to reset the Autonomic Control Plane (ACP) of an affected system and view ACP packets that are transferred in clear text within an affected system, an Information Disclosure Vulnerability. More Information: CSCvd51214. Known Affected Releases: Denali-16.2.1 Denali-16.3.1.
|
[] | null | null | 6.5 | null | null |
|
GHSA-68mj-9pjq-mc85
|
Intermittent HTTP policy bypass
|
ImpactCilium's [HTTP policies](https://docs.cilium.io/en/stable/security/policy/language/#http) are not consistently applied to all traffic in the scope of the policies, leading to HTTP traffic being incorrectly and intermittently forwarded when it should be dropped.PatchesThis issue affects:Cilium v1.13 between v1.13.9 and v1.13.12 inclusiveCilium v1.14 between v1.14.0 and v1.14.7 inclusiveCilium v1.15.0 and v1.15.1This issue has been patched in:Cilium v1.15.2Cilium v1.14.8Cilium v1.13.13WorkaroundsThere is no workaround for this issue – affected users are strongly encouraged to upgrade.AcknowledgementsThe Cilium community has worked together with members of Isovalent to prepare these mitigations. Special thanks to @romikps for discovering and reporting this issue, and @sayboras and @jrajahalme for preparing the fix.For more informationIf you have any questions or comments about this advisory, please reach out on [Slack](https://docs.cilium.io/en/latest/community/community/#slack).If you think you have found a vulnerability affecting Cilium, we strongly encourage you to report it to our security mailing list at [[email protected]](mailto:[email protected]). This is a private mailing list for the Cilium internal security team, and your report will be treated as top priority.
|
[] | null | 7.2 | null | null | null |
RHSA-2014:0457
|
Red Hat Security Advisory: Django security update
|
python-django: unexpected code execution using reverse() python-django: caching of anonymous pages could reveal CSRF token python-django: MySQL typecasting
|
[
"cpe:/a:redhat:openstack:3::el6"
] | null | null | null | null | null |
CVE-2020-26552
|
An issue was discovered in Aviatrix Controller before R6.0.2483. Multiple executable files, that implement API endpoints, do not require a valid session ID for access.
|
[
"cpe:2.3:a:aviatrix:controller:5.3.1516:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-p8xj-6m3m-xgrv
|
In vsp driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
|
[] | null | 4.4 | null | null | null |
|
GHSA-f33v-j5fp-77mf
|
Cross-Site Request Forgery (CSRF) vulnerability in philippe No Disposable Email allows Stored XSS. This issue affects No Disposable Email: from n/a through 2.5.1.
|
[] | null | 7.1 | null | null | null |
|
CVE-2024-47506
|
Junos OS: SRX Series: A large amount of traffic being processed by ATP Cloud can lead to a PFE crash
|
A Deadlock vulnerability in the packet forwarding engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause a Denial of Service (DoS).
When a large amount of traffic is processed by ATP Cloud inspection, a deadlock can occur which will result in a PFE crash and restart. Whether the crash occurs, depends on system internal timing that is outside the attackers control.
This issue affects Junos OS on SRX Series:
* All versions before 21.3R3-S1,
* 21.4 versions before 21.4R3,
* 22.1 versions before 22.1R2,
* 22.2 versions before 22.2R1-S2, 22.2R2.
|
[] | 8.2 | 5.9 | null | null | null |
GHSA-5vm5-p8qx-8w4h
|
An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. An uninitialized kernel pool allocation in IOCTL 0xCA002813 allows a local unprivileged attacker to leak 16 bits of uninitialized kernel PagedPool data.
|
[] | null | null | 5.5 | null | null |
|
GHSA-x4x9-4c65-73w8
|
Concrete5 Vulnerable to Cross-Site Scripting (XSS)
|
Cross-site scripting (XSS) vulnerability in concrete5 Japanese 5.5.1 through 5.5.2.1 and concrete5 English 5.5.0 through 5.6.0.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | 5.3 | null | null | null | null |
GHSA-f6fp-4hh9-m34r
|
The dwarf_dealloc function in libdwarf before 20160923 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted DWARF section.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2025:1845
|
Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release
|
golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
|
[
"cpe:/a:redhat:trusted_artifact_signer:1.1::el9"
] | null | 8.2 | null | null | null |
CVE-2009-0107
|
Cross-site scripting (XSS) vulnerability in profile.php in PHPAuctions (aka PHPAuctionSystem) allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.
|
[
"cpe:2.3:a:phpauctions:phpauctions:_nil_:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-qx5q-f3h4-gpwc
|
zarafa-autorespond in Zarafa Collaboration Platform (ZCP) before 7.2.1 allows local users to gain privileges via a symlink attack on /tmp/zarafa-vacation-*.
|
[] | null | null | 8.4 | null | null |
|
GHSA-3x6r-4wcf-3pqj
|
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.6.4 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | 6.1 | null | null | null |
|
CVE-2025-23644
|
WordPress QuoteMedia Tools plugin <= 1.0 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Kuepper QuoteMedia Tools allows DOM-Based XSS.This issue affects QuoteMedia Tools: from n/a through 1.0.
|
[] | null | 6.5 | null | null | null |
GHSA-wrcj-j3mh-j7j2
|
CSRF exists in Hoosk 1.7.0 via /admin/users/new/add, resulting in account creation.
|
[] | null | null | 8.8 | null | null |
|
CVE-2019-10964
|
Medtronic MiniMed 508 and Paradigm Series Insulin Pumps Improper Access Control
|
Medtronic MiniMed Insulin Pumps
are designed to communicate using a wireless RF with other devices, such as blood glucose meters, glucose sensor transmitters, and CareLink USB devices. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with adjacent access to one of the affected insulin pump models can inject, replay, modify, and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery.
|
[
"cpe:2.3:o:medtronic:minimed_508_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_508:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_511_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_511:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_512_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_512:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_712_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_712e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_712e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_515_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_515:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_715_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_715:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_522_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_722_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_722:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_522k_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_522k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_722k_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_722k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_523_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_523:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_723_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_723:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_523k_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_523k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_723k_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_723k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_veo_554_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_veo_554:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_veo_754_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_veo_754:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_veo_554cm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_veo_554cm:*:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronic:minimed_paradigm_veo_754cm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronic:minimed_paradigm_veo_754cm:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
CVE-2024-20123
|
In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1569.
|
[
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*"
] | null | 4.4 | null | null | null |
|
GHSA-w9rv-xmf7-x3gh
|
Apache Kylin vulnerable to Command injection by Diagnosis Controller
|
Diagnosis Controller miss parameter validation, so user may attacked by command injection via HTTP Request.
|
[] | null | 9.8 | null | null | null |
GHSA-frv7-wqrj-85p7
|
Cross-Site Request Forgery (CSRF) vulnerability in wphobby Backwp allows Path Traversal. This issue affects Backwp: from n/a through 2.0.2.
|
[] | null | 7.4 | null | null | null |
|
CVE-2006-2380
|
Microsoft Windows 2000 SP4 does not properly validate an RPC server during mutual authentication over SSL, which allows remote attackers to spoof an RPC server, aka the "RPC Mutual Authentication Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-c5m9-pvx4-w42j
|
An issue was discovered in CMS Made Simple 2.2.8. In the module FrontEndUsers (in the file class.FrontEndUsersManipulate.php or class.FrontEndUsersManipulator.php), it is possible to reach an unserialize call with an untrusted __FEU__ cookie, and achieve authenticated object injection.
|
[] | null | null | 8.8 | null | null |
|
RHSA-2020:2116
|
Red Hat Security Advisory: buildah security and bug fix update
|
containers/image: Container images read entire image manifest into memory buildah: Crafted input tar file may lead to local file overwrite during image build process
|
[
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 8.8 | null | null | null |
CVE-2022-43692
|
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS - user can cause an administrator to trigger reflected XSS with a url if the targeted administrator is using an old browser that lacks XSS protection. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
|
[
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
RHSA-2016:1839
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 for RHEL 7
|
jakarta-taglibs-standard: XXE and RCE via XSL extension in JSTL XML tags eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el7"
] | null | null | 7.5 | null | null |
GHSA-p2rj-qgfh-h8m9
|
Active Directory Certificate Services Elevation of Privilege Vulnerability
|
[] | null | 7.8 | null | null | null |
|
RHSA-2016:1385
|
Red Hat Security Advisory: ceph security update
|
crash: mon_command crashes ceph monitors on receiving empty prefix
|
[
"cpe:/a:redhat:ceph_storage:1.3::ubuntu:14.04"
] | null | null | 4.9 | null | null |
GHSA-9568-6gjg-jgm8
|
Stack-based buffer overflow in Qualcomm WorldMail 3.0 allows remote attackers to execute arbitrary code via a long IMAP command that ends with a "}" character, as demonstrated using long (1) LIST, (2) LSUB, (3) SEARCH TEXT, (4) STATUS INBOX, (5) AUTHENTICATE, (6) FETCH, (7) SELECT, and (8) COPY commands.
|
[] | null | null | null | null | null |
|
GHSA-725m-pg3w-h3c9
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.28 and prior to 6.0.6. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[] | null | null | null | null | null |
|
GHSA-5rm8-v45q-4x6v
|
SQL injection vulnerability in models/category.php in the Weblinks component for Joomla! SVN 20070118 (com_weblinks) allows remote attackers to execute arbitrary SQL commands via the catid parameter.
|
[] | null | null | null | null | null |
|
RHSA-2013:0241
|
Red Hat Security Advisory: xen security update
|
xen: Xen domain builder Out-of-memory due to malicious kernel/ramdisk
|
[
"cpe:/a:redhat:rhel_virtualization:5::server",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
CVE-2019-14514
|
An issue was discovered in Microvirt MEmu all versions prior to 7.0.2. A guest Android operating system inside the MEmu emulator contains a /system/bin/systemd binary that is run with root privileges on startup (this is unrelated to Red Hat's systemd init program, and is a closed-source proprietary tool that seems to be developed by Microvirt). This program opens TCP port 21509, presumably to receive installation-related commands from the host OS. Because everything after the installer:uninstall command is concatenated directly into a system() call, it is possible to execute arbitrary commands by supplying shell metacharacters.
|
[
"cpe:2.3:a:microvirt:memu:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2023-21111
|
In several functions of PhoneAccountRegistrar.java, there is a possible way to prevent an access to emergency services due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-256819769
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 6.2 | null | null | null |
|
GHSA-whxc-8p42-x72j
|
The strHdrAcptLangGetItem function in errorpage.cc in Squid 3.2.x before 3.2.9 and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a "," character in an Accept-Language header.
|
[] | null | null | null | null | null |
|
GHSA-v4jq-vmcg-hffv
|
ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field, scope is changed. The vulnerable component is restricted to internal IP addresses.
|
[] | null | 4.3 | null | null | null |
|
GHSA-fmwc-8v8w-36mr
|
Cisco IOS XE 15.4(3)S on ASR 1000 devices improperly loads software packages, which allows local users to bypass license restrictions and obtain certain root privileges by using the CLI to enter crafted filenames, aka Bug ID CSCuv93130.
|
[] | null | null | null | null | null |
|
CVE-2025-4413
|
Pixabay Images <= 3.4 - Authenticated (Author+) Arbitrary File Upload
|
The Pixabay Images plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the pixabay_upload function in all versions up to, and including, 3.4. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[] | null | 8.8 | null | null | null |
GHSA-w3gh-fwx6-wrpj
|
Lexmark X, W, T, E, C, 6500e, and 25xxN devices before 2011-11-15 allow attackers to obtain sensitive information via a hidden email address in a Scan To Email shortcut.
|
[] | null | null | null | null | null |
|
cisco-sa-20180620-firepower-csrf
|
Cisco Firepower Management Center Cross-Site Request Forgery Vulnerability
|
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected device.
The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions on the targeted device via a web browser and with the privileges of the user.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-firepower-csrf"]
|
[] | null | null | 5.3 | null | null |
CVE-2006-2864
|
Multiple PHP remote file inclusion vulnerabilities in BlueShoes Framework 4.6 allow remote attackers to execute arbitrary PHP code via a URL in the (1) APP[path][applications] parameter to (a) Bs_Faq.class.php, (2) APP[path][core] parameter to (b) fileBrowserInner.php, (c) file.php, and (d) viewer.php, and (e) Bs_ImageArchive.class.php, (3) GLOBALS[APP][path][core] parameter to (f) Bs_Ml_User.class.php, or (4) APP[path][plugins] parameter to (g) Bs_Wse_Profile.class.php.
|
[
"cpe:2.3:a:blueshoes:blueshoes_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:blueshoes:blueshoes_framework:4.5:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
CVE-2020-10607
|
In Advantech WebAccess, Versions 8.4.2 and prior. A stack-based buffer overflow vulnerability caused by a lack of proper validation of the length of user-supplied data may allow remote code execution.
|
[
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
CVE-2022-0662
|
Adrotate < 5.8.23 - Admin+ XSS via Advert Name
|
The AdRotate WordPress plugin before 5.8.23 does not sanitise and escape Advert Names which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
|
[
"cpe:2.3:a:ajdg:adrotate:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 | null |
CVE-2024-5531
|
Ocean Extra <= 2.2.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via Flickr Widget
|
The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Flickr widget in all versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
GHSA-59hp-pm4h-6xr4
|
The affected product DIAEnergie (versions prior to v1.9.01.002) is vulnerable to a stored cross-site scripting vulnerability through the PutLineMessageSetting API.
|
[] | null | 5.4 | null | null | null |
|
GHSA-5h59-75vf-973c
|
In the Linux kernel, the following vulnerability has been resolved:scsi: mpi3mr: Sanitise num_physInformation is stored in mr_sas_port->phy_mask, values larger then size of
this field shouldn't be allowed.
|
[] | null | 7.8 | null | null | null |
|
GHSA-w3vp-cj4w-cr75
|
Cross-site scripting (XSS) vulnerability in Business Space in IBM Business Process Manager 7.5 through 7.5.1.2, 8.0 through 8.0.1.3, and 8.5 before 8.5.7.0 CF2016.09 allows remote authenticated users to inject arbitrary web script or HTML via crafted content.
|
[] | null | null | 5.4 | null | null |
|
GHSA-qgmp-4vvj-6ggw
|
Improper Privilege Management vulnerability in favethemes Houzez Login Register allows Privilege Escalation.This issue affects Houzez Login Register: from n/a through 2.6.3.
|
[] | null | 9.8 | null | null | null |
|
GHSA-q98p-p2wf-ffqv
|
A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.
|
[] | 8.4 | 7.8 | null | null | null |
|
GHSA-8vqq-hvqj-qc49
|
Stack-based buffer overflow in the Ultra.OfficeControl ActiveX control in OfficeCtrl.ocx 2.0.2008.801 in Ultra Shareware Ultra Office Control allows remote attackers to execute arbitrary code via long strUrl, strFile, and strPostData parameters to the HttpUpload method.
|
[] | null | null | null | null | null |
|
GHSA-gfxm-8755-8v5r
|
WebContainer.exe 1.0.0.336 and earlier in SLMail Pro 6.3.1.0 and earlier allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a long URI in HTTP requests to TCP port 801. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-mpxg-5frr-vc3r
|
The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles.
|
[] | null | null | null | null | null |
|
CVE-2023-1152
|
SQLi in Utarit Persolus
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Utarit Information Technologies Persolus allows SQL Injection. This issue affects Persolus: before 2.03.93.
|
[
"cpe:2.3:a:utarit:persolus:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
PYSEC-2014-55
| null |
zip.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly enforce access restrictions when including content in a zip archive, which allows remote attackers to obtain sensitive information by reading a generated archive.
|
[] | null | null | null | null | null |
CVE-2025-1445
|
A vulnerability exists in RTU IEC 61850 client and server functionality that could impact the availability if renegotiation of an open IEC61850 TLS connection takes place in specific timing situations, when IEC61850 communication is active.
Precondition is that IEC61850 as client or server are configured using TLS on RTU500 device. It affects the CMU the IEC61850 stack is configured on.
|
[] | 8.7 | 7.5 | null | null | null |
|
GHSA-qgjh-xmjv-7xqp
|
An issue was discovered in GNU Binutils 2.34. It is a memory leak when process microblaze-dis.c. This one will consume memory on each insn disassembled.
|
[] | null | 5.5 | null | null | null |
|
CVE-2023-40931
|
A SQL injection vulnerability in Nagios XI from version 5.11.0 up to and including 5.11.1 allows authenticated attackers to execute arbitrary SQL commands via the ID parameter in the POST request to /nagiosxi/admin/banner_message-ajaxhelper.php
|
[
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-gc26-wqwp-qr8c
|
TOTOLINK A3002R V4.0.0-B20230531.1404 is vulnerable to Command Injection in /bin/boa via bandstr.
|
[] | null | 9.8 | null | null | null |
|
GHSA-9262-6whg-g7rv
|
Cross-site scripting (XSS) vulnerability in the API in the Simplenews module 6.x-1.x before 6.x-1.5 and 7.x-1.x before 7.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via an email address.
|
[] | null | null | null | null | null |
|
GHSA-9vq2-w47q-3pjh
|
A path deletion vulnerability was addressed by preventing vulnerable code from running with privileges. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An app may be able to bypass Privacy preferences.
|
[] | null | 7.1 | null | null | null |
|
GHSA-cxrj-66c5-9fmh
|
Spring Framework when used in combination with any versions of Spring Security contains an authorization bypass
|
Spring Framework version 5.0.5 when used in combination with any versions of Spring Security contains an authorization bypass when using method security. An unauthorized malicious user can gain unauthorized access to methods that should be restricted.
|
[] | null | null | 8.8 | null | null |
CVE-2022-23196
|
Adobe Illustrator Out-of-bounds Read could lead to Memory leak
|
Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2014-4495
|
The kernel in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not enforce the read-only attribute of a shared memory segment during use of a custom cache mode, which allows attackers to bypass intended access restrictions via a crafted app.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2014-3571
|
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
|
[
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2012-4401
|
Moodle 2.2.x before 2.2.5 and 2.3.x before 2.3.2 allows remote authenticated users to bypass intended capability restrictions and perform certain topic changes by leveraging course-editing capabilities.
|
[
"cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
ICSA-18-270-04
|
Delta Electronics Delta Industrial Automation PMSoft
|
An out-of-bounds read vulnerability can be executed when processing project files, which may allow an attacker to read confidential information.CVE-2018-14824 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
|
[] | null | null | 4.3 | null | null |
CVE-2019-5990
|
Access analysis CGI An-Analyzer released in 2019 June 24 and earlier allow remote attackers to obtain a login password via HTTP referer.
|
[
"cpe:2.3:a:anglers-net:cgi_an-anlyzer:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2018-5132
|
The Find API for WebExtensions can search some privileged pages, such as "about:debugging", if these pages are open in a tab. This could allow a malicious WebExtension to search for otherwise protected data if a user has it open. This vulnerability affects Firefox < 59.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
GHSA-23gw-f65f-5rw8
|
The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
|
[] | null | null | 5.9 | null | null |
|
CVE-2018-1160
|
Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
|
[
"cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2021-38513
|
Certain NETGEAR devices are affected by authentication bypass. This affects RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, RBS850 before 3.2.10.11, CBR40 before 2.5.0.10, EAX20 before 1.0.0.48, MK62 before 1.0.6.110, MR60 before 1.0.6.110, MS60 before 1.0.6.110, RBK752 before 3.2.10.10, RBR750 before 3.2.10.10, and RBS750 before 3.2.10.10.
|
[
"cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:eax20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:eax20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*"
] | null | 9.6 | null | null | null |
|
GHSA-w3p9-g499-4448
|
Task Scheduler in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allows local users to gain privileges via a crafted UNC pathname in a task, aka "Task Scheduler Elevation of Privilege Vulnerability."
|
[] | null | null | 7.8 | null | null |
|
GHSA-q3g2-95m7-256q
|
In Android for MSM, Firefox OS for MSM, and QRD Android with all Android releases from CAF using the Linux kernel while trying to find out total number of partition via a non zero check, there could be possibility where the 'TotalPart' could cross 'GptHeader->MaxPtCnt' and which could result in OOB write in patching GPT.
|
[] | null | null | 7.8 | null | null |
|
CVE-2021-36308
|
Networking OS10, versions prior to October 2021 with Smart Fabric Services enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.
|
[
"cpe:2.3:o:dell:networking_os10:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
|
CVE-2021-1164
|
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
|
[
"cpe:2.3:o:cisco:rv110w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv130w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_extension_platform:1.0.3.55:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
CVE-2010-2992
|
packet-gsm_a_rr.c in the GSM A RR dissector in Wireshark 1.2.2 through 1.2.9 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference.
|
[
"cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-h4xj-2f5c-36j7
|
Ashlar-Vellum Cobalt CO File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24867.
|
[] | null | null | 7.8 | null | null |
|
GHSA-qx2f-477c-35rq
|
method-override ReDoS when untrusted user input passed into X-HTTP-Method-Override header
|
Affected versions of `method-override` are vulnerable to a regular expression denial of service vulnerability when untrusted user input is passed into the `X-HTTP-Method-Override` header.RecommendationUpdate to version 2.3.10 or later
|
[] | null | null | 7.5 | null | null |
GHSA-98mf-83qw-2xg8
|
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-27936
|
Deno interactive permission prompt spoofing via improper ANSI stripping
|
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41.0 of the deno library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41.0 of the deno library contains a patch for the issue.
|
[
"cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*",
"cpe:2.3:a:deno:deno_runtime:*:*:*:*:*:rust:*:*"
] | null | 8.8 | null | null | null |
CVE-2025-6646
|
PDF-XChange Editor U3D File Parsing Use-After-Free Information Disclosure Vulnerability
|
PDF-XChange Editor U3D File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26643.
|
[] | null | null | 3.3 | null | null |
CVE-2010-1641
|
The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
|
[
"cpe:2.3:o:linux:linux_kernel:*:git9:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.24:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:git1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:git2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:git3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:git4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:git5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:git6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:git7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:git8:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.34:rc7:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
RHSA-2020:5342
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.4 security update
|
hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 7.5 | null | null | null |
GHSA-c927-pmgv-cmrp
|
SmcGui.exe in Sygate Protection Agent 5.0 build 6144 allows local users to obtain management control over the agent by executing the GUI (SmcGui.exe) and then killing the process, which causes the privileged management GUI to launch.
|
[] | null | null | null | null | null |
|
CVE-2021-30630
|
Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
CVE-2012-3741
|
The Restrictions (aka Parental Controls) implementation in Apple iOS before 6 does not properly handle purchase attempts after a Disable Restrictions action, which allows local users to bypass an intended Apple ID authentication step via an app that performs purchase transactions.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*"
] | null | null | null | 1.9 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.