id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2015-4998 | Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 6.1.0 through 6.1.0.6 CF27, 6.1.5 through 6.1.5.3 CF27, 7.0.0 through 7.0.0.2 CF29, 8.0.0 before 8.0.0.1 CF19, and 8.5.0 before CF08 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2015-4993. | [
"cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.5.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-h9wh-q83g-2p6c | Microsoft Windows Media Player 6.4, Windows Media Format Runtime 7.1 through 11, and Windows Media Services 4.1 and 9 incorrectly associate ISATAP addresses with the Local Intranet zone, which allows remote servers to capture NTLM credentials, and execute arbitrary code through credential-reflection attacks, by sending an authentication request, aka "ISATAP Vulnerability." | [] |
|
CVE-2025-0751 | Axiomatic Bento4 mp42aac ReadBits heap-based overflow | A vulnerability classified as critical has been found in Axiomatic Bento4 up to 1.6.0. This affects the function AP4_BitReader::ReadBits of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-8788-jfvm-qx9r | Insufficient data validation in filesystem URIs in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name. | [] |
|
CVE-2018-19424 | ClipperCMS 1.3.3 allows remote authenticated administrators to upload .htaccess files. | [
"cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*"
] |
|
GHSA-55r9-7mf8-m382 | Cross-site Scripting in edge.js | Edge is a logical and batteries included template engine for Node.js. This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if `{{ }}` are used. | [] |
GHSA-rcv3-6pgv-6p72 | A local file inclusion vulnerability on the Trend Micro Apex One management server could allow a local attacker to escalate privileges on affected installations.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [] |
|
CVE-2020-7571 | A CWE-79 Multiple Improper Neutralization of Input During Web Page Generation (Cross-site Scripting Reflected) vulnerability exists in EcoStruxure Building Operation WebReports V1.9 - V3.1 that could cause a remote attacker to inject arbitrary web script or HTML due to incorrect sanitization of user supplied data and achieve a Cross-Site Scripting reflected attack against other WebReport users. | [
"cpe:2.3:a:schneider-electric:webreports:*:*:*:*:*:*:*:*"
] |
|
GHSA-3c7c-8h8f-3p6v | Use After Free in GitHub repository vim/vim prior to 8.2. | [] |
|
CVE-2023-6684 | The Ibtana – WordPress Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ive' shortcode in versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping on 'width' and 'height' user supplied attribute. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:vowelweb:ibtana:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-2rv4-2r9c-4q9r | NVIDIA Jetson contains a vulnerability in CBoot, where the PCIe controller is initialized without IOMMU, which may allow an attacker with physical access to the target device to read and write to arbitrary memory. A successful exploit of this vulnerability may lead to code execution, denial of service, information disclosure, and loss of integrity. | [] |
|
CVE-2021-24967 | Contact Form & Lead Form Elementor Builder < 1.6.4 - Unauthenticated Stored Cross-Site Scripting | The Contact Form & Lead Form Elementor Builder WordPress plugin before 1.6.4 does not sanitise and escape some lead values, which could allow unauthenticated users to perform Cross-Site Scripting attacks against logged in admin viewing the inserted Leads | [
"cpe:2.3:a:themehunk:contact_form_\\&_lead_form_elementor_builder:*:*:*:*:*:wordpress:*:*"
] |
CVE-2001-1408 | Directory traversal vulnerability in readmsg.php in WebMail 2.0.1 in Cobalt Qube 3 allows remote attackers to read arbitrary files via a .. (dot dot) in the mailbox parameter. | [
"cpe:2.3:a:cobalt:qube:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cobalt:webmail:2.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-5x7h-3m5j-hrpm | Lack of null check while freeing the device information buffer in the Bluetooth HFP protocol can lead to a NULL pointer dereference in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wearables | [] |
|
CVE-2022-33254 | Reachable assertion in Modem | Transient DOS due to reachable assertion in Modem while processing SIB1 Message. | [
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx65_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx70m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx65:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx70m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_4_gen_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] |
GHSA-r884-9fgg-6q7w | A vulnerability was discovered in Samsung Mobile Processor Exynos 850, Exynos 9610, Exynos 980, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, and Exynos W930 where it does not properly check a pointer address, which can lead to a Information disclosure. | [] |
|
CVE-2012-3355 | (1) AlbumTab.py, (2) ArtistTab.py, (3) LinksTab.py, and (4) LyricsTab.py in the Context module in GNOME Rhythmbox 0.13.3 and earlier allows local users to execute arbitrary code via a symlink attack on a temporary HTML template file in the /tmp/context directory. | [
"cpe:2.3:a:gnome:rhythmbox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.5.88:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.6.90:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.10.0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnome:rhythmbox:0.13.2:*:*:*:*:*:*:*"
] |
|
GHSA-4p32-9x43-4rpv | A SQL injection issue was discovered in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects /inc/lists/view-list.php (Requires authentication to Wordpress admin) with the GET Parameter: filter_list. | [] |
|
CVE-2023-49253 | Predefined root password | Root user password is hardcoded into the device and cannot be changed in the user interface.
| [
"cpe:2.3:o:hongdian:h8951-4g-esp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hongdian:h8951-4g-esp:-:*:*:*:*:*:*:*"
] |
GHSA-h9wv-h3g7-2r2r | Multiple vulnerabilities in the implementation of the Cisco Discovery Protocol and Link Layer Discovery Protocol (LLDP) for Cisco Video Surveillance 7000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. These vulnerabilities are due to incorrect processing of certain Cisco Discovery Protocol and LLDP packets at ingress time. An attacker could exploit these vulnerabilities by sending crafted Cisco Discovery Protocol or LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DoS condition. Note: Cisco Discovery Protocol and LLDP are Layer 2 protocols. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). | [] |
|
CVE-2014-4090 | Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2799, CVE-2014-4059, CVE-2014-4065, CVE-2014-4079, CVE-2014-4081, CVE-2014-4083, CVE-2014-4085, CVE-2014-4088, CVE-2014-4094, CVE-2014-4097, CVE-2014-4100, CVE-2014-4103, CVE-2014-4104, CVE-2014-4105, CVE-2014-4106, CVE-2014-4107, CVE-2014-4108, CVE-2014-4109, CVE-2014-4110, and CVE-2014-4111. | [
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
GHSA-3q75-2gg2-99h4 | The administration functionality in Wuzly 2.0 allows remote attackers to bypass authentication by setting the dXNlcm5hbWU cookie. | [] |
|
GHSA-q5r8-rw72-26h2 | In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf100282c. | [] |
|
GHSA-72fh-3prm-m3pv | Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: through 19.03.2025.NOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available. | [] |
|
GHSA-f7qv-f82g-445f | Google Chrome before 6.0.472.59 does not prompt the user before granting access to the extension history, which allows attackers to obtain potentially sensitive information via unspecified vectors. | [] |
|
GHSA-76rf-4h55-3cr9 | The Member Access plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.1.6 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator. | [] |
|
GHSA-vfq9-cg6g-39g5 | CSRF in YouTube (WordPress plugin) could allow unauthenticated attacker to change any setting within the plugin | [] |
|
GHSA-q292-6rrq-qv64 | bzip2 allows remote attackers to cause a denial of service (hard drive consumption) via a crafted bzip2 file that causes an infinite loop (a.k.a "decompression bomb"). | [] |
|
CVE-2018-14473 | OCS Inventory 2.4.1 lacks a proper XML parsing configuration, allowing the use of external entities. This issue can be exploited by an attacker sending a crafted HTTP request in order to exfiltrate information or cause a Denial of Service. | [
"cpe:2.3:a:ocsinventory-ng:ocsinventory_ng:2.4.1:*:*:*:*:*:*:*"
] |
|
GHSA-wg22-f643-fv8w | A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody). | [] |
|
CVE-2023-39919 | WordPress wpShopGermany – Protected Shops Plugin <= 2.0 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in maennchen1.De wpShopGermany – Protected Shops plugin <= 2.0 versions. | [
"cpe:2.3:a:maennchen1:wpshopgermany_-_protected_shops:*:*:*:*:*:wordpress:*:*"
] |
CVE-2007-6558 | TotalPlayer 3.0 allows user-assisted remote attackers to cause a denial of service (application crash) via a large .m3u file. NOTE: this might be a duplicate of CVE-2006-6288. | [
"cpe:2.3:a:totalplayer:totalplayer:3.0:*:*:*:*:*:*:*"
] |
|
GHSA-xvc2-6386-99x8 | The myStickymenu WordPress plugin before 2.6.5 does not adequately authorize some ajax calls, allowing any logged-in user to perform the actions. | [] |
|
GHSA-27jj-5xgw-m6qw | Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character. | [] |
|
GHSA-xp82-mcr3-r33g | An elevation of privilege vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability'. | [] |
|
CVE-2005-4565 | Format string vulnerability in the Internet Key Exchange version 1 (IKEv1) implementation in ADTRAN NetVanta before 10.03.03.E might allow remote attackers to have an unknown impact via format string specifiers in crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. | [
"cpe:2.3:h:adtran:netvanta:3xxx:*:*:*:*:*:*:*",
"cpe:2.3:h:adtran:netvanta:4xxx:*:*:*:*:*:*:*",
"cpe:2.3:h:adtran:netvanta:5xxx:*:*:*:*:*:*:*"
] |
|
GHSA-2rpr-pf46-4w2m | Cross-site scripting (XSS) vulnerability in the Ubercart Webform Integration module before 6.x-1.8 and 7.x before 7.x-2.4 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2018-17189 | In Apache HTTP server versions 2.4.37 and prior, by sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread cleaning up that incoming data. This affects only HTTP/2 (mod_http2) connections. | [
"cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:2.4.37:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:sun_zfs_storage_appliance_kit:8.8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-5783 | In IgniteNet HeliOS GLinq v2.2.1 r2961, the login functionality does not contain any CSRF protection mechanisms. | [
"cpe:2.3:a:ignitenet:helios_glinq:2.2.1:r2961:*:*:*:*:*:*"
] |
|
GHSA-hvmh-jgw7-f7xg | A stored CSV Injection vulnerability was reported in Lenovo XClarity Controller (XCC) that could allow an administrative or other appropriately permissioned user to store malformed data in certain XCC server informational fields, that could result in crafted formulas being stored in an exported CSV file. The crafted formula is not executed on XCC itself and has no effect on the server. | [] |
|
CVE-2003-1069 | The Telnet daemon (in.telnetd) for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (CPU consumption by infinite loop). | [
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] |
|
GHSA-7v82-2vfh-cvvp | Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1.1 and 8.2.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Portal Framework, a different vulnerability than CVE-2015-0417. | [] |
|
GHSA-ff83-c42x-4r2x | Milesight IP security cameras through 2016-11-14 have a buffer overflow in a web application via a long username or password. | [] |
|
GHSA-q7g9-6pv9-v3vp | A vulnerability was found in PandaXGO PandaX up to 20240310. It has been classified as critical. Affected is an unknown function of the file /apps/system/router/upload.go of the component File Extension Handler. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257064. | [] |
|
CVE-2022-0388 | Interactive Medical Drawing of Human Body < 2.6 - Admin+ Stored XSS | The Interactive Medical Drawing of Human Body WordPress plugin before 2.6 does not sanitise and escape the Link field, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | [
"cpe:2.3:a:humananatomyillustrations:interactive_medical_drawing_of_human_body:*:*:*:*:*:wordpress:*:*"
] |
GHSA-8xj3-mf49-rfmm | The MHTML protocol handler in a component of Microsoft Outlook Express 5.5 SP2 and 6 through SP1, and Windows Mail, does not assign the correct Internet Explorer Security Zone to UNC share pathnames, which allows remote attackers to bypass intended access restrictions and read arbitrary files via an mhtml: URI in conjunction with a redirection, aka "URL Parsing Cross-Domain Information Disclosure Vulnerability." | [] |
|
GHSA-cqqc-24qc-5669 | Windows DHCP Client Elevation of Privilege Vulnerability. | [] |
|
GHSA-56p6-46p2-h7q6 | IBM Security Guardium 10.0, 10.0.1, 10.1, 10.1.2, 10.1.3, 10.1.4, and 10.5 does not validate, or incorrectly validates, a certificate. This weakness might allow an attacker to spoof a trusted entity by using a man-in-the-middle (MITM) techniques. IBM X-Force ID: 124740. | [] |
|
CVE-2020-6422 | Use after free in WebGL in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"
] |
|
CVE-2025-24066 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability | Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally. | [] |
GHSA-783c-mvqh-hj8j | The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges. | [] |
|
CVE-2024-27137 | Apache Cassandra: unrestricted deserialization of JMX authentication credentials | In Apache Cassandra it is possible for a local attacker without access
to the Apache Cassandra process or configuration files to manipulate
the RMI registry to perform a man-in-the-middle attack and capture user
names and passwords used to access the JMX interface. The attacker can
then use these credentials to access the JMX interface and perform
unauthorized operations.
This is same vulnerability that CVE-2020-13946 was issued for, but the Java option was changed in JDK10.
This issue affects Apache Cassandra from 4.0.2 through 5.0.2 running Java 11.
Operators are recommended to upgrade to a release equal to or later than 4.0.15, 4.1.8, or 5.0.3 which fixes the issue. | [] |
GHSA-49xr-rr65-3xpc | S3QL before 2.27 mishandles checksumming, and consequently allows replay attacks in which an attacker who controls the backend can present old versions of the filesystem metadata database as up-to-date, temporarily inject zero-valued bytes into files, or temporarily hide parts of files. This is related to the checksum_basic_mapping function. | [] |
|
CVE-2003-0948 | Buffer overflow in iwconfig allows local users to execute arbitrary code via a long HOME environment variable. | [
"cpe:2.3:a:wireless_tools:wireless_tools:19:*:*:*:*:*:*:*",
"cpe:2.3:a:wireless_tools:wireless_tools:20:*:*:*:*:*:*:*",
"cpe:2.3:a:wireless_tools:wireless_tools:21:*:*:*:*:*:*:*",
"cpe:2.3:a:wireless_tools:wireless_tools:22:*:*:*:*:*:*:*",
"cpe:2.3:a:wireless_tools:wireless_tools:23:*:*:*:*:*:*:*",
"cpe:2.3:a:wireless_tools:wireless_tools:24:*:*:*:*:*:*:*",
"cpe:2.3:a:wireless_tools:wireless_tools:25:*:*:*:*:*:*:*",
"cpe:2.3:a:wireless_tools:wireless_tools:26:*:*:*:*:*:*:*"
] |
|
GHSA-fwmj-hvwp-4mhj | IBM Curam Social Program Management 5.2, 6.0, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 120256. | [] |
|
CVE-2006-2586 | Cross-site scripting (XSS) vulnerability in IpLogger 1.7 and earlier allows remote attackers to inject arbitrary HTML or web script via the HTTP_REFERER header in an HTTP request. | [
"cpe:2.3:a:iplogger:iplogger:1.7:*:*:*:*:*:*:*"
] |
|
CVE-2024-34014 | Arbitrary file overwrite during recovery due to improper symbolic link handling. The following products are affected: Acronis Backup plugin for cPanel & WHM (Linux) before build 1.8.3.818, Acronis Backup plugin for cPanel & WHM (Linux) before build 1.9.1.892, Acronis Backup extension for Plesk (Linux) before build 1.8.6.599, Acronis Backup plugin for DirectAdmin (Linux) before build 1.2.2.181. | [] |
|
CVE-2023-38935 | Tenda AC1206 V15.03.06.23, AC8 V4 V16.03.34.06, AC5 V1.0 V15.03.06.28, AC10 v4.0 V16.03.10.13 and AC9 V3.0 V15.03.06.42_multi were discovered to contain a tack overflow via the list parameter in the formSetQosBand function. | [
"cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:ac5_firmware:15.03.06.28:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac5:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:ac9_firmware:15.03.06.42_multi:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac9:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac8:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:ac10_firmware:16.03.10.13:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac10:4.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-52593 | wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() | In the Linux kernel, the following vulnerability has been resolved:
wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()
Since 'ieee80211_beacon_get()' can return NULL, 'wfx_set_mfp_ap()'
should check the return value before examining skb data. So convert
the latter to return an appropriate error code and propagate it to
return from 'wfx_start_ap()' as well. Compile tested only. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-h5g4-hpfp-3289 | A vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of UDP packets on port 500 (used for L2TP over IPsec), preventing the affected router from accepting new connections; all devices will be disconnected from the router and all logs removed automatically. | [] |
|
GHSA-79r2-3g59-m287 | A vulnerability classified as critical has been found in SourceCodester Automatic Question Paper Generator System 1.0. This affects an unknown part of the file classes/Users.php?f=save_ruser. The manipulation of the argument id/email leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-223659. | [] |
|
GHSA-vmmr-9gm6-5j6r | DirectAccess in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly verify server X.509 certificates, which allows man-in-the-middle attackers to spoof servers and read encrypted domain credentials via a crafted certificate. | [] |
|
GHSA-rg6x-8jjg-m64f | Incorrect access control in Chamilo v1.11.x up to v1.11.18 allows a student to arbitrarily access and modify another student's personal notes. | [] |
|
GHSA-w2j5-x4w8-mcp8 | Cross-site scripting (XSS) vulnerability in blosxom.cgi in Blosxom before 2.1.2 allows remote attackers to inject arbitrary web script or HTML via the flav parameter (flavour variable). NOTE: some of these details are obtained from third party information. | [] |
|
GHSA-59rf-fq39-rh6x | It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions. | [] |
|
CVE-2012-3323 | IBM Maximo Asset Management 6.2 before 6.2.8, 7.1 before 7.1.1.12, and 7.5 before 7.5.0.3 allows remote attackers to gain privileges via unspecified vectors. | [
"cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*"
] |
|
GHSA-4w94-8ff7-4xmw | An improper authentication issue was discovered in Johnson & Johnson Ethicon Endo-Surgery Generator Gen11, all versions released before November 29, 2017. The security authentication mechanism used between the Ethicon Endo-Surgery Generator Gen11 and single-patient use products can be bypassed, allowing for unauthorized devices to be connected to the generator, which could result in a loss of integrity or availability. | [] |
|
CVE-2013-0081 | Microsoft SharePoint Portal Server 2003 SP3 and SharePoint Server 2007 SP3, 2010 SP1 and SP2, and 2013 do not properly process unassigned workflows, which allows remote attackers to cause a denial of service (W3WP process hang) via a crafted URL, aka "SharePoint Denial of Service Vulnerability." | [
"cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_portal_server:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2013:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_services:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_services:3.0:*:*:*:*:*:*:*"
] |
|
GHSA-2f3m-q67g-g8rh | Unspecified vulnerability in the Portal component in Oracle Application Server 10.1.2.3 and 10.1.4.2 allows remote attackers to affect integrity via unknown vectors, a different vulnerability than CVE-2009-0983 and CVE-2009-3407. | [] |
|
GHSA-vvf9-x2f5-h29c | The cacheservice API could be abused to indirectly inject parameters with SQL syntax which was insufficiently sanitized and would later be executed when creating new cache groups. Attackers with access to a local or restricted network could perform arbitrary SQL queries. We have improved the input check for API calls and filter for potentially malicious content. No publicly available exploits are known. | [] |
|
GHSA-6427-rmfx-x2xr | Multiple stack-based buffer overflows in the AVCC reassembly implementation in Utils.cpp in libstagefright in MediaMuxer in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 allow remote attackers to execute arbitrary code via a crafted media file, aka internal bug 29161888. | [] |
|
CVE-2021-27932 | Stormshield Network Security (SNS) VPN SSL Client 2.1.0 through 2.8.0 has Insecure Permissions. | [
"cpe:2.3:a:stormshield:ssl_vpn_client:*:*:*:*:*:*:*:*"
] |
|
GHSA-mhjm-gwxr-wvw2 | PHP remote file inclusion vulnerability in index.php in Miguel Nunes Call of Duty 2 (CoD2) DreamStats System 4.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the rootpath parameter. | [] |
|
CVE-2014-1301 | WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
] |
|
GHSA-jp97-72pv-p2w5 | Unspecified vulnerability in Polipo 0.9.8 and earlier allows attackers to read files outside of the web root. | [] |
|
GHSA-w3ph-2h93-f367 | In audio, there is a possible out of bounds read due to an incorrect calculation of buffer size. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08024748; Issue ID: ALPS08029526. | [] |
|
GHSA-w3jx-w59w-3c78 | Mogu blog 5.2 is vulnerable to Cross Site Scripting (XSS). | [] |
|
CVE-2015-9423 | The PlugNedit Adaptive Editor plugin before 6.2.0 for WordPress has XSS via wp-admin/admin-ajax.php?action=simple_fields_field_type_post_dialog_load PlugneditBGColor, PlugneditEditorMargin, plugnedit_width, pnemedcount, or plugneditcontent parameters. | [
"cpe:2.3:a:simplysymphony:plugnedit:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2016-11073 | An issue was discovered in Mattermost Server before 3.0.0. It allows XSS via a Legal or Support setting. | [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-3163 | Cisco Unified Contact Center Enterprise Denial of Service Vulnerability | A vulnerability in the Live Data server of Cisco Unified Contact Center Enterprise could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the affected software improperly manages resources when processing inbound Live Data traffic. An attacker could exploit this vulnerability by sending multiple crafted Live Data packets to an affected device. A successful exploit could cause the affected device to run out of buffer resources, which could result in a stack overflow and cause the affected device to reload, resulting in a DoS condition. Note: The Live Data port in Cisco Unified Contact Center Enterprise devices allows only a single TCP connection. To exploit this vulnerability, an attacker would have to send crafted packets to an affected device before a legitimate Live Data client establishes a connection. | [
"cpe:2.3:a:cisco:unified_contact_center_enterprise:*:*:*:*:*:*:*:*"
] |
CVE-2005-1888 | Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.5 allows remote attackers to inject arbitrary web script via HTML attributes in page templates. | [
"cpe:2.3:a:mediawiki:mediawiki:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:stable_2003-08-29:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:stable_2003-11-07:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:stable_2003-11-17:*:*:*:*:*:*:*"
] |
|
GHSA-wj7q-8mcw-g989 | A vulnerability, which was classified as critical, was found in itsourcecode Laravel Accounting System 1.0. This affects an unknown part of the file app/Http/Controllers/HomeController.php. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273621 was assigned to this vulnerability. | [] |
|
GHSA-v972-vhh2-2h9q | Certain NETGEAR devices are affected by command injection. This affects D6200 before 1.1.00.24, JNR1010v2 before 1.1.0.44, JR6150 before 1.0.1.12, JWNR2010v5 before 1.1.0.44, PR2000 before 1.0.0.20, R6050 before 1.0.1.12, WNR1000v4 before 1.1.0.44, WNR2020 before 1.1.0.44, and WNR2050 before 1.1.0.44. | [] |
|
CVE-2019-7766 | Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-rgrj-v98g-6x35 | Multiple PHP remote file inclusion vulnerabilities in SpeedTech PHP Library (STPHPLibrary) 0.8.0 allow remote attackers to execute arbitrary PHP code via a URL in the STPHPLIB_DIR parameter to (1) stphpapplication.php, (2) stphpbtnimage.php, or (3) stphpform.php. | [] |
|
GHSA-qc3c-m38x-gmmf | Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505', Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506', and Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616'. | [] |
|
GHSA-2rx4-9f5h-9gjf | Apache Airflow CNCF Kubernetes Provider: KubernetesPodOperator RCE via connection configuration | Arbitrary code execution in Apache Airflow CNCF Kubernetes provider version 5.0.0 allows user to change xcom sidecar image and resources via Airflow connection.In order to exploit this weakness, a user would already need elevated permissions (Op or Admin) to change the connection object in this manner. Operators should upgrade to provider version 7.0.0 which has removed the vulnerability. | [] |
GHSA-6pf9-ph8v-mxvv | Multiple SQL injection vulnerabilities in Valarsoft Webmatic before 3.0.3 allow remote attackers to execute arbitrary SQL commands via unspecified vectors, a different issue than CVE-2008-2925. | [] |
|
CVE-2015-8957 | Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] |
|
GHSA-9h69-jrqq-936c | A use-after-free vulnerability exists in the tif_parse_sub_IFD functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. An attacker can deliver file to trigger this vulnerability. | [] |
|
CVE-2022-29862 | An infinite loop in OPC UA .NET Standard Stack 1.04.368 allows a remote attackers to cause the application to hang via a crafted message. | [
"cpe:2.3:a:opcfoundation:ua_.net_standard_stack:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-6208 | A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may cause unexpected changes in memory shared between processes. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tv_os:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-3016 | Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
GHSA-5fjr-c5p8-hxvj | btrfs in the Linux kernel before 5.13.4 allows attackers to cause a denial of service (deadlock) via processes that trigger allocation of new system chunks during times when there is a shortage of free space in the system space_info. | [] |
|
CVE-2022-48805 | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup | In the Linux kernel, the following vulnerability has been resolved:
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
ax88179_rx_fixup() contains several out-of-bounds accesses that can be
triggered by a malicious (or defective) USB device, in particular:
- The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,
causing OOB reads and (on big-endian systems) OOB endianness flips.
- A packet can overlap the metadata array, causing a later OOB
endianness flip to corrupt data used by a cloned SKB that has already
been handed off into the network stack.
- A packet SKB can be constructed whose tail is far beyond its end,
causing out-of-bounds heap data to be considered part of the SKB's
data.
I have tested that this can be used by a malicious USB device to send a
bogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response
that contains random kernel heap data.
It's probably also possible to get OOB writes from this on a
little-endian system somehow - maybe by triggering skb_cow() via IP
options processing -, but I haven't tested that. | [] |
GHSA-mcj5-gg57-5fc7 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
CVE-2024-23263 | A logic issue was addressed with improved validation. This issue is fixed in tvOS 17.4, macOS Sonoma 14.4, visionOS 1.1, iOS 17.4 and iPadOS 17.4, watchOS 10.4, iOS 16.7.6 and iPadOS 16.7.6, Safari 17.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced. | [
"cpe:2.3:o:apple:visionos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:16.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:16.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] |
|
GHSA-mmx3-9fv2-chx4 | A heap-based buffer over-read exists in DemuxInit() in demux/asf/asf.c in VideoLAN VLC media player 3.0.7.1 via a crafted .mkv file. | [] |
|
CVE-2023-5831 | Insertion of Sensitive Information Into Sent Data in GitLab | An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, and all versions starting from 16.5.0 before 16.5.1 which have the `super_sidebar_logged_out` feature flag enabled. Affected versions with this default-disabled feature flag enabled may unintentionally disclose GitLab version metadata to unauthorized actors. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:16.5.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:16.5.0:*:*:*:enterprise:*:*:*"
] |
CVE-2019-8381 | An issue was discovered in Tcpreplay 4.3.1. An invalid memory access occurs in do_checksum in checksum.c. It can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact. | [
"cpe:2.3:a:broadcom:tcpreplay:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.