id
string | title
string | description
string | cpes
list | cvss_v4_0
float64 | cvss_v3_1
float64 | cvss_v3_0
float64 | cvss_v2_0
float64 | patch_commit_url
string |
---|---|---|---|---|---|---|---|---|
GHSA-jcwm-grfm-4xmh
|
Improper link resolution before file access in the Nomad module of the 1E Client, in versions prior to 25.3, enables an attacker with local unprivileged access on a Windows system to delete arbitrary files on the device by exploiting symbolic links.
|
[] | null | 7.8 | null | null | null |
|
CVE-2011-4738
|
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 does not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie, as demonstrated by cookies used by get_password.php and certain other files.
|
[
"cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0_build20110407.20:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2010:0753
|
Red Hat Security Advisory: kdegraphics security update
|
xpdf: uninitialized Gfx::parser pointer dereference xpdf: array indexing error in FoFiType1::parse()
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null | null |
CVE-2008-1167
|
Stack-based buffer overflow in the useragent function in useragent.c in Squid Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to execute arbitrary code via a long Squid proxy server User-Agent header. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:sarg:squid_analysis_report_generator:2.2.3.1:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2018-6787
|
In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x221808.
|
[
"cpe:2.3:a:jiangmin:antivirus:16.0.0.100:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 | null |
|
GHSA-hjf3-hgq2-9hw3
|
The Chef Habitat builder-api on-prem-builder package with any version lower than habitat/builder-api/10315/20240913162802 is vulnerable to indirect object reference (IDOR) by un-authorized deletion of personal token. Habitat builder consumes builder-api habitat package as a dependency and the vulnerability was specifically due to builder-api habitat package.The fix was made available in habitat/builder-api/10315/20240913162802 and all the subsequent versions after that. We would recommend user to always use on-prem stable channel.
|
[] | null | 5.4 | null | null | null |
|
GHSA-x7gq-v5gc-rcm4
|
Out-of-bounds read in applying extra data of base content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
|
[] | null | 5.5 | null | null | null |
|
GHSA-j4j4-3gm3-wpx2
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rara Theme UltraLight allows Reflected XSS. This issue affects UltraLight: from n/a through 1.2.
|
[] | null | 7.1 | null | null | null |
|
CVE-2016-8300
|
Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Product / Instrument Search). Supported versions that are affected are 2.0.1, 2.2.0 and 12.0.1. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Private Banking accessible data. CVSS v3.0 Base Score 5.3 (Confidentiality impacts).
|
[
"cpe:2.3:a:oracle:flexcube_private_banking:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.0.1:*:*:*:*:*:*:*"
] | null | null | 5.3 | 3.5 | null |
|
GHSA-8cc9-5rm3-3m89
|
Multiple cross-site scripting (XSS) vulnerabilities in Kronos webTA allow remote attackers to inject arbitrary web script or HTML via the description field to (1) servlet/com.threeis.webta.H710selProject and (2) servlet/com.threeis.webta.H720editProjectInfo. NOTE: BID:29610 states that the initial report was incorrect, but the reason for this conclusion is unknown.
|
[] | null | null | null | null | null |
|
GHSA-g457-xcgh-pqm2
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cimatti Consulting Contact Forms by Cimatti allows Stored XSS.This issue affects Contact Forms by Cimatti: from n/a through 1.8.0.
|
[] | null | 5.9 | null | null | null |
|
GHSA-78xj-8vr9-88m7
|
Acrobat Reader DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null | null |
|
GHSA-3v8f-wj9v-rfpm
|
In the Linux kernel, the following vulnerability has been resolved:io_uring: check for non-NULL file pointer in io_file_can_poll()In earlier kernels, it was possible to trigger a NULL pointer
dereference off the forced async preparation path, if no file had
been assigned. The trace leading to that looks as follows:BUG: kernel NULL pointer dereference, address: 00000000000000b0
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP
CPU: 67 PID: 1633 Comm: buf-ring-invali Not tainted 6.8.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 2/2/2022
RIP: 0010:io_buffer_select+0xc3/0x210
Code: 00 00 48 39 d1 0f 82 ae 00 00 00 48 81 4b 48 00 00 01 00 48 89 73 70 0f b7 50 0c 66 89 53 42 85 ed 0f 85 d2 00 00 00 48 8b 13 <48> 8b 92 b0 00 00 00 48 83 7a 40 00 0f 84 21 01 00 00 4c 8b 20 5b
RSP: 0018:ffffb7bec38c7d88 EFLAGS: 00010246
RAX: ffff97af2be61000 RBX: ffff97af234f1700 RCX: 0000000000000040
RDX: 0000000000000000 RSI: ffff97aecfb04820 RDI: ffff97af234f1700
RBP: 0000000000000000 R08: 0000000000200030 R09: 0000000000000020
R10: ffffb7bec38c7dc8 R11: 000000000000c000 R12: ffffb7bec38c7db8
R13: ffff97aecfb05800 R14: ffff97aecfb05800 R15: ffff97af2be5e000
FS: 00007f852f74b740(0000) GS:ffff97b1eeec0000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000b0 CR3: 000000016deab005 CR4: 0000000000370ef0
Call Trace:
<TASK>
? __die+0x1f/0x60
? page_fault_oops+0x14d/0x420
? do_user_addr_fault+0x61/0x6a0
? exc_page_fault+0x6c/0x150
? asm_exc_page_fault+0x22/0x30
? io_buffer_select+0xc3/0x210
__io_import_iovec+0xb5/0x120
io_readv_prep_async+0x36/0x70
io_queue_sqe_fallback+0x20/0x260
io_submit_sqes+0x314/0x630
__do_sys_io_uring_enter+0x339/0xbc0
? __do_sys_io_uring_register+0x11b/0xc50
? vm_mmap_pgoff+0xce/0x160
do_syscall_64+0x5f/0x180
entry_SYSCALL_64_after_hwframe+0x46/0x4e
RIP: 0033:0x55e0a110a67e
Code: ba cc 00 00 00 45 31 c0 44 0f b6 92 d0 00 00 00 31 d2 41 b9 08 00 00 00 41 83 e2 01 41 c1 e2 04 41 09 c2 b8 aa 01 00 00 0f 05 <c3> 90 89 30 eb a9 0f 1f 40 00 48 8b 42 20 8b 00 a8 06 75 af 85 f6because the request is marked forced ASYNC and has a bad file fd, and
hence takes the forced async prep path.Current kernels with the request async prep cleaned up can no longer hit
this issue, but for ease of backporting, let's add this safety check in
here too as it really doesn't hurt. For both cases, this will inevitably
end with a CQE posted with -EBADF.
|
[] | null | 5.5 | null | null | null |
|
CVE-2025-23590
|
WordPress Dezdy plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Burtay Arat Dezdy allows Reflected XSS. This issue affects Dezdy: from n/a through 1.0.
|
[] | null | 7.1 | null | null | null |
CVE-2017-16325
|
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_sonos, at 0x9d01e3a8, the value for the `s_group_cmd` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
|
[
"cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:hub:2245-222:-:*:*:*:*:*:*"
] | null | null | 8.5 | null | null |
|
RHSA-2020:2773
|
Red Hat Security Advisory: virt:rhel security update
|
QEMU: Slirp: potential OOB access due to unsafe snprintf() usages
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream",
"cpe:/a:redhat:rhel_eus:8.1::crb"
] | null | 5.6 | null | null | null |
CVE-2018-1000414
|
A cross-site request forgery vulnerability exists in Jenkins Config File Provider Plugin 3.1 and earlier in ConfigFilesManagement.java, FolderConfigFileAction.java that allows creating and editing configuration file definitions.
|
[
"cpe:2.3:a:jenkins:config_file_provider:*:*:*:*:*:jenkins:*:*"
] | null | null | 8.1 | 5.8 | null |
|
GHSA-gfrv-p43m-p2pq
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mancx AskMe Widget allows Reflected XSS. This issue affects Mancx AskMe Widget: from n/a through 0.3.
|
[] | null | 7.1 | null | null | null |
|
CVE-2025-30567
|
WordPress WP01 <= 2.6.2 - Arbitrary File Download Vulnerability
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in wp01ru WP01 allows Path Traversal. This issue affects WP01: from n/a through 2.6.2.
|
[] | null | 7.5 | null | null | null |
CVE-2014-5569
|
The Star Girl (aka com.animoca.google.starGirl) application 3.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:animoca:star_girl:3.4.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2022-47699
|
COMFAST (Shenzhen Sihai Zhonglian Network Technology Co., Ltd) CF-WR623N Router firmware V2.3.0.1 is vulnerable to Incorrect Access Control.
|
[
"cpe:2.3:o:comfast_project:cf-wr623n_firmware:2.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:h:comfast_project:cf-wr623n:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-8jfm-vv5v-4q3v
|
Improper access control vulnerability in S Secure prior to SMR Apr-2022 Release 1 allows physical attackers to access secured data in certain conditions.
|
[] | null | 4.6 | null | null | null |
|
GHSA-fccv-jmmp-qg76
|
Apache Tomcat Improper Input Validation vulnerability
|
Improper Input Validation vulnerability in Apache Tomcat. Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82, and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected.Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.
|
[] | null | 7.5 | null | null | null |
CVE-2023-50377
|
WordPress Simple Counter Plugin <= 1.0.2 is vulnerable to Cross Site Scripting (XSS)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AB-WP Simple Counter allows Stored XSS.This issue affects Simple Counter: from n/a through 1.0.2.
|
[
"cpe:2.3:a:ab-wp:simple_counter:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
CVE-2021-32763
|
Regular Expression Denial of Service in OpenProject forum messages
|
OpenProject is open-source, web-based project management software. In versions prior to 11.3.3, the `MessagesController` class of OpenProject has a `quote` method that implements the logic behind the Quote button in the discussion forums, and it uses a regex to strip `<pre>` tags from the message being quoted. The `(.|\s)` part can match a space character in two ways, so an unterminated `<pre>` tag containing `n` spaces causes Ruby's regex engine to backtrack to try 2<sup>n</sup> states in the NFA. This will result in a Regular Expression Denial of Service. The issue is fixed in OpenProject 11.3.3. As a workaround, one may install the patch manually.
|
[
"cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-5fvm-866q-fmw7
|
In JetBrains GoLand before 2019.3.2, the plugin repository was accessed via HTTP instead of HTTPS.
|
[] | null | null | null | null | null |
|
CVE-2023-23821
|
WordPress Interactive Polish Map Plugin <= 1.2 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Marcin Pietrzak Interactive Polish Map plugin <= 1.2 versions.
|
[
"cpe:2.3:a:interactive_polish_map_project:interactive_polish_map:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
RHSA-2018:0180
|
Red Hat Security Advisory: kernel-alt security and bug fix update
|
kernel: pmd can become dirty without going through a COW cycle
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 6.1 | null | null |
GHSA-9v5x-rh5f-9mfh
|
Deserialization of Untrusted Data vulnerability in themegusta Smart Sections Theme Builder - WPBakery Page Builder Addon.This issue affects Smart Sections Theme Builder - WPBakery Page Builder Addon: from n/a through 1.7.8.
|
[] | null | 9.8 | null | null | null |
|
GHSA-29wc-g5r8-4r3v
|
The OpenGL implementation in Apple iOS before 9.1 and OS X before 10.11.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
|
[] | null | null | null | null | null |
|
GHSA-j3pj-qwmc-jm5r
|
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to execute arbitrary code with kernel privileges.
|
[] | null | 7.8 | null | null | null |
|
CVE-2018-13720
|
The mintToken function of a smart contract implementation for Antoken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:landcoin_project:landcoin:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2024-12914
|
XSS in Akinsoft's QR Menu
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Akınsoft QR Menü allows Cross-Site Scripting (XSS).This issue affects QR Menü: from s1.05.05 before v1.05.12.
|
[] | null | 4.3 | null | null | null |
GHSA-54rh-pf56-c6xf
|
Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.
|
[] | null | 7.5 | null | null | null |
|
CVE-2017-2886
|
A memory corruption vulnerability exists in the .PSD parsing functionality of ACDSee Ultimate 10.0.0.292. A specially crafted .PSD file can cause an out of bounds write vulnerability resulting in potential code execution. An attacker can send a specific .PSD file to trigger this vulnerability.
|
[
"cpe:2.3:a:acdsee:ultimate:10.0.0.292:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
|
CVE-2025-20166
|
Cisco Common Services Platform Collector Cross-Site Scripting Vulnerability
|
A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 5.4 | null | null | null |
CVE-2018-6205
|
In Max Secure Anti Virus 19.0.3.019,, the driver file (MaxProtector32.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x220009.
|
[
"cpe:2.3:a:maxpcsecure:anti_virus:19.0.3.019:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 | null |
|
CVE-2025-8970
|
itsourcecode Online Tour and Travel Management System booking.php sql injection
|
A vulnerability was found in itsourcecode Online Tour and Travel Management System 1.0. This affects an unknown part of the file /admin/operations/booking.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-7f5r-wmfp-m422
|
The Remote Filtering component in Websense Web Security and Web Filter before 6.3.3 Hotfix 18 and 7.x before 7.1.1 allows remote attackers to cause a denial of service (daemon exit) via a large volume of traffic.
|
[] | null | null | null | null | null |
|
CVE-2018-8722
|
Zoho ManageEngine Desktop Central version 9.1.0 build 91099 has multiple XSS issues that were fixed in build 92026.
|
[
"cpe:2.3:a:zohocorp:manageengine_desktop_central:9.1.0:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-xqgq-4wpf-xfr8
|
Improper verification of applications' cryptographic signatures in the /e/OS app store client App Lounge before 0.19q allows attackers in control of the application server to install malicious applications on user's systems by altering the server's API response.
|
[] | null | 6.5 | null | null | null |
|
CVE-2024-51843
|
WordPress Horsemanager plugin <= 1.3 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Olland.Biz Horsemanager allows Blind SQL Injection.This issue affects Horsemanager: from n/a through 1.3.
|
[
"cpe:2.3:a:olland:horsemanager:*:*:*:*:*:wordpress:*:*"
] | null | 8.5 | null | null | null |
CVE-2021-41644
|
Remote Code Exection (RCE) vulnerability exists in Sourcecodester Online Food Ordering System 2.0 via a maliciously crafted PHP file that bypasses the image upload filters.
|
[
"cpe:2.3:a:online_food_ordering_system_project:online_food_ordering_system:2.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-mpcg-cmj3-784v
|
IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the invscout command to execute arbitrary commands. IBM X-Force ID: 267966.
|
[] | null | 8.4 | null | null | null |
|
CVE-2021-29110
|
Stored cross-site scripting (XSS) issue in Esri Portal for ArcGIS may allow a remote unauthenticated attacker to pass and store malicious strings in the home application.
|
Stored cross-site scripting (XSS) issue in Esri Portal for ArcGIS may allow a remote unauthenticated attacker to pass and store malicious strings in the home application.
|
[
"cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
GHSA-qjrp-w62x-2crq
|
Baby Care System v1.0 was discovered to contain a SQL injection vulnerability via /admin/uesrs.php&action=type&userrole=User&userid=.
|
[] | null | 9.8 | null | null | null |
|
GHSA-qr99-333m-86wc
|
The Play method in the UUPlayer ActiveX control 6.0.0.1 in UUSee 2010 6.11.0609.2 allows remote attackers to execute arbitrary programs via a UNC share pathname in the MPlayerPath parameter.
|
[] | null | null | null | null | null |
|
CVE-2017-0714
|
A remote code execution vulnerability in the Android media framework (h263 decoder). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-36492637.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
CVE-2023-49935
|
An issue was discovered in SchedMD Slurm 23.02.x and 23.11.x. There is Incorrect Access Control because of a slurmd Message Integrity Bypass. An attacker can reuse root-level authentication tokens during interaction with the slurmd process. This bypasses the RPC message hashes that protect against undesired MUNGE credential reuse. The fixed versions are 23.02.7 and 23.11.1.
|
[
"cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:23.11:-:*:*:*:*:*:*",
"cpe:2.3:a:schedmd:slurm:23.11:rc1:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-43517
|
Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
|
Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-mg7w-c9x2-xh7r
|
Karmada PULL Mode Cluster Privilege Escalation
|
Impact_What kind of vulnerability is it? Who is impacted?_The [PULL](https://karmada.io/docs/next/userguide/clustermanager/cluster-registration#pull-mode) mode clusters registered with the `karmadactl register` command have excessive privileges to access control plane resources. By abusing these permissions, an attacker able to authenticate as the karmada-agent to a karmada cluster would be able to obtain administrative privileges over the entire federation system including all registered member clusters.Patches_Has the problem been patched? What versions should users upgrade to?_Since Karmada v1.12.0, command `karmadactl register` restricts the access permissions of pull mode member clusters to control plane resources. This way, an attacker able to authenticate as the karmada-agent cannot control other member clusters in Karmada.Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_Restricts the access permissions of pull mode member clusters to control plane resources according to [Karmada Component Permissions Docs](https://karmada.io/docs/administrator/security/component-permission).References_Are there any links users can visit to find out more?_Enhancements made from the Karmada community: https://github.com/karmada-io/karmada/pull/5793Karmada Component Permissions: https://karmada.io/docs/administrator/security/component-permission
|
[] | 8.7 | null | null | null | null |
CVE-1999-1383
|
(1) bash before 1.14.7, and (2) tcsh 6.05 allow local users to gain privileges via directory names that contain shell metacharacters (` back-tick), which can cause the commands enclosed in the directory name to be executed when the shell expands filenames using the \w option in the PS1 variable.
|
[
"cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tcsh:tcsh:6.05:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-pxxx-pwpw-j3mp
|
An access control issue in Revenue Collection System v1.0 allows unauthenticated attackers to view the contents of /admin/DBbackup/ directory.
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-25596
|
ASUS RT-AC86U - Heap-based buffer overflow
|
ASUS RT-AC56U’s configuration function has a heap-based buffer overflow vulnerability due to insufficient validation for the decryption parameter length, which allows an unauthenticated LAN attacker to execute arbitrary code, perform arbitrary operations and disrupt service.
|
[
"cpe:2.3:o:asus:rt-ac86u_firmware:3.0.0.4.386.45956:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-jhf6-432q-gp6x
|
Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of dae files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23704.
|
[] | null | null | 7.8 | null | null |
|
GHSA-rh8g-f78w-jwhw
|
LG Simple Editor copyContent Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the copyContent command. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19944.
|
[] | null | null | 9.8 | null | null |
|
PYSEC-2017-43
| null |
Cross-site scripting (XSS) vulnerability in the render_full function in debug/tbtools.py in the debugger in Pallets Werkzeug before 0.11.11 (as used in Pallets Flask and other products) allows remote attackers to inject arbitrary web script or HTML via a field that contains an exception message.
|
[] | null | null | null | null | null |
CVE-2017-12990
|
The ISAKMP parser in tcpdump before 4.9.2 could enter an infinite loop due to bugs in print-isakmp.c, several functions.
|
[
"cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2018-14718
|
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.
|
[
"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_process_management_suite:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:global_lifecycle_management_opatch:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdeveloper:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdeveloper:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:nosql_database:19.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:18.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_merchandising_system:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_merchandising_system:16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_workforce_management_software:1.60.9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_engineering_-_installer_\\&_deployment:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-368f-rf6p-3h4r
|
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1 could allow an authenticated user to execute a function that would cause the server to crash. IBM X-Force ID: 162714.
|
[] | null | 6.5 | null | null | null |
|
GHSA-xm9c-pm26-gfwx
|
Dynamic Transaction Queuing System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter at /admin/ajax.php?action=login.
|
[] | null | 7.2 | null | null | null |
|
GHSA-4482-3c55-4652
|
Local privilege escalation due to incorrect assignment of privileges of temporary files in the update mechanism of G DATA Management Server. This vulnerability allows a local, unprivileged attacker to escalate privileges on affected installations by placing a crafted ZIP archive in a globally writable directory, which gets unpacked in the context of SYSTEM and results in arbitrary file write.
|
[] | 7.3 | 7.8 | null | null | null |
|
CVE-2009-0815
|
The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.
|
[
"cpe:2.3:a:typo3:typo3:3.3.x:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:3.5.x:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:3.6.x:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:3.7.x:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:3.8.x:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:4.3:alpha1:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-44hm-fgg5-f5ww
|
An issue was discovered in FusionPBX before 4.5.30. The FAX file name may have risky characters.
|
[] | null | 8.8 | null | null | null |
|
CVE-2013-2164
|
The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
|
[
"cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.0.68:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.2.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.4:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.5:*:*:*:*:*:x86:*",
"cpe:2.3:o:linux:linux_kernel:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.14:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.15:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.16:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.18:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.19:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.21:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.22:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.23:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.25:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.26:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.27:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.28:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.29:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.30:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.31:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.4.32:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.8.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.8:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.9.9:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-xf33-h49j-6fjv
|
ownCloud owncloud/client before 2.9.2 allows Resource Injection by a server into the desktop client via a URL, leading to remote code execution.
|
[] | null | 7.8 | null | null | null |
|
ICSA-21-133-02
|
Johnson Controls Sensormatic Tyco AI
|
Tyco AI calculates, or uses an incorrect maximum or minimum value that is one more or one less than the correct value.CVE-2021-3156 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 7.8 | null | null |
GHSA-5jg4-gfhx-2rxm
|
Buffer overflow in Illustrate dBpowerAMP Music Converter 11.5 and earlier, possibly including (1) MusicConverter.exe, (2) playlist.exe, and (3) amp.exe, allows user-assisted attackers to cause a denial of service or execute arbitrary code via a .m3u playlist with a long entry, possibly involving large field names, as demonstrated by SecuBox.Labs.m3u. NOTE: this issue might be the same as the .m3u vulnerability in CVE-2004-1569, but if so, then CD:SF-LOC suggests creating a different identifier since the .m3u issue would affect different versions than the .pls issue.
|
[] | null | null | null | null | null |
|
CVE-2020-17438
|
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.
|
[
"cpe:2.3:a:uip_project:uip:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:contiki-os:contiki:3.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-2fjq-599h-52qf
|
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e30.
|
[] | null | 7.8 | null | null | null |
|
GHSA-2vw2-h5mp-gfhw
|
Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
|
[] | null | 6.5 | null | null | null |
|
CVE-2007-6270
|
Multiple cross-site scripting (XSS) vulnerabilities in Absolute News Manager.NET 5.1 allow remote attackers to inject arbitrary web script or HTML via the (1) rmore parameter to xlaabsolutenm.aspx and the (2) template parameter to pages/default.aspx.
|
[
"cpe:2.3:a:xigla:absolute_news_manager.net:5.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2016-11029
|
An issue was discovered on Samsung mobile devices with L(5.0/5.1), M(6.0), and N(7.0) software. Attackers can read the password of the Mobile Hotspot in the log because of an unprotected intent. The Samsung ID is SVE-2016-7301 (December 2016).
|
[
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-32636
|
A vulnerability has been identified in JT2Go (All versions < V2312.0005), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.10), Teamcenter Visualization V2312 (All versions < V2312.0005). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.
|
[
"cpe:2.3:a:siemens:parasolid:35.1:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:parasolid:36.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:parasolid:36.1:*:*:*:*:*:*:*"
] | 7.3 | 7.8 | null | null | null |
|
CVE-2011-2018
|
The kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, and Windows 7 Gold and SP1 does not properly initialize objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Exception Handler Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-v965-wwrq-gxfg
|
Alkacon OpenCMS XSS via file tree navigation in system/workplace/views/explorer/tree_files.jsp
|
Cross-site scripting (XSS) vulnerability in the file tree navigation function in system/workplace/views/explorer/tree_files.jsp in Alkacon OpenCMS 7.0.3 allows remote attackers to inject arbitrary web script or HTML via the resource parameter.
|
[] | 1.3 | null | null | null | null |
CVE-2024-10816
|
LUNA RADIO PLAYER <= 6.24.01.24 - Unauthenticated Arbitrary File Read
|
The LUNA RADIO PLAYER plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 6.24.01.24 via the js/fallback.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
|
[
"cpe:2.3:a:sodahead:luna_radio_player:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2024-26005
|
PHOENIX CONTACT: Privilege gain through incomplete cleanup in CHARX Series
|
An unauthenticated remote attacker can gain service level privileges through an incomplete cleanup during service restart after a DoS.
|
[] | null | 4.8 | null | null | null |
GHSA-pmg3-fq5j-v84g
|
Calling of non-existent provider in MobileWips application prior to SMR Feb-2021 Release 1 allows unauthorized actions including denial of service attack by hijacking the provider.
|
[] | null | null | null | null | null |
|
cisco-sa-nxos-nxapi-cmdinject-ULukNMZ2
|
Cisco NX-OS Software NX-API Command Injection Vulnerability
|
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges.
The vulnerability is due to insufficient input validation of user supplied data that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP POST request to the NX-API of an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system.
Note: The NX-API feature is disabled by default.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the February 2022 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2022 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74834"].
|
[] | null | 8.8 | null | null | null |
GHSA-9hv8-4frf-cprf
|
Grafana XSS via a column style
|
Grafana has a XSS vulnerability via a column style on the "Dashboard > Table Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
|
[] | 5.1 | 6.1 | null | null | null |
CVE-2012-0688
|
Cross-site scripting (XSS) vulnerability in TIBCO ActiveMatrix Platform in TIBCO Silver Fabric ActiveMatrix Service Grid Distribution 3.1.3, Service Grid and Service Bus 3.x before 3.1.5, BusinessWorks Service Engine 5.9.x before 5.9.3, and BPM before 1.3.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:tibco:silver_fabric_activematrix_service_grid_distribution:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_service_grid:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_service_grid:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_service_grid:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_service_grid:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_service_bus:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_service_bus:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_businessworks_service_engine:5.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_businessworks_service_engine:5.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_businessworks_service_engine:5.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_bpm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_bpm:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_bpm:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_bpm:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:activematrix_bpm:1.1.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2025-27777
|
Applio allows SSRF and file write in model_download.py
|
Applio is a voice conversion tool. Versions 3.2.7 and prior are vulnerable to server-side request forgery (SSRF) in `model_download.py` (line 195 in 3.2.7). The blind SSRF allows for sending requests on behalf of Applio server and can be leveraged to probe for other vulnerabilities on the server itself or on other back-end systems on the internal network, that the Applio server can reach. The blind SSRF can also be coupled with a arbitrary file read (e.g., CVE-2025-27784) to read files from hosts on the internal network, that the Applio server can reach, which would make it a full SSRF. As of time of publication, no known patches are available.
|
[] | 7.7 | null | null | null | null |
GHSA-pcrm-w585-fvg9
|
MUSASI version 3 contains an issue with use of client-side authentication. If this vulnerability is exploited, other users' credential and sensitive information may be retrieved.
|
[] | null | null | 7.5 | null | null |
|
GHSA-7665-6c6g-fgv5
|
The Conference Scheduler WordPress plugin before 2.4.3 does not sanitize and escape the tab parameter before outputting back in an admin page, leading to a Reflected Cross-Site Scripting.
|
[] | null | 6.1 | null | null | null |
|
CVE-2024-4767
|
If the `browser.privatebrowsing.autostart` preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
|
[] | null | 4.3 | null | null | null |
|
GHSA-3m7h-w87v-4x79
|
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of Annotation objects that could result in a memory leak in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 3.3 | null | null | null |
|
GHSA-gr4x-96qv-rrhg
|
In Crea8social 2018.2, there is Stored Cross-Site Scripting via a post.
|
[] | null | null | 5.4 | null | null |
|
CVE-2006-1033
|
Multiple cross-site scripting (XSS) vulnerabilities in Dragonfly CMS before 9.0.6.1 allow remote attackers to inject arbitrary web script or HTML via (1) uname, (2) error, (3) profile or (4) the username filed parameter to the (a) Your_Account module, (5) catid, (6) sid, (7) Story Text or (8) Extended text text fields in the (b) News module, (9) month, (10) year or (11) sa parameter to the (c) Stories_Archive module, (12) show, (13) cid, (14) ratetype, or (15) orderby parameter to the (d) Web_Links module, (16) op, or (17) pollid parameter to the (e) Surveys module, (18) c parameter to the (f) Downloads module, (19) meta, or (20) album parameter to the (g) coppermine module, or the search box in the (21) Search, (22) Stories_Archive, (23) Downloads, and (24) Topics module.
|
[
"cpe:2.3:a:cpg-nuke:dragonfly_cms:9.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cpg-nuke:dragonfly_cms:9.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpg-nuke:dragonfly_cms:9.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpg-nuke:dragonfly_cms:9.0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpg-nuke:dragonfly_cms:9.0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cpg-nuke:dragonfly_cms:9.0.6.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2021-31617
|
In ASQ in Stormshield Network Security (SNS) 1.0.0 through 2.7.8, 2.8.0 through 2.16.0, 3.0.0 through 3.7.20, 3.8.0 through 3.11.8, and 4.0.1 through 4.2.2, mishandling of memory management can lead to remote code execution.
|
[
"cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2025-4081
|
TCC Bypass via Dylib Substitution in DaVinci Resolve
|
Use of entitlement "com.apple.security.cs.disable-library-validation" and lack of launch and library load constraints allows to substitute a legitimate dylib with malicious one. A local attacker with unprivileged access can execute the application with altered dynamic library successfully bypassing Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission.
This issue affects DaVinci Resolve on macOS in all versions.
Last tested version: 19.1.3
|
[] | 4.8 | null | null | null | null |
GHSA-88c4-vf2r-rf3v
|
Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 12.1-12.4, 14.0-14.3 and 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).
|
[] | null | 6.4 | null | null | null |
|
GHSA-hgf7-47f3-2gq3
|
ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
|
[] | null | 7.8 | null | null | null |
|
RHSA-2023:6631
|
Red Hat Security Advisory: glib2 security and bug fix update
|
glib: GVariant offset table entry size is not checked in is_normal() glib: g_variant_byteswap() can take a long time with some non-normal inputs glib: GVariant deserialisation does not match spec for non-normal data
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.5 | null | null | null |
RHSA-2024:5627
|
Red Hat Security Advisory: fence-agents security update
|
urllib3: proxy-authorization request header is not stripped during cross-origin redirects
|
[
"cpe:/a:redhat:rhel_e4s:9.0::appstream",
"cpe:/a:redhat:rhel_e4s:9.0::highavailability",
"cpe:/a:redhat:rhel_e4s:9.0::resilientstorage"
] | null | 4.4 | null | null | null |
GHSA-f6qg-rg6j-cxgf
|
GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.
|
[] | null | 7.5 | null | null | null |
|
CVE-2010-1260
|
The IE8 Developer Toolbar in Microsoft Internet Explorer 8 SP1, SP2, and SP3 allows user-assisted remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability."
|
[
"cpe:2.3:a:microsoft:ie:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | 7.5 | null | 9.3 | null |
|
GHSA-jj66-r59x-7j8w
|
A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote attackers to authenticate as arbitrary users.
|
[] | null | null | null | null | null |
|
CVE-2020-7652
|
All versions of snyk-broker before 4.80.0 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users with access to Snyk's internal network via directory traversal.
|
[
"cpe:2.3:a:synk:broker:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 | null |
|
GHSA-57p5-7r24-7vg9
|
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Enterprise Infrastructure SEC). Supported versions that are affected are Prior to 9.2.8.0. Easily exploitable vulnerability allows high privileged attacker with network access via JDENET to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
|
[] | null | 2.7 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.