id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2010-2900 | Google Chrome before 5.0.375.125 does not properly handle a large canvas, which has unspecified impact and remote attack vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-rrm2-j9qx-652j | Cross-site scripting (XSS) vulnerability in index.php in telepark.wiki 2.4.23 and earlier allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | [] |
|
CVE-2024-49553 | Media Encoder | Out-of-bounds Write (CWE-787) | Media Encoder versions 25.0, 24.6.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:media_encoder:25.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-7vjj-xv8c-grpq | Buffer overflow in PHP 4.4.6 and earlier, and unspecified PHP 5 versions, allows local and possibly remote attackers to execute arbitrary code via long server name arguments to the (1) mssql_connect and (2) mssql_pconnect functions. | [] |
|
GHSA-2x3g-c9j6-ff9w | The heidi-luong1109/shackerpanel repository through 2021-05-25 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [] |
|
GHSA-f534-3845-rvj6 | SOPlanning 1.46.01 allows persistent XSS via the Project Name, Statutes Comment, Places Comment, or Resources Comment field. | [] |
|
CVE-2022-23954 | Potential vulnerabilities have been identified in the BIOS for some HP PC products which may allow denial of service. | [
"cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g6_small_form_factor_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g6_small_form_factor:-:*:*:*:*:*:*:*"
] |
|
GHSA-xcjc-c88c-v52w | CloudLinux
CageFS 7.0.8-2 or below insufficiently restricts file paths supplied to
the sendmail proxy command. This allows local users to read and write
arbitrary files outside the CageFS environment in a limited way. | [] |
|
GHSA-hh37-cm5v-2qrh | Emacs 24.4 allows remote attackers to bypass security restrictions. | [] |
|
CVE-2023-37344 | Kofax Power PDF BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability | Kofax Power PDF BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kofax Power PDF. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20441. | [
"cpe:2.3:a:kofax:power_pdf:5.0.0.19:*:*:*:*:*:*:*"
] |
CVE-2024-24161 | MRCMS 3.0 contains an Arbitrary File Read vulnerability in /admin/file/edit.do as the incoming path parameter is not filtered. | [
"cpe:2.3:a:mrcms:mrcms:3.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-31117 | WordPress WooCommerce Bookings Calendar plugin <= 1.0.36 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Moises Heberle WooCommerce Bookings Calendar.This issue affects WooCommerce Bookings Calendar: from n/a through 1.0.36.
| [] |
GHSA-h37x-959w-fc48 | JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object. | [] |
|
GHSA-rwf7-652f-76mv | Magento 2 Community Edition vulnerable to Improper Authorization | Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect permissions vulnerability within the Integrations component. This vulnerability could be abused by users with permissions to the Pages resource to delete cms pages via the REST API without authorization. | [] |
CVE-2022-26648 | A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). Affected devices do not properly validate the GET parameter XNo of incoming HTTP requests. This could allow an unauthenticated remote attacker to crash affected devices. | [
"cpe:2.3:o:siemens:scalance_x204-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x204-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x204-2fm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x204-2fm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x204-2ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x204-2ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x204-2ld_ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x204-2ld_ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x204-2ts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x204-2ts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x206-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x206-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x206-1ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x206-1ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x208_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x208_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x212-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x212-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x212-2ld_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x212-2ld:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x216_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x224_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x200-4p_irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x200-4p_irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x201-3p_irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x201-3p_irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x201-3p_irt_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x201-3p_irt_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x202-2p_irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x202-2p_irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x202-2p_irt_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x202-2p_irt_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_x204irt_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_x204irt_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:scalance_xf204irt:-:*:*:*:*:*:*:*"
] |
|
GHSA-35gx-vxvr-hvjq | Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | [] |
|
GHSA-mhm8-j49g-j7wp | The signal handler implementations in socat before 1.7.3.0 and 2.0.0-b8 allow remote attackers to cause a denial of service (process freeze or crash). | [] |
|
GHSA-g6hg-4jxh-87cr | Improper log management vulnerability in Galaxy Watch PlugIn prior to version 2.2.05.21033151 allows attacker with log permissions to leak Wi-Fi password connected to the user smartphone within log. | [] |
|
GHSA-4qgp-fhj8-cfm3 | IBM Spectrum Scale 5.1.0 through 5.1.3.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 221012. | [] |
|
GHSA-93wh-35r4-6qmw | Moodle allowed some users without permission to view other users' full names | It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. | [] |
GHSA-f2g5-426f-353q | Cross-site Scripting in Dolibarr | Dolibarr 12.0.5 is vulnerable to Cross Site Scripting (XSS) via Sql Error Page. | [] |
CVE-2014-5565 | The GadgetTrak Mobile Security (aka com.activetrak.android.app) application 1.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:gadgettrak:gadgettrak_mobile_security:1.6:*:*:*:*:android:*:*"
] |
|
CVE-2017-14322 | The function in charge to check whether the user is already logged in init.php in Interspire Email Marketer (IEM) prior to 6.1.6 allows remote attackers to bypass authentication and obtain administrative access by using the IEM_CookieLogin cookie with a specially crafted value. | [
"cpe:2.3:a:interspire:email_marketer:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-32859 | Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution. | [
"cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r14_ryzen_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_r15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_8960_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_8960:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:xps_8950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3521_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_3521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:inspiron_15_3510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:aurora_r16_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:aurora_r16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x17_r2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_x17_r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x15_r2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_x15_r2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x14_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_x14:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_aurora_ryzen_edition_r14_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_ryzen_edition_r14:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r15_amd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r15:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*"
] |
|
GHSA-7j3c-xq3f-9cr8 | AVG Internet Security 2015 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses when protecting user-mode processes, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors. | [] |
|
CVE-2021-29323 | OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow via the component /modules/network/wifi/esp/modwifi.c. | [
"cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-12789 | The Secure Monitor in Microchip Atmel ATSAMA5 products use a hardcoded key to encrypt and authenticate secure applets. | [
"cpe:2.3:o:microchip:atsama5d21c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d21c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d21c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d21c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d22c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d22c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d23c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d23c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d24c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d24c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d24c-cuf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d24c-cuf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d24c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d24c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d26c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d26c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cnvao_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cnvao:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-cnrvao_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-cnrvao:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d225c-d1m-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d225c-d1m-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d5m-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d5m-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d5m-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d5m-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-d1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-d1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-d1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-d1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-d1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-d1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld2g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld2g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27c-ld2g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27c-ld2g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld1g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld1g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld1g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld1g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld2g-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld2g-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d28c-ld2g-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d28c-ld2g-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27-wlsom1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27-wlsom1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d27-som1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d27-som1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cfu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cfu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d31a-cfur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d31a-cfur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d33a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d33a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d33a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d33a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d34a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d34a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d34a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d34a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d35a-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d35a-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cn_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d36a-cnr_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d36a-cnr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d41b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d41b-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d42b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d42b-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d43b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d43b-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44a-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44a-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44a-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44a-cur:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44b-cu_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44b-cu:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microchip:atsama5d44b-cur_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:microchip:atsama5d44b-cur:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-26925 | An information disclosure vulnerability exists in the Syslog functionality of D-LINK DIR-882 1.30. A specially crafted network request can lead to the disclosure of sensitive information. | [
"cpe:2.3:o:dlink:dir-882_firmware:1.30:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-882:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-48025 | Liblisp through commit 4c65969 was discovered to contain a out-of-bounds-read vulnerability in unsigned get_length(lisp_cell_t * x) at eval.c | [
"cpe:2.3:a:howerj:liblisp:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-1162 | An elevation of privilege (user to user) vulnerability exists in Windows Security Health Service when handling certain objects in memory.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1324. | [
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-1592 | SourceCodester Best Employee Management System Add Role Page Role.php cross site scripting | A vulnerability was found in SourceCodester Best Employee Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/Operations/Role.php of the component Add Role Page. The manipulation of the argument assign_name/description leads to cross site scripting. The attack may be launched remotely. | [] |
CVE-2013-5795 | Unspecified vulnerability in the Oracle Demantra Demand Management component in Oracle Supply Chain Products Suite 7.2.0.3 SQL-Server, 7.3.0, 7.3.1, 12.2.1, 12.2.2, and 12.2.3 allows remote attackers to affect confidentiality via unknown vectors related to DM Others. | [
"cpe:2.3:a:oracle:supply_chain_products_suite:7.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:supply_chain_products_suite_sql-server:12.2.3:*:*:*:*:*:*:*"
] |
|
CVE-2016-6457 | A vulnerability in the Cisco Nexus 9000 Series Platform Leaf Switches for Application Centric Infrastructure (ACI) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability affects Cisco Nexus 9000 Series Leaf Switches (TOR) - ACI Mode and Cisco Application Policy Infrastructure Controller (APIC). More Information: CSCuy93241. Known Affected Releases: 11.2(2x) 11.2(3x) 11.3(1x) 11.3(2x) 12.0(1x). Known Fixed Releases: 11.2(2i) 11.2(2j) 11.2(3f) 11.2(3g) 11.2(3h) 11.2(3l) 11.3(0.236) 11.3(1j) 11.3(2i) 11.3(2j) 12.0(1r). | [
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:11.2\\(2g\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:11.2\\(2h\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:11.2\\(2i\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:11.2\\(3c\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:11.2\\(3e\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:11.2\\(3h\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:11.3\\(1i\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:11.3\\(2f\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:11.3\\(2h\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:11.3\\(2i\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:12.0\\(1m\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:12.0\\(1n\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:12.0\\(1o\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:12.0\\(1p\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:nx-os:12.0\\(1q\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-41225 | A use of uninitialized value vulnerability in Tensorflow | TensorFlow is an open source platform for machine learning. In affected versions TensorFlow's Grappler optimizer has a use of unitialized variable. If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*"
] |
CVE-2024-33592 | WordPress Radio Player plugin <= 2.0.73 - Server Side Request Forgery (SSRF) vulnerability | Server-Side Request Forgery (SSRF) vulnerability in SoftLab Radio Player.This issue affects Radio Player: from n/a through 2.0.73.
| [] |
GHSA-cc4m-3fhg-62r3 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in a PDF. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-10189. | [] |
|
GHSA-p6m7-cwqx-m4h6 | The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | [] |
|
GHSA-9vpw-jxpr-w9pg | Adobe Acrobat and Reader versions 2020.006.20042 and earlier, 2017.011.30166 and earlier, 2017.011.30166 and earlier, and 2015.006.30518 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution . | [] |
|
GHSA-7hcx-w2fp-wfhr | Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication. | [] |
|
CVE-2022-26023 | A leftover debug code vulnerability exists in the console verify functionality of InHand Networks InRouter302 V3.5.45. A specially-crafted series of network requests can lead to disabling security features. An attacker can send a sequence of requests to trigger this vulnerability. | [
"cpe:2.3:o:inhandnetworks:ir302_firmware:3.5.45:*:*:*:*:*:*:*",
"cpe:2.3:h:inhandnetworks:ir302:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-24839 | SupportCandy < 2.2.5 - Unauthenticated Arbitrary Ticket Deletion | The SupportCandy WordPress plugin before 2.2.5 does not have authorisation and CSRF checks in its wpsc_tickets AJAX action, which could allow unauthenticated users to call it and delete arbitrary tickets via the set_delete_permanently_bulk_ticket setting_action. Other actions may be affected as well. | [
"cpe:2.3:a:supportcandy:supportcandy:*:*:*:*:*:wordpress:*:*"
] |
GHSA-5x27-p5w5-hmmg | An issue was discovered in MISP before 2.4.176. app/Model/AppModel.php mishandles filters. | [] |
|
GHSA-vmwq-gw9g-wqfq | In AT_SKIP_REST of bta_hf_client_at.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure in the Bluetooth stack with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220732646 | [] |
|
GHSA-8595-9266-fv84 | Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. | [] |
|
GHSA-vx7j-xjrp-5gjh | Cross-site scripting (XSS) vulnerability in modules/slideshowmodule/slideshow.js.php in Exponent CMS 0.97.0 allows remote attackers to inject arbitrary web script or HTML via the u parameter. | [] |
|
CVE-2021-35227 | Insecure Web Configuration for RabbitMQ Management Plugin in SolarWinds ARM | The HTTP interface was enabled for RabbitMQ Plugin in ARM 2020.2.6 and the ability to configure HTTPS was not available. | [
"cpe:2.3:a:solarwinds:access_rights_manager:*:*:*:*:*:*:*:*"
] |
GHSA-vpq9-c67q-23fq | Fastly Magento2 sensitive information disclosure | The Fastly CDN module before 1.2.26 for Magento2, when used with a third-party authentication plugin, might allow remote authenticated users to obtain sensitive information from authenticated sessions via vectors involving caching of redirect responses. | [] |
CVE-2023-29626 | Yoga Class Registration System 1.0 was discovered to contain a SQL injection vulnerability via the cid parameter at /admin/login.php. | [
"cpe:2.3:a:yoga_class_registration_system_project:yoga_class_registration_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-v8wh-q2rf-jg6p | In Messaging, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | [] |
|
CVE-2007-5264 | Battlefront Dropteam 1.3.3 and earlier sends the client's online account name and password to the game server, which allows malicious game servers to steal account information. | [
"cpe:2.3:a:battlefront:dropteam:*:*:*:*:*:*:*:*"
] |
|
GHSA-q534-gvjc-fpgw | Cross-site scripting (XSS) vulnerability in login.php in Miro Project Broadcast Machine 0.9.9.9 allows remote attackers to inject arbitrary web script or HTML via the username parameter. | [] |
|
CVE-2023-51847 | An issue in obgm and Libcoap v.a3ed466 allows a remote attacker to cause a denial of service via thecoap_context_t function in the src/coap_threadsafe.c:297:3 component. | [
"cpe:2.3:a:libcoap:libcoap:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-5421 | Cross-site scripting (XSS) vulnerability in the IMS server before Ifix 6 in IBM Security Access Manager for Enterprise Single Sign-On (ISAM ESSO) 8.2 allows remote attackers to inject arbitrary web script or HTML via crafted input to an unspecified dynamic web form. | [
"cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2:*:*:*:*:*:*:*"
] |
|
CVE-2021-40159 | An Information Disclosure vulnerability for JT files in Autodesk Inventor 2022, 2021, 2020, 2019 in conjunction with other vulnerabilities may lead to code execution through maliciously crafted JT files in the context of the current process. | [
"cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:inventor:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:inventor:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:inventor:2021:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:inventor:2022:*:*:*:*:*:*:*"
] |
|
GHSA-fc4q-fgrg-whcw | The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs. | [] |
|
GHSA-575w-jrpq-q9xv | A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. | [] |
|
GHSA-8hfg-jv43-67g2 | The user may be tricked into opening a malicious FBX file which may exploit a Null Pointer Dereference vulnerability in FBX's Review causing the application to crash leading to a denial of service. | [] |
|
GHSA-45c7-44wq-fm8v | Affected versions of Atlassian Jira Server allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in Jira issue filter export files. The affected versions are before 8.5.9, from version 8.6.0 before 8.12.3, and from version 8.13.0 before 8.13.1. | [] |
|
CVE-2006-5044 | Unspecified vulnerability in Prince Clan (Princeclan) Chess component (com_pcchess) 0.8 and earlier for Mambo and Joomla! has unspecified impact and attack vectors. | [
"cpe:2.3:a:joomla:prince_clan_chess_component:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:prince_clan_chess_component:*:*:*:*:*:*:*:*"
] |
|
GHSA-xvvx-jmvr-f8rg | The sell function of a smart contract implementation for Nectar (NCTR), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets. | [] |
|
GHSA-7g9c-p722-9h45 | Cross-site scripting (XSS) vulnerability in index.php in AZ Photo Album Script Pro allows remote attackers to inject arbitrary web script or HTML via the gazpart parameter. | [] |
|
CVE-2018-11061 | RSA NetWitness Platform versions prior to 11.1.0.2 and RSA Security Analytics versions prior to 10.6.6 are vulnerable to a server-side template injection vulnerability due to insecure configuration of the template engine used in the product. A remote authenticated malicious RSA NetWitness Server user with an Admin or Operator role could exploit this vulnerability to execute arbitrary commands on the server with root privileges. | [
"cpe:2.3:a:emc:rsa_netwitness:*:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_security_analytics:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-6240 | NVIDIA Tegra contains a vulnerability in BootRom where a user with kernel level privileges can write an arbitrary value to an arbitrary physical address | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2014-8613 | The sctp module in FreeBSD 10.1 before p5, 10.0 before p17, 9.3 before p9, and 8.4 before p23 allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted RE_CONFIG chunk. | [
"cpe:2.3:o:freebsd:freebsd:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-8260 | OPA SMB Force-Authentication | A SMB force-authentication vulnerability exists in all versions of OPA for Windows prior to v0.68.0. The vulnerability exists because of improper input validation, allowing a user to pass an arbitrary SMB share instead of a Rego file as an argument to OPA CLI or to one of the OPA Go library’s functions. | [
"cpe:2.3:a:openpolicyagent:open_policy_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-5r72-8qwv-mccg | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stephanie Leary Convert Post Types allows Reflected XSS.This issue affects Convert Post Types: from n/a through 1.4. | [] |
|
CVE-2016-0126 | Microsoft Office 2013 SP1, 2013 RT SP1, and 2016 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*"
] |
|
GHSA-96x6-ppmq-j9wc | Improper authorization verification vulnerability in Samsung Email prior to version 6.1.90.4 allows attackers to read sandbox data of email. | [] |
|
CVE-2018-18920 | Py-EVM v0.2.0-alpha.33 allows attackers to make a vm.execute_bytecode call that triggers computation._stack.values with '"stack": [100, 100, 0]' where b'\x' was expected, resulting in an execution failure because of an invalid opcode. This is reportedly related to "smart contracts can be executed indefinitely without gas being paid." | [
"cpe:2.3:a:ethereum:py-evm:0.2.0:alpha.33:*:*:*:*:*:*"
] |
|
CVE-2014-4070 | Cross-site scripting (XSS) vulnerability in the Web Components Server in Microsoft Lync Server 2013 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Lync XSS Information Disclosure Vulnerability." | [
"cpe:2.3:a:microsoft:lync_server:2013:*:*:*:*:*:*:*"
] |
|
CVE-2011-0845 | Unspecified vulnerability in the Database Control component in Oracle Enterprise Manager Grid Control 10.1.0.6 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | [
"cpe:2.3:a:oracle:enterprise_manager_grid_control:10.1.0.6:*:*:*:*:*:*:*"
] |
|
CVE-2018-1888 | An untrusted search path vulnerability in IBM i Access for Windows versions 7.1 and earlier on Windows can allow arbitrary code execution via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function. IBM X-Force ID: 152079. | [
"cpe:2.3:a:ibm:i_access:*:*:*:*:*:windows:*:*"
] |
|
CVE-2019-7059 | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-6f59-wxf3-55jc | Unspecified vulnerability in the Oracle Retail Order Broker component in Oracle Retail Applications 15.0 allows remote attackers to affect confidentiality and integrity via vectors related to System Administration. | [] |
|
CVE-2024-57766 | MSFM before 2025.01.01 was discovered to contain a fastjson deserialization vulnerability via the component system/table/editField. | [] |
|
CVE-2022-3520 | Heap-based Buffer Overflow in vim/vim | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765. | [
"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*"
] |
CVE-2017-8700 | ASP.NET Core 1.0, 1.1, and 2.0 allow an attacker to bypass Cross-origin Resource Sharing (CORS) configurations and retrieve normally restricted content from a web application, aka "ASP.NET Core Information Disclosure Vulnerability". | [
"cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-38070 | A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20818) | [
"cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-36056 | Vulnerabilities with blob verification in sigstore cosign | Cosign is a project under the sigstore organization which aims to make signatures invisible infrastructure. In versions prior to 1.12.0 a number of vulnerabilities have been found in cosign verify-blob, where Cosign would successfully verify an artifact when verification should have failed. First a cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature. Second, when providing identity flags, the email and issuer of a certificate is not checked when verifying a Rekor bundle, and the GitHub Actions identity is never checked. Third, providing an invalid Rekor bundle without the experimental flag results in a successful verification. And fourth an invalid transparency log entry will result in immediate success for verification. Details and examples of these issues can be seen in the GHSA-8gw7-4j42-w388 advisory linked. Users are advised to upgrade to 1.12.0. There are no known workarounds for these issues. | [
"cpe:2.3:a:sigstore:cosign:*:*:*:*:*:*:*:*"
] |
CVE-2025-25101 | WordPress Munk Sites plugin <= 1.0.7 - CSRF to Arbitrary Plugin Installation vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in MetricThemes Munk Sites allows Cross Site Request Forgery. This issue affects Munk Sites: from n/a through 1.0.7. | [] |
GHSA-3gj4-2f6h-gghr | Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter wan_hostname and forcing a reboot. This will result in command injection. | [] |
|
CVE-2015-5023 | SQL injection vulnerability in IBM Curam Social Program Management 6.1 before 6.1.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:ibm:curam_social_program_management:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:curam_social_program_management:6.1:*:*:*:*:*:*:*"
] |
|
CVE-2014-7771 | The World Tamil Bayan (aka com.wWorldTamilBayan) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:worldtamilbayan:world_tamil_bayan:0.1:*:*:*:*:android:*:*"
] |
|
CVE-2024-39877 | Apache Airflow: DAG Author Code Execution possibility in airflow-scheduler | Apache Airflow 2.4.0, and versions before 2.9.3, has a vulnerability that allows authenticated DAG authors to craft a doc_md parameter in a way that could execute arbitrary code in the scheduler context, which should be forbidden according to the Airflow Security model. Users should upgrade to version 2.9.3 or later which has removed the vulnerability. | [
"cpe:2.3:a:apache:airflow:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
] |
CVE-2020-27997 | An issue was discovered in SmartStoreNET before 4.1.0. Lack of Cross Site Request Forgery (CSRF) protection may lead to elevation of privileges (e.g., /admin/customer/create to create an admin account). | [
"cpe:2.3:a:smartstore:smartstorenet:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-11393 | An issue was discovered in /admin/users/update in M/Monit before 3.7.3. It allows unprivileged users to escalate their privileges to an administrator by requesting a password change and specifying the admin parameter. | [
"cpe:2.3:a:tildeslash:monit:*:*:*:*:*:*:*:*"
] |
|
GHSA-xmwx-6752-9m3f | A vulnerability has been identified in JT2Go (All versions), Solid Edge SE2021 (All versions < SE2021MP9), Solid Edge SE2022 (All versions < SE2022MP1), Teamcenter Visualization V12.4 (All versions), Teamcenter Visualization V13.1 (All versions), Teamcenter Visualization V13.2 (All versions), Teamcenter Visualization V13.3 (All versions < V13.3.0.1). The plmxmlAdapterSE70.dll library is vulnerable to memory corruption condition while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-15110) | [] |
|
CVE-2017-10769 | XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!memcmp+0x0000000000000018" (without RPC initialization). | [
"cpe:2.3:a:xnview:xnview:2.40:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-20186 | An issue was discovered in Bento4 1.5.1-627. AP4_Sample::ReadData in Core/Ap4Sample.cpp allows attackers to trigger an attempted excessive memory allocation, related to AP4_DataBuffer::SetDataSize and AP4_DataBuffer::ReallocateBuffer in Core/Ap4DataBuffer.cpp. | [
"cpe:2.3:a:axiosys:bento4:1.5.1-627:*:*:*:*:*:*:*"
] |
|
CVE-2020-26768 | Formstone <=1.4.16 is vulnerable to a Reflected Cross-Site Scripting (XSS) vulnerability caused by improper validation of user supplied input in the upload-target.php and upload-chunked.php files. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site once the URL is clicked or visited. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials, force malware execution, user redirection and others. | [
"cpe:2.3:a:formstone:formstone:*:*:*:*:*:*:*:*"
] |
|
CVE-2000-0715 | DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file. | [
"cpe:2.3:a:kirk_bauer:diskcheck:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*"
] |
|
GHSA-hfq9-hggm-c56q | XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream | ImpactThe vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver.PatchesXStream 1.4.21 detects the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead.WorkaroundsThe only solution is to catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.ReferencesSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2024-47072](https://x-stream.github.io/CVE-2024-47072.html).CreditsAlexis Challande of Trail Of Bits found and reported the issue to XStream and provided the required information to reproduce it. | [] |
GHSA-xpr8-vpc7-7vfc | Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. | [] |
|
CVE-2002-1695 | Norton Internet Security 2001 opens log files with FILE_SHARE_READ and FILE_SHARE_WRITE permissions, which could allow remote attackers to modify the log file contents while Norton Internet Security is running. | [
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_internet_security:2001:*:*:*:*:*:*:*"
] |
|
GHSA-gq3h-3p4j-vffv | A vulnerability in Cisco Webex Meetings and Cisco Webex Meetings Server could allow an unauthenticated, remote attacker to join a Webex session without appearing on the participant list. This vulnerability is due to improper handling of authentication tokens by a vulnerable Webex site. An attacker could exploit this vulnerability by sending crafted requests to a vulnerable Cisco Webex Meetings or Cisco Webex Meetings Server site. A successful exploit requires the attacker to have access to join a Webex meeting, including applicable meeting join links and passwords. The attacker could then exploit this vulnerability to join meetings, without appearing in the participant list, while having full access to audio, video, chat, and screen sharing capabilities. | [] |
|
GHSA-2pmm-55vx-qrxv | DrayTek Vigor3900 v1.5.1.6 was discovered to contain an authenticated command injection vulnerability via the value parameter in the filter_string function. | [] |
|
GHSA-395m-2555-53cr | The nft_flush_table function in net/netfilter/nf_tables_api.c in the Linux kernel before 3.18.5 mishandles the interaction between cross-chain jumps and ruleset flushes, which allows local users to cause a denial of service (panic) by leveraging the CAP_NET_ADMIN capability. | [] |
|
GHSA-p6c2-p9cm-gh28 | Improper buffer restrictions in Intel(R) Media SDK all versions may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2009-3480 | SQL injection vulnerability in the iCRM Basic (com_icrmbasic) component 1.4.2.31 for Joomla! allows remote attackers to execute arbitrary SQL commands via the p3 parameter to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:isygen:icrm_basic:1.4.2.31:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-29780 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_prototype_sort at src/njs_array.c. | [
"cpe:2.3:a:nginx:njs:0.7.2:*:*:*:*:*:*:*"
] |
Subsets and Splits