id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2015-0351
|
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0358, and CVE-2015-3039.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_workstation_extension:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-9hfg-247m-vwx7
|
Net Tools PKI Server does not properly restrict access to remote attackers when the XUDA template files do not contain absolute pathnames for other files.
|
[] | null | null | null | null | null |
|
CVE-2005-0061
|
The kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-6vrv-94jv-crrg
|
Context isolation bypass via Promise in Electron
|
ImpactApps using `contextIsolation` are affected.This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.WorkaroundsThere are no app-side workarounds, you must update your Electron version to be protected.Fixed Versions`9.0.0-beta.21``8.2.4``7.2.4``6.1.11`For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
|
[] | null | 6.8 | null | null | null |
CVE-2023-41167
|
@webiny/react-rich-text-renderer before 5.37.2 allows XSS attacks by content managers. This is a react component to render data coming from Webiny Headless CMS and Webiny Form Builder. Webiny is an open-source serverless enterprise CMS. The @webiny/react-rich-text-renderer package depends on the editor.js rich text editor to handle rich text content. The CMS stores rich text content from the editor.js into the database. When the @webiny/react-rich-text-renderer is used to render such content, it uses the dangerouslySetInnerHTML prop, without applying HTML sanitization. The issue arises when an actor, who in this context would specifically be a content manager with access to the CMS, inserts a malicious script as part of the user-defined input. This script is then injected and executed within the user's browser when the main page or admin page loads.
|
[
"cpe:2.3:a:webiny:webiny:*:*:*:*:*:node.js:*:*"
] | null | 4.8 | null | null | null |
|
CVE-2019-17574
|
An issue was discovered in the Popup Maker plugin before 1.8.13 for WordPress. An unauthenticated attacker can partially control the arguments of the do_action function to invoke certain popmake_ or pum_ methods, as demonstrated by controlling content and delivery of popmake-system-info.txt (aka the "support debug text file").
|
[
"cpe:2.3:a:code-atlantic:popup_maker:*:*:*:*:*:wordpress:*:*"
] | null | 9.1 | null | 6.4 | null |
|
CVE-2010-0951
|
SQL injection vulnerability in go_target.php in dev4u CMS allows remote attackers to execute arbitrary SQL commands via the kontent_id parameter.
|
[
"cpe:2.3:a:dev4u:dev4u_cms:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-wrmv-c556-947x
|
VsaVb7rt.dll in Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in February 2014, aka "VSAVB7RT ASLR Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2005-2699
|
Unrestricted file upload vulnerability in admin/admin.php in PHPKit 1.6.1 allows remote authenticated administrators to execute arbitrary PHP code by uploading a .php file to the content/images/ directory using images.php. NOTE: if a PHPKit administrator must already have access to the end system to install or modify configuration of the product, then this issue might not cross privilege boundaries, and should not be included in CVE.
|
[
"cpe:2.3:a:phpkit:phpkit:1.6.1:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
CVE-2014-10079
|
In Vembu StoreGrid 4.4.x, the front page of the server web interface leaks the private IP address in the "ipaddress" hidden form value of the HTML source code, which is disclosed because of incorrect processing of an index.php/ trailing slash.
|
[
"cpe:2.3:a:vembu:storegrid:4.4:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
CVE-2010-2819
|
Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61622.
|
[
"cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-p5mc-228w-wjfm
|
Failure to initialize the extra buffer can lead to an out of buffer access in WLAN function in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24
|
[] | null | null | 9.8 | null | null |
|
CVE-1999-0987
|
Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name.
|
[
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2018-0835
|
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
|
[
"cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null |
|
GHSA-j2m8-jf3j-3grm
|
Multiple cross-site scripting (XSS) vulnerabilities in (1) comersus_customerAuthenticateForm.asp, (2) comersus_backoffice_message.asp, (3) comersus_supportError.asp, or (4) comersus_message.asp in Comersus Cart 5.09 allow remote attackers to execute web script as other users via the message parameter.
|
[] | null | null | null | null | null |
|
GHSA-q26f-7q9x-36jm
|
zzcms 8.3 has CSRF via the admin/adminadd.php?action=add URI.
|
[] | null | null | 8.8 | null | null |
|
CVE-2024-23226
|
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, tvOS 17.4. Processing web content may lead to arbitrary code execution.
|
[
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ios:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-41818
|
ReDOS at currency parsing fast-xml-parser
|
fast-xml-parser is an open source, pure javascript xml parser. a ReDOS exists on currency.js. This vulnerability is fixed in 4.4.1.
|
[
"cpe:2.3:a:naturalintelligence:fast_xml_parser:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fast-xml-parser_project:fast-xml-parser:4.2.4:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | null | null |
CVE-2006-7033
|
Cross-site scripting (XSS) vulnerability in Super Link Exchange Script 1.0 allows remote attackers to inject arbitrary web script or HTML via IMG tags in the search box.
|
[
"cpe:2.3:a:super_link_exchange_script:super_link_exchange_script:1.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-8j5w-fjfh-p6w3
|
In teei, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06664675; Issue ID: ALPS06664675.
|
[] | null | 6.7 | null | null | null |
|
CVE-2024-6364
|
Server Identity Validation Bypass in Absolute Persistence®
|
A vulnerability in Absolute Persistence® versions before 2.8 exists when it is not activated. This may allow a skilled attacker with both physical access to the device, and full hostile network control, to initiate OS commands on the device. To remediate this vulnerability, update the device firmware to the latest available version. Please contact the device manufacturer for upgrade instructions or contact Absolute Security, see reference below.
|
[] | 6.9 | null | null | null | null |
GHSA-j82f-chfp-3hrg
|
Microsoft Message Queuing Denial of Service Vulnerability
|
[] | null | 6.5 | null | null | null |
|
CVE-2011-5101
|
The Rumor technology in McAfee SaaS Endpoint Protection before 5.2.4 allows remote attackers to relay e-mail messages via unspecified vectors, as demonstrated by relaying spam.
|
[
"cpe:2.3:a:mcafee:saas_endpoint_protection:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:saas_endpoint_protection:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:saas_endpoint_protection:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:saas_endpoint_protection:5.2.2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-7v37-jxmg-g85v
|
KLiK SocialMediaWebsite Version 1.0.1 has XSS vulnerabilities that allow attackers to store XSS via location input reply-form.
|
[] | null | 5.4 | null | null | null |
|
GHSA-6wj9-53h7-6h32
|
Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.
|
[] | null | null | 9.8 | null | null |
|
CVE-2022-30326
|
An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The network pre-shared key field on the web interface is vulnerable to XSS. An attacker can use a simple XSS payload to crash the basic.config page of the web interface.
|
[
"cpe:2.3:o:trendnet:tew-831dr_firmware:1.0_601.130.1.1356:*:*:*:*:*:*:*",
"cpe:2.3:h:trendnet:tew-831dr:-:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-hfgv-wmc3-7jwm
|
The Simple Photoswipe WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4 | null | null | null |
|
CVE-2006-6395
|
Multiple memory leaks in Ulrik Petersen Emdros Database Engine before 1.2.0.pre231 allow local users to cause a denial of service (memory consumption) via unspecified vectors, a different issue than CVE-2005-0415.
|
[
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre142:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre143:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre155:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre160:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre167:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre172:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre195:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre206:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre218:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre222:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre225:*:*:*:*:*:*:*",
"cpe:2.3:a:ulrik_petersen:emrdos_database_engine:1.2.0.pre230:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-cg6q-gp23-vwx8
|
Jenkins Crowd 2 Integration Plugin stored credentials in plain text
|
An insufficiently protected credentials vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java, CrowdConfigurationService.java that allows attackers with local file system access to obtain the credentials used to connect to Crowd 2.
|
[] | null | null | 7.8 | null | null |
CVE-2024-6163
|
local IP restriction of internal HTTP endpoints
|
Certain http endpoints of Checkmk in Checkmk < 2.3.0p10 < 2.2.0p31, < 2.1.0p46, <= 2.0.0p39 allows remote attacker to bypass authentication and access data
|
[
"cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p45:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
GHSA-jhj6-5mh6-4pvf
|
Denial-of-Service within Docker container
|
ImpactIf you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn't get process ID and process group ID of teler properly to kills.Specific Go Packages Affectedktbs.dev/teler/pkg/errorsPatchesUpgrade to the >= 0.0.1 version.WorkaroundsN/AReferenceshttps://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7eFor more informationIf you have any questions or comments about this advisory:Open an issue in [Issues Section](https://github.com/kitabisa/teler/issues)Email us at [[email protected]](mailto:[email protected])
|
[] | null | 5.9 | null | null | null |
GHSA-r3qr-6c5q-pr77
|
Reflected Cross-Site Scripting (XSS) vulnerability in HadSky v7.6.3, allows remote attackers to execute arbitrary code and obtain sensitive information via the chklogin.php component .
|
[] | null | 6.1 | null | null | null |
|
CVE-2022-27802
|
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
|
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] | null | null | 7.8 | null | null |
GHSA-q3g5-m4jc-57wr
|
Adobe InDesign versions 17.1 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2024-26296
|
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
|
[
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.12.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2025-32407
|
Samsung Internet for Galaxy Watch version 5.0.9, available up until Samsung Galaxy Watch 3, does not properly validate TLS certificates, allowing for an attacker to impersonate any and all websites visited by the user. This is a critical misconfiguration in the way the browser validates the identity of the server. It negates the use of HTTPS as a secure channel, allowing for Man-in-the-Middle attacks, stealing sensitive information or modifying incoming and outgoing traffic. NOTE: This vulnerability is in an end-of-life product that is no longer maintained by the vendor.
|
[] | null | 5.9 | null | null | null |
|
GHSA-3vxj-947v-9gfh
|
Unverified Password Change in GitHub repository instantsoft/icms2 prior to 2.16.1-git.
|
[] | null | null | 4.3 | null | null |
|
CVE-2021-30683
|
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A malicious application could execute arbitrary code leading to compromise of user information.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2021-33537
|
WEIDMUELLER: WLAN devices affected by Remote Code Execution (RCE) vulnerability
|
In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
|
[
"cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-vpwf-h6qc-fgqp
|
OMICARD EDM’s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2023:4176
|
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
|
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 3.7 | null | null | null |
CVE-2021-31171
|
Microsoft SharePoint Information Disclosure Vulnerability
|
Microsoft SharePoint Information Disclosure Vulnerability
|
[
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"
] | null | 4.1 | null | null | null |
GHSA-9p98-f95f-j7rf
|
Directory traversal vulnerability in am.pl in SQL-Ledger 2.6.27 only checks for the presence of a NULL (%00) character to protect against directory traversal attacks, which allows remote attackers to run arbitrary executables and bypass authentication via a .. (dot dot) sequence in the login parameter.
|
[] | null | null | null | null | null |
|
GHSA-mr8p-cqx3-hgmp
|
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0358, and CVE-2015-3039.
|
[] | null | null | null | null | null |
|
CVE-2020-1961
|
Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered.
|
[
"cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
RHSA-2022:8900
|
Red Hat Security Advisory: grub2 security update
|
grub2: Integer underflow in grub_net_recv_ip4_packets
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.1 | null | null | null |
GHSA-35q2-47q7-3pc3
|
Node-Redis potential exponential regex in monitor mode
|
ImpactWhen a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service.PatchesThe problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e) and was released in version `3.1.1`.References#1569 (GHSL-2021-026)
|
[] | null | 7.5 | null | null | null |
CVE-2024-31424
|
WordPress Login with Phone Number plugin <= 1.6.93 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Hamid Alinia - idehweb Login with phone number.This issue affects Login with phone number: from n/a through 1.6.93.
|
[
"cpe:2.3:a:idehweb:login_with_phone_number:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null |
GHSA-wvgm-548x-hh75
|
Adobe Bridge version 11.0.2 (and earlier) are affected by a Heap-based Buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | null | null | null | null |
|
GHSA-9879-5jr5-xwq3
|
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_id POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
|
[] | null | 6.5 | null | null | null |
|
CVE-2015-3171
|
sosreport 3.2 uses weak permissions for generated sosreport archives, which allows local users with access to /var/tmp/ to obtain sensitive information by reading the contents of the archive.
|
[
"cpe:2.3:a:sos_project:sos:3.2:-:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
CVE-2018-1000886
|
nasm version 2.14.01rc5, 2.15 contains a Buffer Overflow vulnerability in asm/stdscan.c:130 that can result in Stack-overflow caused by triggering endless macro generation, crash the program. This attack appear to be exploitable via a crafted nasm input file.
|
[
"cpe:2.3:a:nasm:netwide_assembler:2.14.01rc5:*:*:*:*:*:*:*",
"cpe:2.3:a:nasm:netwide_assembler:2.15:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2023-35940
|
GLPI vulnerable to unauthenticated access to Dashboard data
|
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a file allows an unauthenticated user to be able to access dashboards data. Version 10.0.8 contains a patch for this issue.
|
[
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-qwvx-h2c6-26qm
|
Multiple cross-site scripting (XSS) vulnerabilities in install_classic.php in Coppermine Photo Gallery (CPG) 1.5.36 allow remote attackers to inject arbitrary web script or HTML via the (1) admin_username, (2) admin_password, (3) admin_email, (4) dbserver, (5) dbname, (6) dbuser, (7) dbpass, (8) table_prefix, or (9) impath parameter.
|
[] | null | null | null | null | null |
|
CVE-2023-0851
|
Buffer overflow in CPCA Resource Download process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
|
[
"cpe:2.3:o:canon:mf642cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf642cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf644cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf644cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf741cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf741cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf743cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf743cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf745cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf745cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp621c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp621c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp622c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp622c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp661c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp661c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp662c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp662c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp664c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp664c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf1127c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf1127c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf262dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf262dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf264dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf264dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf267dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf267dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf269dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf269dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf269dw_vp_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf269dw_vp_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf272dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf272dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf273dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf273dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf275dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf275dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf641cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf641cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf746cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf746cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp122dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp122dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp1127c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp1127c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp622cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp622cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp623cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp623cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp664cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp664cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:imageprograf_tc-20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:imageprograf_tc-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:imageprograf_tc-20m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:imageprograf_tc-20m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:pixma_g3270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:pixma_g3270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:pixma_g4270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:pixma_g4270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:maxify_gx3020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:maxify_gx3020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:maxify_gx4020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:maxify_gx4020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp621cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp621cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp623cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp623cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp633cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp633cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp664cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp664cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf641cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf641cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf643cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf643cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf645cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf645cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf742cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf742cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf744cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf744cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf746cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf746cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127if_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127if:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127p:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2017-17436
|
An issue was discovered in the software on Vaultek Gun Safe VT20i products. There is no encryption of the session between the Android application and the safe. The website and marketing materials advertise that this communication channel is encrypted with "Highest Level Bluetooth Encryption" and "Data transmissions are secure via AES256 bit encryption." These claims, however, are not true. Moreover, AES256 bit encryption is not supported in the Bluetooth Low Energy (BLE) standard, so it would have to be at the application level. This lack of encryption allows an individual to learn the passcode by eavesdropping on the communications between the application and the safe.
|
[
"cpe:2.3:o:vaulteksafe:vt20i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:vaulteksafe:vt20i:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 3.3 | null |
|
RHSA-2013:1264
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
Kernel: usb: chipidea: Allow disabling streaming not just in udc mode Kernel: signal: information leak in tkill/tgkill Kernel: perf/x86: offcore_rsp valid mask for SNB/IVB Kernel: cpqarray/cciss: information leak via ioctl Kernel: fanotify: info leak in copy_event_to_user Kernel: information leak in cdrom driver Kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg Kernel: net: information leak in AF_KEY notify Kernel: net: af_key: initialize satype in key_notify_policy_flush kernel: iscsi-target: heap buffer overflow on large key error kernel: block: passing disk names as format strings kernel: b43: format string leaking into error msgs Kernel: tracing: NULL pointer dereference Kernel: net: panic while pushing pending data out of a IPv6 socket with UDP_CORK enabled Kernel: net: panic while appending data to a corked IPv6 socket in ip6_append_data_mtu
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null | null |
GHSA-h27q-m239-g8g2
|
SQL injection vulnerability in the Prince Clan Chess Club (com_pcchess) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the game_id parameter in a showgame action to index.php, a different vector than CVE-2008-0761.
|
[] | null | null | null | null | null |
|
CVE-2023-6638
|
The GTG Product Feed for Shopping plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_settings' function in versions up to, and including, 1.2.4. This makes it possible for unauthenticated attackers to update plugin settings.
|
[
"cpe:2.3:a:gutengeek:gg_woo_feed:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2011-5123
|
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
|
[
"cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
"cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-5h6v-mjfp-cvcm
|
Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the Textbook parameter at /admin/modify.php.
|
[] | null | 8.8 | null | null | null |
|
GHSA-qhfv-pjhr-x49x
|
Stack-based buffer overflow in getnnmdata.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via an invalid MaxAge parameter.
|
[] | null | null | null | null | null |
|
GHSA-9mm8-854r-8wvw
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in imithemes Eventer allows Blind SQL Injection. This issue affects Eventer: from n/a through 3.9.6.
|
[] | null | 9.3 | null | null | null |
|
GHSA-m287-97qh-jhg2
|
Razor v0.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the function uploadchannel().
|
[] | null | 6.1 | null | null | null |
|
GHSA-fmq6-9542-5m95
|
Due to the use of non-time-constant comparison functions there is issue in timing side channels which can be used as a potential side channel for SUI corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCS404, QCS405, QCS605, QM215, SA6155P, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
|
[] | null | null | null | null | null |
|
CVE-2018-7260
|
Cross-site scripting (XSS) vulnerability in db_central_columns.php in phpMyAdmin before 4.7.8 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
|
[
"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
CVE-2013-0313
|
The evm_update_evmxattr function in security/integrity/evm/evm_crypto.c in the Linux kernel before 3.7.5, when the Extended Verification Module (EVM) is enabled, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an attempted removexattr operation on an inode of a sockfs filesystem.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*"
] | null | null | null | 6.2 | null |
|
GHSA-v24g-4g4h-6h7f
|
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing the QCA_NL80211_VENDOR_SUBCMD_SET_TXPOWER_SCALE_DECR_DB vendor command, in which attribute QCA_WLAN_VENDOR_ATTR_TXPOWER_SCALE_DECR_DB contains fewer than 1 byte, a buffer overrun occurs.
|
[] | null | null | 7.8 | null | null |
|
CVE-2021-47613
|
i2c: virtio: fix completion handling
|
In the Linux kernel, the following vulnerability has been resolved:
i2c: virtio: fix completion handling
The driver currently assumes that the notify callback is only received
when the device is done with all the queued buffers.
However, this is not true, since the notify callback could be called
without any of the queued buffers being completed (for example, with
virtio-pci and shared interrupts) or with only some of the buffers being
completed (since the driver makes them available to the device in
multiple separate virtqueue_add_sgs() calls).
This can lead to incorrect data on the I2C bus or memory corruption in
the guest if the device operates on buffers which are have been freed by
the driver. (The WARN_ON in the driver is also triggered.)
BUG kmalloc-128 (Tainted: G W ): Poison overwritten
First byte 0x0 instead of 0x6b
Allocated in i2cdev_ioctl_rdwr+0x9d/0x1de age=243 cpu=0 pid=28
memdup_user+0x2e/0xbd
i2cdev_ioctl_rdwr+0x9d/0x1de
i2cdev_ioctl+0x247/0x2ed
vfs_ioctl+0x21/0x30
sys_ioctl+0xb18/0xb41
Freed in i2cdev_ioctl_rdwr+0x1bb/0x1de age=68 cpu=0 pid=28
kfree+0x1bd/0x1cc
i2cdev_ioctl_rdwr+0x1bb/0x1de
i2cdev_ioctl+0x247/0x2ed
vfs_ioctl+0x21/0x30
sys_ioctl+0xb18/0xb41
Fix this by calling virtio_get_buf() from the notify handler like other
virtio drivers and by actually waiting for all the buffers to be
completed.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2012-1195
|
Unrestricted file upload vulnerability in andesk/managementsuite/core/core.anonymous/ServerSetup.asmx in the ServerSetup web service in Lenovo ThinkManagement Console 9.0.3 allows remote attackers to execute arbitrary code by uploading a file with an executable extension via a PutUpdateFileCore command in a RunAMTCommand SOAP request, then accessing the file via a direct request to the file in the web root.
|
[
"cpe:2.3:a:landesk:lenovo_thinkmanagement_console:9.0.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-j4vf-xvhv-4x76
|
Stack-based buffer overflow in PDF Form Filling and Flattening Tool before 3.1.0.12 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long field names.
|
[] | null | null | null | null | null |
|
CVE-2024-24576
|
Rusts's `std::process::Command` did not properly escape arguments of batch files on Windows
|
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected.
The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument.
On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted.
One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution.
Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process.
The fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.
|
[
"cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*"
] | null | 10 | null | null | null |
CVE-2023-0737
|
CSRF in wallabag/wallabag
|
wallabag version 2.5.2 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to arbitrarily delete user accounts via the /account/delete endpoint. This issue is fixed in version 2.5.4.
|
[
"cpe:2.3:a:wallabag:wallabag:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wallabag:wallabag:2.5.2:*:*:*:*:*:*:*"
] | null | null | 6.5 | null | null |
CVE-2006-6311
|
Microsoft Internet Explorer 6.0.2900.2180 allows remote attackers to cause a denial of service via a style attribute in an HTML table tag with a width value that is dynamically calculated using JavaScript.
|
[
"cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-w2q8-9gm9-xjhh
|
Cross-Site Request Forgery (CSRF) vulnerability in mandegarweb Replace Default Words allows Stored XSS. This issue affects Replace Default Words: from n/a through 1.3.
|
[] | null | 7.1 | null | null | null |
|
CVE-2005-4607
|
Cross-site scripting (XSS) vulnerability in index.php in BugPort 1.147 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) ids[0], (2) action, (3) report_id, (4) devWherePair[1][1], and (5) binds[0] parameters.
|
[
"cpe:2.3:a:incogen:bugport:1.039:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.040:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.041:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.042:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.043:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.044:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.045:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.046:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.047:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.048:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.049:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.050:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.051:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.052:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.053:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.054:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.055:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.056:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.057:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.058:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.059:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.060:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.061:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.062:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.063:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.064:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.065:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.066:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.067:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.068:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.069:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.070:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.071:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.072:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.073:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.074:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.075:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.076:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.077:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.078:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.079:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.080:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.081:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.082:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.083:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.084:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.085:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.086:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.087:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.088:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.089:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.090:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.091:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.092:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.093:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.094:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.095:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.096:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.097:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.098:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.099:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.101:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.102:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.104:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.107:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.108:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.109:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.110:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.111:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.112:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.113:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.114:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.115:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.116:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.117:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.118:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.119:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.120:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.121:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.122:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.123:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.124:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.125:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.126:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.127:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.128:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.129:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.130:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.131:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.132:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.133:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.134:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.135:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.136:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.137:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.138:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.139:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.140:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.141:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.142:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.143:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.144:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.145:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.146:*:*:*:*:*:*:*",
"cpe:2.3:a:incogen:bugport:1.147:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-mj3q-p8fw-g73r
|
A possible buffer overflow vulnerability in NPU driver prior to SMR JUN-2021 Release 1 allows arbitrary memory write and code execution.
|
[] | null | null | null | null | null |
|
CVE-2024-35930
|
scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
|
In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
The call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an
unsuccessful status. In such cases, the elsiocb is not issued, the
completion is not called, and thus the elsiocb resource is leaked.
Check return value after calling lpfc_sli4_resume_rpi() and conditionally
release the elsiocb resource.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-3r6m-7q2m-f6qj
|
In the Linux kernel, the following vulnerability has been resolved:soc: amlogic: Fix refcount leak in meson-secure-pwrc.cIn meson_secure_pwrc_probe(), there is a refcount leak in one fail
path.
|
[] | null | null | null | null | null |
|
CVE-2021-20501
|
IBM i 7.1, 7.2, 7.3, and 7.4 SMTP allows a network attacker to send emails to non-existent local-domain recipients to the SMTP server, caused by using a non-default configuration. An attacker could exploit this vulnerability to consume unnecessary network bandwidth and disk space, and allow remote attackers to send spam email. IBM X-Force ID: 198056.
|
[
"cpe:2.3:o:ibm:i:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:7.4:*:*:*:*:*:*:*"
] | null | null | 5.9 | null | null |
|
GHSA-7wcx-h8gf-8fh3
|
Barco TransForm N before 3.8 allows Command Injection (issue 2 of 4). The NDN-210 has a web administration panel which is made available over https. There is a command injection issue that will allow authenticated users of the administration panel to perform authenticated remote code execution. An issue exists in split_card_cmd.php in which the http parameters xmodules, ymodules and savelocking are not properly handled. The NDN-210 is part of Barco TransForm N solution and includes the patch from TransForm N version 3.8 onwards.
|
[] | null | null | null | null | null |
|
GHSA-qfxv-3ppc-7qg5
|
Apache Tomcat Vulnerable to Denial of Service (DoS) via Improper Handling of chunk extensions
|
Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
|
[] | null | null | null | null | null |
CVE-2024-7238
|
VIPRE Advanced Security SBAMSvc Link Following Local Privilege Escalation Vulnerability
|
VIPRE Advanced Security SBAMSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Anti Malware Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22238.
|
[
"cpe:2.3:a:vipre:advanced_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vipre:advanced_security:12.0.1.214:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
GHSA-h4mh-8q48-6cpr
|
An information disclosure vulnerability exists when Windows Hyper-V running on a Windows 8.1, Windows Server 2012. or Windows Server 2012 R2 host operating system fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability." This CVE ID is unique from CVE-2017-0168.
|
[] | null | null | 5.4 | null | null |
|
CVE-2020-7147
|
A deployselectbootrom expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
|
[
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p06:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-p9ch-7c57-q9hh
|
Cisco IOS XR 5.2.2 allows remote attackers to cause a denial of service (process restart) via a crafted OSPF Link State Advertisement (LSA) update, aka Bug ID CSCvb05643.
|
[] | null | null | 5.3 | null | null |
|
GHSA-w695-r3qx-vgwq
|
In multiple locations, there is a possible way to access screenshots due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 3.3 | null | null | null |
|
RHSA-2025:9119
|
Red Hat Security Advisory: libvpx security update
|
libvpx: Double-free in libvpx encoder
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 8.1 | null | null | null |
CVE-2014-8034
|
Cisco WebEx Meetings Server 1.5 presents the same CAPTCHA challenge for each login attempt, which makes it easier for remote attackers to obtain access via a brute-force approach of guessing usernames, aka Bug ID CSCuj40321.
|
[
"cpe:2.3:a:cisco:webex_meetings_server:1.5:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-5p97-rmc7-hqwc
|
SQL injection vulnerability in lib/patUser.php in KEEP Toolkit before 2.5.1 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password.
|
[] | null | null | null | null | null |
|
GHSA-629h-ppqv-h6fv
|
Wildix WMS 6 before 6.02.20221216, WMS 5 before 5.04.20221214, and WMS4 before 4.04.45396.23 allows Server-side request forgery (SSRF) via ZohoClient.php.
|
[] | null | 9.8 | null | null | null |
|
CVE-2025-54215
|
InCopy | Out-of-bounds Write (CWE-787)
|
InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
GHSA-vpmv-x387-37fq
|
Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.
|
[] | null | null | null | null | null |
|
RHSA-2014:0745
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16)
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null | null |
CVE-2014-4827
|
Cross-site scripting (XSS) vulnerability in IBM Security QRadar SIEM QRM 7.1 MR1 and QRM/QVM 7.2 MR2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
|
[
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2021-44095
|
A SQL injection vulnerability exists in ProjectWorlds Hospital Management System in php 1.0 on login page that allows a remote attacker to compromise Application SQL database.
|
[
"cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-94r8-x6vr-vvc4
|
Best House Rental Management System 1.0 contains an arbitrary file upload vulnerability in the save_settings() function of the file rental/admin_class.php.
|
[] | null | 9.8 | null | null | null |
|
GHSA-q78g-73j3-mh33
|
Cross-site scripting (XSS) vulnerability in Xedus 1.0 allows remote attackers to execute arbitrary web script or HTML via the (1) username parameter to test.x, (2) username parameter to TestServer.x, or (3) param parameter to testgetrequest.x.
|
[] | null | null | null | null | null |
|
CVE-2022-24586
|
A stored cross-site scripting (XSS) vulnerability in the component /core/admin/categories.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content and thumbnail parameters.
|
[
"cpe:2.3:a:pluxml:pluxml:5.8.7:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2003-0872
|
Certain scripts in OpenServer before 5.0.6 allow local users to overwrite files and conduct other unauthorized activities via a symlink attack on temporary files.
|
[
"cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.