id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2015-0351
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0358, and CVE-2015-3039.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.125:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.145:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.176:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:14.0.0.179:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.152:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.167:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.189:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.223:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.239:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:15.0.0.246:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.235:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.257:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.287:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:16.0.0.296:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:17.0.0.134:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_workstation_extension:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.6.z:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-9hfg-247m-vwx7
Net Tools PKI Server does not properly restrict access to remote attackers when the XUDA template files do not contain absolute pathnames for other files.
[]
null
null
null
null
null
CVE-2005-0061
The kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-6vrv-94jv-crrg
Context isolation bypass via Promise in Electron
ImpactApps using `contextIsolation` are affected.This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.WorkaroundsThere are no app-side workarounds, you must update your Electron version to be protected.Fixed Versions`9.0.0-beta.21``8.2.4``7.2.4``6.1.11`For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
[]
null
6.8
null
null
null
CVE-2023-41167
@webiny/react-rich-text-renderer before 5.37.2 allows XSS attacks by content managers. This is a react component to render data coming from Webiny Headless CMS and Webiny Form Builder. Webiny is an open-source serverless enterprise CMS. The @webiny/react-rich-text-renderer package depends on the editor.js rich text editor to handle rich text content. The CMS stores rich text content from the editor.js into the database. When the @webiny/react-rich-text-renderer is used to render such content, it uses the dangerouslySetInnerHTML prop, without applying HTML sanitization. The issue arises when an actor, who in this context would specifically be a content manager with access to the CMS, inserts a malicious script as part of the user-defined input. This script is then injected and executed within the user's browser when the main page or admin page loads.
[ "cpe:2.3:a:webiny:webiny:*:*:*:*:*:node.js:*:*" ]
null
4.8
null
null
null
CVE-2019-17574
An issue was discovered in the Popup Maker plugin before 1.8.13 for WordPress. An unauthenticated attacker can partially control the arguments of the do_action function to invoke certain popmake_ or pum_ methods, as demonstrated by controlling content and delivery of popmake-system-info.txt (aka the "support debug text file").
[ "cpe:2.3:a:code-atlantic:popup_maker:*:*:*:*:*:wordpress:*:*" ]
null
9.1
null
6.4
null
CVE-2010-0951
SQL injection vulnerability in go_target.php in dev4u CMS allows remote attackers to execute arbitrary SQL commands via the kontent_id parameter.
[ "cpe:2.3:a:dev4u:dev4u_cms:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-wrmv-c556-947x
VsaVb7rt.dll in Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in February 2014, aka "VSAVB7RT ASLR Vulnerability."
[]
null
null
null
null
null
CVE-2005-2699
Unrestricted file upload vulnerability in admin/admin.php in PHPKit 1.6.1 allows remote authenticated administrators to execute arbitrary PHP code by uploading a .php file to the content/images/ directory using images.php. NOTE: if a PHPKit administrator must already have access to the end system to install or modify configuration of the product, then this issue might not cross privilege boundaries, and should not be included in CVE.
[ "cpe:2.3:a:phpkit:phpkit:1.6.1:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
CVE-2014-10079
In Vembu StoreGrid 4.4.x, the front page of the server web interface leaks the private IP address in the "ipaddress" hidden form value of the HTML source code, which is disclosed because of incorrect processing of an index.php/ trailing slash.
[ "cpe:2.3:a:vembu:storegrid:4.4:*:*:*:*:*:*:*" ]
null
null
5.3
5
null
CVE-2010-2819
Unspecified vulnerability in the SunRPC inspection feature on the Cisco Firewall Services Module (FWSM) with software 3.1 before 3.1(17.2), 3.2 before 3.2(16.1), 4.0 before 4.0(10.1), and 4.1 before 4.1(1.1) for Catalyst 6500 series switches and 7600 series routers allows remote attackers to cause a denial of service (device reload) via crafted SunRPC messages, aka Bug ID CSCte61622.
[ "cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-p5mc-228w-wjfm
Failure to initialize the extra buffer can lead to an out of buffer access in WLAN function in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24
[]
null
null
9.8
null
null
CVE-1999-0987
Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name.
[ "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2018-0835
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
[ "cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
null
GHSA-j2m8-jf3j-3grm
Multiple cross-site scripting (XSS) vulnerabilities in (1) comersus_customerAuthenticateForm.asp, (2) comersus_backoffice_message.asp, (3) comersus_supportError.asp, or (4) comersus_message.asp in Comersus Cart 5.09 allow remote attackers to execute web script as other users via the message parameter.
[]
null
null
null
null
null
GHSA-q26f-7q9x-36jm
zzcms 8.3 has CSRF via the admin/adminadd.php?action=add URI.
[]
null
null
8.8
null
null
CVE-2024-23226
The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, tvOS 17.4. Processing web content may lead to arbitrary code execution.
[ "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ios:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2024-41818
ReDOS at currency parsing fast-xml-parser
fast-xml-parser is an open source, pure javascript xml parser. a ReDOS exists on currency.js. This vulnerability is fixed in 4.4.1.
[ "cpe:2.3:a:naturalintelligence:fast_xml_parser:*:*:*:*:*:*:*:*", "cpe:2.3:a:fast-xml-parser_project:fast-xml-parser:4.2.4:*:*:*:*:node.js:*:*" ]
null
7.5
null
null
null
CVE-2006-7033
Cross-site scripting (XSS) vulnerability in Super Link Exchange Script 1.0 allows remote attackers to inject arbitrary web script or HTML via IMG tags in the search box.
[ "cpe:2.3:a:super_link_exchange_script:super_link_exchange_script:1.0:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-8j5w-fjfh-p6w3
In teei, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06664675; Issue ID: ALPS06664675.
[]
null
6.7
null
null
null
CVE-2024-6364
Server Identity Validation Bypass in Absolute Persistence®
A vulnerability in Absolute Persistence® versions before 2.8 exists when it is not activated. This may allow a skilled attacker with both physical access to the device, and full hostile network control, to initiate OS commands on the device. To remediate this vulnerability, update the device firmware to the latest available version. Please contact the device manufacturer for upgrade instructions or contact Absolute Security, see reference below.
[]
6.9
null
null
null
null
GHSA-j82f-chfp-3hrg
Microsoft Message Queuing Denial of Service Vulnerability
[]
null
6.5
null
null
null
CVE-2011-5101
The Rumor technology in McAfee SaaS Endpoint Protection before 5.2.4 allows remote attackers to relay e-mail messages via unspecified vectors, as demonstrated by relaying spam.
[ "cpe:2.3:a:mcafee:saas_endpoint_protection:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:saas_endpoint_protection:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:saas_endpoint_protection:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:saas_endpoint_protection:5.2.2:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-7v37-jxmg-g85v
KLiK SocialMediaWebsite Version 1.0.1 has XSS vulnerabilities that allow attackers to store XSS via location input reply-form.
[]
null
5.4
null
null
null
GHSA-6wj9-53h7-6h32
Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.
[]
null
null
9.8
null
null
CVE-2022-30326
An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The network pre-shared key field on the web interface is vulnerable to XSS. An attacker can use a simple XSS payload to crash the basic.config page of the web interface.
[ "cpe:2.3:o:trendnet:tew-831dr_firmware:1.0_601.130.1.1356:*:*:*:*:*:*:*", "cpe:2.3:h:trendnet:tew-831dr:-:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
GHSA-hfgv-wmc3-7jwm
The Simple Photoswipe WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4
null
null
null
CVE-2006-6395
Multiple memory leaks in Ulrik Petersen Emdros Database Engine before 1.2.0.pre231 allow local users to cause a denial of service (memory consumption) via unspecified vectors, a different issue than CVE-2005-0415.
[ "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre142:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre143:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre155:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre160:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre167:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre172:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre195:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre206:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre218:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre222:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emdros_database_engine:1.2.0.pre225:*:*:*:*:*:*:*", "cpe:2.3:a:ulrik_petersen:emrdos_database_engine:1.2.0.pre230:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-cg6q-gp23-vwx8
Jenkins Crowd 2 Integration Plugin stored credentials in plain text
An insufficiently protected credentials vulnerability exists in Jenkins Crowd 2 Integration Plugin 2.0.0 and earlier in CrowdSecurityRealm.java, CrowdConfigurationService.java that allows attackers with local file system access to obtain the credentials used to connect to Crowd 2.
[]
null
null
7.8
null
null
CVE-2024-6163
local IP restriction of internal HTTP endpoints
Certain http endpoints of Checkmk in Checkmk < 2.3.0p10 < 2.2.0p31, < 2.1.0p46, <= 2.0.0p39 allows remote attacker to bypass authentication and access data
[ "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p45:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-jhj6-5mh6-4pvf
Denial-of-Service within Docker container
ImpactIf you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn't get process ID and process group ID of teler properly to kills.Specific Go Packages Affectedktbs.dev/teler/pkg/errorsPatchesUpgrade to the >= 0.0.1 version.WorkaroundsN/AReferenceshttps://github.com/kitabisa/teler/commit/ec6082049dba9e44a21f35fb7b123d42ce1a1a7eFor more informationIf you have any questions or comments about this advisory:Open an issue in [Issues Section](https://github.com/kitabisa/teler/issues)Email us at [[email protected]](mailto:[email protected])
[]
null
5.9
null
null
null
GHSA-r3qr-6c5q-pr77
Reflected Cross-Site Scripting (XSS) vulnerability in HadSky v7.6.3, allows remote attackers to execute arbitrary code and obtain sensitive information via the chklogin.php component .
[]
null
6.1
null
null
null
CVE-2022-27802
Adobe Acrobat Reader DC Annotation Use-After-Free Remote Code Execution Vulnerability
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of annotations that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*" ]
null
null
7.8
null
null
GHSA-q3g5-m4jc-57wr
Adobe InDesign versions 17.1 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-2024-26296
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
[ "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.11.0:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:arubanetworks:clearpass_policy_manager:6.12.0:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2025-32407
Samsung Internet for Galaxy Watch version 5.0.9, available up until Samsung Galaxy Watch 3, does not properly validate TLS certificates, allowing for an attacker to impersonate any and all websites visited by the user. This is a critical misconfiguration in the way the browser validates the identity of the server. It negates the use of HTTPS as a secure channel, allowing for Man-in-the-Middle attacks, stealing sensitive information or modifying incoming and outgoing traffic. NOTE: This vulnerability is in an end-of-life product that is no longer maintained by the vendor.
[]
null
5.9
null
null
null
GHSA-3vxj-947v-9gfh
Unverified Password Change in GitHub repository instantsoft/icms2 prior to 2.16.1-git.
[]
null
null
4.3
null
null
CVE-2021-30683
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A malicious application could execute arbitrary code leading to compromise of user information.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
CVE-2021-33537
WEIDMUELLER: WLAN devices affected by Remote Code Execution (RCE) vulnerability
In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
[ "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*", "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-vpwf-h6qc-fgqp
OMICARD EDM’s file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
[]
null
9.8
null
null
null
RHSA-2023:4176
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
OpenJDK: array indexing integer overflow issue (8304468) OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312)
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
3.7
null
null
null
CVE-2021-31171
Microsoft SharePoint Information Disclosure Vulnerability
Microsoft SharePoint Information Disclosure Vulnerability
[ "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
null
4.1
null
null
null
GHSA-9p98-f95f-j7rf
Directory traversal vulnerability in am.pl in SQL-Ledger 2.6.27 only checks for the presence of a NULL (%00) character to protect against directory traversal attacks, which allows remote attackers to run arbitrary executables and bypass authentication via a .. (dot dot) sequence in the login parameter.
[]
null
null
null
null
null
GHSA-mr8p-cqx3-hgmp
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0358, and CVE-2015-3039.
[]
null
null
null
null
null
CVE-2020-1961
Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered.
[ "cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
RHSA-2022:8900
Red Hat Security Advisory: grub2 security update
grub2: Integer underflow in grub_net_recv_ip4_packets
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.1
null
null
null
GHSA-35q2-47q7-3pc3
Node-Redis potential exponential regex in monitor mode
ImpactWhen a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service.PatchesThe problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e) and was released in version `3.1.1`.References#1569 (GHSL-2021-026)
[]
null
7.5
null
null
null
CVE-2024-31424
WordPress Login with Phone Number plugin <= 1.6.93 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Hamid Alinia - idehweb Login with phone number.This issue affects Login with phone number: from n/a through 1.6.93.
[ "cpe:2.3:a:idehweb:login_with_phone_number:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
null
GHSA-wvgm-548x-hh75
Adobe Bridge version 11.0.2 (and earlier) are affected by a Heap-based Buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
null
null
null
null
GHSA-9879-5jr5-xwq3
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_id POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database.
[]
null
6.5
null
null
null
CVE-2015-3171
sosreport 3.2 uses weak permissions for generated sosreport archives, which allows local users with access to /var/tmp/ to obtain sensitive information by reading the contents of the archive.
[ "cpe:2.3:a:sos_project:sos:3.2:-:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
CVE-2018-1000886
nasm version 2.14.01rc5, 2.15 contains a Buffer Overflow vulnerability in asm/stdscan.c:130 that can result in Stack-overflow caused by triggering endless macro generation, crash the program. This attack appear to be exploitable via a crafted nasm input file.
[ "cpe:2.3:a:nasm:netwide_assembler:2.14.01rc5:*:*:*:*:*:*:*", "cpe:2.3:a:nasm:netwide_assembler:2.15:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2023-35940
GLPI vulnerable to unauthenticated access to Dashboard data
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a file allows an unauthenticated user to be able to access dashboards data. Version 10.0.8 contains a patch for this issue.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-qwvx-h2c6-26qm
Multiple cross-site scripting (XSS) vulnerabilities in install_classic.php in Coppermine Photo Gallery (CPG) 1.5.36 allow remote attackers to inject arbitrary web script or HTML via the (1) admin_username, (2) admin_password, (3) admin_email, (4) dbserver, (5) dbname, (6) dbuser, (7) dbpass, (8) table_prefix, or (9) impath parameter.
[]
null
null
null
null
null
CVE-2023-0851
Buffer overflow in CPCA Resource Download process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
[ "cpe:2.3:o:canon:mf642cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf642cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf644cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf644cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf741cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf741cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf743cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf743cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf745cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf745cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp621c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp621c:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp622c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp622c:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp661c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp661c:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp662c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp662c:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp664c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp664c:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf1127c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf1127c:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf262dw_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf262dw_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf264dw_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf264dw_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf267dw_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf267dw_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf269dw_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf269dw_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf269dw_vp_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf269dw_vp_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf272dw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf272dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf273dw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf273dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf275dw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf275dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf641cw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf641cw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:mf746cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:mf746cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp122dw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp122dw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp1127c_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp1127c:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp622cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp622cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp623cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp623cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:lbp664cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:lbp664cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:imageprograf_tc-20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:imageprograf_tc-20:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:imageprograf_tc-20m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:imageprograf_tc-20m:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:pixma_g3270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:pixma_g3270:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:pixma_g4270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:pixma_g4270:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:maxify_gx3020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:maxify_gx3020:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:maxify_gx4020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:maxify_gx4020:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_lbp621cw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_lbp621cw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_lbp623cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_lbp623cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_lbp633cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_lbp633cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_lbp664cx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_lbp664cx:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_mf641cw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_mf641cw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_mf643cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_mf643cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_mf645cx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_mf645cx:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_mf742cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_mf742cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_mf744cdw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_mf744cdw:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_mf746cx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_mf746cx:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_x_c1127i_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_x_c1127i:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_x_c1127if_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_x_c1127if:-:*:*:*:*:*:*:*", "cpe:2.3:o:canon:i-sensys_x_c1127p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:canon:i-sensys_x_c1127p:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2017-17436
An issue was discovered in the software on Vaultek Gun Safe VT20i products. There is no encryption of the session between the Android application and the safe. The website and marketing materials advertise that this communication channel is encrypted with "Highest Level Bluetooth Encryption" and "Data transmissions are secure via AES256 bit encryption." These claims, however, are not true. Moreover, AES256 bit encryption is not supported in the Bluetooth Low Energy (BLE) standard, so it would have to be at the application level. This lack of encryption allows an individual to learn the passcode by eavesdropping on the communications between the application and the safe.
[ "cpe:2.3:o:vaulteksafe:vt20i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:vaulteksafe:vt20i:-:*:*:*:*:*:*:*" ]
null
null
8.8
3.3
null
RHSA-2013:1264
Red Hat Security Advisory: kernel-rt security and bug fix update
Kernel: usb: chipidea: Allow disabling streaming not just in udc mode Kernel: signal: information leak in tkill/tgkill Kernel: perf/x86: offcore_rsp valid mask for SNB/IVB Kernel: cpqarray/cciss: information leak via ioctl Kernel: fanotify: info leak in copy_event_to_user Kernel: information leak in cdrom driver Kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg Kernel: net: information leak in AF_KEY notify Kernel: net: af_key: initialize satype in key_notify_policy_flush kernel: iscsi-target: heap buffer overflow on large key error kernel: block: passing disk names as format strings kernel: b43: format string leaking into error msgs Kernel: tracing: NULL pointer dereference Kernel: net: panic while pushing pending data out of a IPv6 socket with UDP_CORK enabled Kernel: net: panic while appending data to a corked IPv6 socket in ip6_append_data_mtu
[ "cpe:/a:redhat:enterprise_mrg:2:server:el6" ]
null
null
null
null
null
GHSA-h27q-m239-g8g2
SQL injection vulnerability in the Prince Clan Chess Club (com_pcchess) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the game_id parameter in a showgame action to index.php, a different vector than CVE-2008-0761.
[]
null
null
null
null
null
CVE-2023-6638
The GTG Product Feed for Shopping plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_settings' function in versions up to, and including, 1.2.4. This makes it possible for unauthenticated attackers to update plugin settings.
[ "cpe:2.3:a:gutengeek:gg_woo_feed:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
null
CVE-2011-5123
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
[ "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*", "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-5h6v-mjfp-cvcm
Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the Textbook parameter at /admin/modify.php.
[]
null
8.8
null
null
null
GHSA-qhfv-pjhr-x49x
Stack-based buffer overflow in getnnmdata.exe in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via an invalid MaxAge parameter.
[]
null
null
null
null
null
GHSA-9mm8-854r-8wvw
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in imithemes Eventer allows Blind SQL Injection. This issue affects Eventer: from n/a through 3.9.6.
[]
null
9.3
null
null
null
GHSA-m287-97qh-jhg2
Razor v0.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the function uploadchannel().
[]
null
6.1
null
null
null
GHSA-fmq6-9542-5m95
Due to the use of non-time-constant comparison functions there is issue in timing side channels which can be used as a potential side channel for SUI corruption in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9650, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8998, Nicobar, QCS404, QCS405, QCS605, QM215, SA6155P, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
[]
null
null
null
null
null
CVE-2018-7260
Cross-site scripting (XSS) vulnerability in db_central_columns.php in phpMyAdmin before 4.7.8 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
CVE-2013-0313
The evm_update_evmxattr function in security/integrity/evm/evm_crypto.c in the Linux kernel before 3.7.5, when the Extended Verification Module (EVM) is enabled, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an attempted removexattr operation on an inode of a sockfs filesystem.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*" ]
null
null
null
6.2
null
GHSA-v24g-4g4h-6h7f
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing the QCA_NL80211_VENDOR_SUBCMD_SET_TXPOWER_SCALE_DECR_DB vendor command, in which attribute QCA_WLAN_VENDOR_ATTR_TXPOWER_SCALE_DECR_DB contains fewer than 1 byte, a buffer overrun occurs.
[]
null
null
7.8
null
null
CVE-2021-47613
i2c: virtio: fix completion handling
In the Linux kernel, the following vulnerability has been resolved: i2c: virtio: fix completion handling The driver currently assumes that the notify callback is only received when the device is done with all the queued buffers. However, this is not true, since the notify callback could be called without any of the queued buffers being completed (for example, with virtio-pci and shared interrupts) or with only some of the buffers being completed (since the driver makes them available to the device in multiple separate virtqueue_add_sgs() calls). This can lead to incorrect data on the I2C bus or memory corruption in the guest if the device operates on buffers which are have been freed by the driver. (The WARN_ON in the driver is also triggered.) BUG kmalloc-128 (Tainted: G W ): Poison overwritten First byte 0x0 instead of 0x6b Allocated in i2cdev_ioctl_rdwr+0x9d/0x1de age=243 cpu=0 pid=28 memdup_user+0x2e/0xbd i2cdev_ioctl_rdwr+0x9d/0x1de i2cdev_ioctl+0x247/0x2ed vfs_ioctl+0x21/0x30 sys_ioctl+0xb18/0xb41 Freed in i2cdev_ioctl_rdwr+0x1bb/0x1de age=68 cpu=0 pid=28 kfree+0x1bd/0x1cc i2cdev_ioctl_rdwr+0x1bb/0x1de i2cdev_ioctl+0x247/0x2ed vfs_ioctl+0x21/0x30 sys_ioctl+0xb18/0xb41 Fix this by calling virtio_get_buf() from the notify handler like other virtio drivers and by actually waiting for all the buffers to be completed.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2012-1195
Unrestricted file upload vulnerability in andesk/managementsuite/core/core.anonymous/ServerSetup.asmx in the ServerSetup web service in Lenovo ThinkManagement Console 9.0.3 allows remote attackers to execute arbitrary code by uploading a file with an executable extension via a PutUpdateFileCore command in a RunAMTCommand SOAP request, then accessing the file via a direct request to the file in the web root.
[ "cpe:2.3:a:landesk:lenovo_thinkmanagement_console:9.0.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-j4vf-xvhv-4x76
Stack-based buffer overflow in PDF Form Filling and Flattening Tool before 3.1.0.12 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long field names.
[]
null
null
null
null
null
CVE-2024-24576
Rusts's `std::process::Command` did not properly escape arguments of batch files on Windows
Rust is a programming language. The Rust Security Response WG was notified that the Rust standard library prior to version 1.77.2 did not properly escape arguments when invoking batch files (with the `bat` and `cmd` extensions) on Windows using the `Command`. An attacker able to control the arguments passed to the spawned process could execute arbitrary shell commands by bypassing the escaping. The severity of this vulnerability is critical for those who invoke batch files on Windows with untrusted arguments. No other platform or use is affected. The `Command::arg` and `Command::args` APIs state in their documentation that the arguments will be passed to the spawned process as-is, regardless of the content of the arguments, and will not be evaluated by a shell. This means it should be safe to pass untrusted input as an argument. On Windows, the implementation of this is more complex than other platforms, because the Windows API only provides a single string containing all the arguments to the spawned process, and it's up to the spawned process to split them. Most programs use the standard C run-time argv, which in practice results in a mostly consistent way arguments are splitted. One exception though is `cmd.exe` (used among other things to execute batch files), which has its own argument splitting logic. That forces the standard library to implement custom escaping for arguments passed to batch files. Unfortunately it was reported that our escaping logic was not thorough enough, and it was possible to pass malicious arguments that would result in arbitrary shell execution. Due to the complexity of `cmd.exe`, we didn't identify a solution that would correctly escape arguments in all cases. To maintain our API guarantees, we improved the robustness of the escaping code, and changed the `Command` API to return an `InvalidInput` error when it cannot safely escape an argument. This error will be emitted when spawning the process. The fix is included in Rust 1.77.2. Note that the new escaping logic for batch files errs on the conservative side, and could reject valid arguments. Those who implement the escaping themselves or only handle trusted inputs on Windows can also use the `CommandExt::raw_arg` method to bypass the standard library's escaping logic.
[ "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*" ]
null
10
null
null
null
CVE-2023-0737
CSRF in wallabag/wallabag
wallabag version 2.5.2 contains a Cross-Site Request Forgery (CSRF) vulnerability that allows attackers to arbitrarily delete user accounts via the /account/delete endpoint. This issue is fixed in version 2.5.4.
[ "cpe:2.3:a:wallabag:wallabag:*:*:*:*:*:*:*:*", "cpe:2.3:a:wallabag:wallabag:2.5.2:*:*:*:*:*:*:*" ]
null
null
6.5
null
null
CVE-2006-6311
Microsoft Internet Explorer 6.0.2900.2180 allows remote attackers to cause a denial of service via a style attribute in an HTML table tag with a width value that is dynamically calculated using JavaScript.
[ "cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-w2q8-9gm9-xjhh
Cross-Site Request Forgery (CSRF) vulnerability in mandegarweb Replace Default Words allows Stored XSS. This issue affects Replace Default Words: from n/a through 1.3.
[]
null
7.1
null
null
null
CVE-2005-4607
Cross-site scripting (XSS) vulnerability in index.php in BugPort 1.147 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) ids[0], (2) action, (3) report_id, (4) devWherePair[1][1], and (5) binds[0] parameters.
[ "cpe:2.3:a:incogen:bugport:1.039:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.040:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.041:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.042:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.043:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.044:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.045:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.046:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.047:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.048:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.049:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.050:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.051:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.052:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.053:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.054:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.055:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.056:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.057:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.058:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.059:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.060:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.061:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.062:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.063:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.064:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.065:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.066:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.067:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.068:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.069:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.070:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.071:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.072:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.073:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.074:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.075:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.076:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.077:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.078:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.079:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.080:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.081:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.082:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.083:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.084:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.085:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.086:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.087:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.088:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.089:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.090:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.091:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.092:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.093:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.094:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.095:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.096:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.097:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.098:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.099:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.100:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.101:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.102:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.103:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.104:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.105:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.106:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.107:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.108:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.109:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.110:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.111:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.112:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.113:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.114:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.115:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.116:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.117:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.118:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.119:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.120:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.121:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.122:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.123:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.124:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.125:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.126:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.127:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.128:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.129:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.130:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.131:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.132:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.133:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.134:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.135:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.136:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.137:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.138:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.139:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.140:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.141:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.142:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.143:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.144:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.145:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.146:*:*:*:*:*:*:*", "cpe:2.3:a:incogen:bugport:1.147:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-mj3q-p8fw-g73r
A possible buffer overflow vulnerability in NPU driver prior to SMR JUN-2021 Release 1 allows arbitrary memory write and code execution.
[]
null
null
null
null
null
CVE-2024-35930
scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() The call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an unsuccessful status. In such cases, the elsiocb is not issued, the completion is not called, and thus the elsiocb resource is leaked. Check return value after calling lpfc_sli4_resume_rpi() and conditionally release the elsiocb resource.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-3r6m-7q2m-f6qj
In the Linux kernel, the following vulnerability has been resolved:soc: amlogic: Fix refcount leak in meson-secure-pwrc.cIn meson_secure_pwrc_probe(), there is a refcount leak in one fail path.
[]
null
null
null
null
null
CVE-2021-20501
IBM i 7.1, 7.2, 7.3, and 7.4 SMTP allows a network attacker to send emails to non-existent local-domain recipients to the SMTP server, caused by using a non-default configuration. An attacker could exploit this vulnerability to consume unnecessary network bandwidth and disk space, and allow remote attackers to send spam email. IBM X-Force ID: 198056.
[ "cpe:2.3:o:ibm:i:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:i:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:i:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:i:7.4:*:*:*:*:*:*:*" ]
null
null
5.9
null
null
GHSA-7wcx-h8gf-8fh3
Barco TransForm N before 3.8 allows Command Injection (issue 2 of 4). The NDN-210 has a web administration panel which is made available over https. There is a command injection issue that will allow authenticated users of the administration panel to perform authenticated remote code execution. An issue exists in split_card_cmd.php in which the http parameters xmodules, ymodules and savelocking are not properly handled. The NDN-210 is part of Barco TransForm N solution and includes the patch from TransForm N version 3.8 onwards.
[]
null
null
null
null
null
GHSA-qfxv-3ppc-7qg5
Apache Tomcat Vulnerable to Denial of Service (DoS) via Improper Handling of chunk extensions
Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data.
[]
null
null
null
null
null
CVE-2024-7238
VIPRE Advanced Security SBAMSvc Link Following Local Privilege Escalation Vulnerability
VIPRE Advanced Security SBAMSvc Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Anti Malware Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22238.
[ "cpe:2.3:a:vipre:advanced_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:vipre:advanced_security:12.0.1.214:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-h4mh-8q48-6cpr
An information disclosure vulnerability exists when Windows Hyper-V running on a Windows 8.1, Windows Server 2012. or Windows Server 2012 R2 host operating system fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability." This CVE ID is unique from CVE-2017-0168.
[]
null
null
5.4
null
null
CVE-2020-7147
A deployselectbootrom expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
[ "cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p06:*:*:*:*:*:*" ]
null
9.8
null
10
null
GHSA-p9ch-7c57-q9hh
Cisco IOS XR 5.2.2 allows remote attackers to cause a denial of service (process restart) via a crafted OSPF Link State Advertisement (LSA) update, aka Bug ID CSCvb05643.
[]
null
null
5.3
null
null
GHSA-w695-r3qx-vgwq
In multiple locations, there is a possible way to access screenshots due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
3.3
null
null
null
RHSA-2025:9119
Red Hat Security Advisory: libvpx security update
libvpx: Double-free in libvpx encoder
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.1
null
null
null
CVE-2014-8034
Cisco WebEx Meetings Server 1.5 presents the same CAPTCHA challenge for each login attempt, which makes it easier for remote attackers to obtain access via a brute-force approach of guessing usernames, aka Bug ID CSCuj40321.
[ "cpe:2.3:a:cisco:webex_meetings_server:1.5:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-5p97-rmc7-hqwc
SQL injection vulnerability in lib/patUser.php in KEEP Toolkit before 2.5.1 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password.
[]
null
null
null
null
null
GHSA-629h-ppqv-h6fv
Wildix WMS 6 before 6.02.20221216, WMS 5 before 5.04.20221214, and WMS4 before 4.04.45396.23 allows Server-side request forgery (SSRF) via ZohoClient.php.
[]
null
9.8
null
null
null
CVE-2025-54215
InCopy | Out-of-bounds Write (CWE-787)
InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
GHSA-vpmv-x387-37fq
Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.
[]
null
null
null
null
null
RHSA-2014:0745
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: multiple cross-site scripting flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16) flash-plugin: arbitrary code execution flaws (APSB14-16)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
null
CVE-2014-4827
Cross-site scripting (XSS) vulnerability in IBM Security QRadar SIEM QRM 7.1 MR1 and QRM/QVM 7.2 MR2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2021-44095
A SQL injection vulnerability exists in ProjectWorlds Hospital Management System in php 1.0 on login page that allows a remote attacker to compromise Application SQL database.
[ "cpe:2.3:a:hospital_management_system_project:hospital_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-94r8-x6vr-vvc4
Best House Rental Management System 1.0 contains an arbitrary file upload vulnerability in the save_settings() function of the file rental/admin_class.php.
[]
null
9.8
null
null
null
GHSA-q78g-73j3-mh33
Cross-site scripting (XSS) vulnerability in Xedus 1.0 allows remote attackers to execute arbitrary web script or HTML via the (1) username parameter to test.x, (2) username parameter to TestServer.x, or (3) param parameter to testgetrequest.x.
[]
null
null
null
null
null
CVE-2022-24586
A stored cross-site scripting (XSS) vulnerability in the component /core/admin/categories.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content and thumbnail parameters.
[ "cpe:2.3:a:pluxml:pluxml:5.8.7:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2003-0872
Certain scripts in OpenServer before 5.0.6 allow local users to overwrite files and conduct other unauthorized activities via a symlink attack on temporary files.
[ "cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*" ]
null
null
null
2.1
null