id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
GHSA-39r3-j54m-rvh3 | Cross-site scripting (XSS) vulnerability in Hastymail2 before 1.01 allows remote attackers to inject arbitrary web script or HTML via a crafted background attribute within a cell in a TABLE element, related to improper use of the htmLawed filter. | []
|
|
GHSA-m9f8-wwhq-rgp2 | An issue was discovered on Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges on the device via poor credential management. | []
|
|
GHSA-gr39-677j-2h8c | OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, and WRC-2533GS2V-B v1.62 and earlier. | []
|
|
GHSA-r786-p84w-55j2 | Integer overflow in the authenticate_post function in CGit before 0.12 allows remote attackers to have unspecified impact via a large value in the Content-Length HTTP header, which triggers a buffer overflow. | []
|
|
CVE-2024-38612 | ipv6: sr: fix invalid unregister error path | In the Linux kernel, the following vulnerability has been resolved:
ipv6: sr: fix invalid unregister error path
The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL
is not defined. In that case if seg6_hmac_init() fails, the
genl_unregister_family() isn't called.
This issue exist since commit 46738b1317e1 ("ipv6: sr: add option to control
lwtunnel support"), and commit 5559cea2d5aa ("ipv6: sr: fix possible
use-after-free and null-ptr-deref") replaced unregister_pernet_subsys()
with genl_unregister_family() in this error path. | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:acrn:*:*:*:*:*:*:*:*"
]
|
GHSA-q68r-x3xx-f2m3 | 51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API mediaclip.cgi did not have a sufficient input validation allowing for uploading more audio clips then designed resulting in the Axis device running out of memory.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | []
|
|
GHSA-g7q9-53fm-wrgh | Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the title parameter at /librarian/history.php. | []
|
|
GHSA-4f4x-pggh-m93v | Deserialization of Untrusted Data vulnerability in impleCode eCommerce Product Catalog allows Object Injection. This issue affects eCommerce Product Catalog: from n/a through 3.4.3. | []
|
|
CVE-2018-11154 | Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 12 of 46). | [
"cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*"
]
|
|
GHSA-6q2v-hjxc-f9rp | Missing Authorization vulnerability in Team118GROUP Team 118GROUP Agent allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Team 118GROUP Agent: from n/a through 1.6.0. | []
|
|
CVE-2024-47642 | WordPress Keap Official Opt-in Forms plugin <= 2.0.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Keap Keap Official Opt-in Forms allows Stored XSS.This issue affects Keap Official Opt-in Forms: from n/a through 2.0.1. | []
|
CVE-2011-2694 | Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page). | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
]
|
|
CVE-2025-2558 | The Wound <= 0.0.1 - Unauthenticated LFI | The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server | []
|
CVE-2008-0949 | Unspecified vulnerability in IBM Informix Dynamic Server (IDS) 7.x through 11.x allows remote attackers to gain privileges via a malformed connection request packet. | [
"cpe:2.3:a:ibm:informix_dynamic_server:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:7.31.xd9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.tc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40.xd8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:9.40_xc7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.0.xc4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc7w1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2:*:*:*:*:*:*:*"
]
|
|
CVE-2014-3146 | Incomplete blacklist vulnerability in the lxml.html.clean module in lxml before 3.3.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function. | [
"cpe:2.3:a:lxml:lxml:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2:-:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2:beta3:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2:beta4:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.3:-:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.3:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.3:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.3.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.3.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.3.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:lxml:lxml:3.3.3:*:*:*:*:*:*:*"
]
|
|
CVE-2010-1030 | Unspecified vulnerability in HP-UX B.11.31, with AudFilter rules enabled, allows local users to cause a denial of service via unknown vectors. | [
"cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*"
]
|
|
GHSA-pwxr-5vrp-26jw | IBM Quality Manager (RQM) 6.02, 6.06, and 6.0.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 168293. | []
|
|
CVE-2010-0120 | Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows allows remote attackers to execute arbitrary code via large size values in QCP audio content. | [
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*"
]
|
|
GHSA-hmjc-jvgw-hw44 | Cross-site scripting (XSS) vulnerability in gb/user/index.php in Ramui Forum, possibly 1.0 Beta, allows remote attackers to inject arbitrary web script or HTML via the query parameter. | []
|
|
GHSA-6w85-2w93-mrpr | In the Linux kernel, the following vulnerability has been resolved:speakup: Fix sizeof() vs ARRAY_SIZE() bugThe "buf" pointer is an array of u16 values. This code should be
using ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),
otherwise it can the still got out of bounds. | []
|
|
CVE-2008-1238 | Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"
]
|
|
CVE-2018-6781 | In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9A008264. | [
"cpe:2.3:a:jiangmin:antivirus:16.0.0.100:*:*:*:*:*:*:*"
]
|
|
CVE-2020-11864 | libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows denial of service (issue 2 of 2). | [
"cpe:2.3:a:libemf_project:libemf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
]
|
|
CVE-2016-8939 | IBM Tivoli Storage Manager (IBM Spectrum Protect 7.1 and 8.1) clients/agents store password information in the Windows Registry in a manner which can be compromised. IBM X-Force ID: 118790. | [
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.3.6.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.200:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.500:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.600:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:6.4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1..5.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.200:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.300:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.000:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.5.200:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7.100:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7.200:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager:8.1.1.100:*:*:*:*:*:*:*"
]
|
|
CVE-2005-0598 | The RealServer RealSubscriber on Cisco devices running Application and Content Networking System (ACNS) 5.1 allow remote attackers to cause a denial of service (CPU consumption) via malformed packets. | [
"cpe:2.3:a:cisco:application_and_content_networking_software:\\(acns\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:4.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:application_and_content_networking_software:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_delivery_manager:4630:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_delivery_manager:4650:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4630:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4630:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4630:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4650:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4650:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4650:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_distribution_manager_4670:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_2.2_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:507_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:510:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_2.2_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:560_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:565:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_2.2_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:590_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_2.2_.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7320_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine:7325:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine_module_for_cisco_router:2600_series:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine_module_for_cisco_router:2800_series:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3600_series:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3700_series:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:content_engine_module_for_cisco_router:3800_series:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:enterprise_content_delivery_network_software:4.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:content_router_4430:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:content_router_4450:*:*:*:*:*:*:*:*"
]
|
|
CVE-2023-40131 | In GpuService of GpuService.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
|
|
GHSA-9w6g-vm3j-6hg4 | Type confusion could lead to a heap out-of-bounds write in V8 in Google Chrome prior to 64.0.3282.168 allowing a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. | []
|
|
GHSA-hhx3-g956-h93h | An issue was discovered in Cloud Foundry Foundation BOSH Release 261.x versions prior to 261.3 and all 260.x versions. In certain cases an authenticated Director user can provide a malicious checksum that could allow them to escalate their privileges on the Director VM, aka "BOSH Director Shell Injection Vulnerabilities." | []
|
|
CVE-2022-20830 | Cisco Software-Defined Application Visibility and Control on Cisco vManage Authentication Bypass Vulnerability | A vulnerability in authentication mechanism of Cisco Software-Defined Application Visibility and Control (SD-AVC) on Cisco vManage could allow an unauthenticated, remote attacker to access the GUI of Cisco SD-AVC without authentication. This vulnerability exists because the GUI is accessible on self-managed cloud installations or local server installations of Cisco vManage. An attacker could exploit this vulnerability by accessing the exposed GUI of Cisco SD-AVC. A successful exploit could allow the attacker to view managed device names, SD-AVC logs, and SD-AVC DNS server IP addresses. | [
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*"
]
|
GHSA-xhwm-2wwh-ggc2 | SQL injection vulnerability in Wiz-Ad 1.3 allows remote attackers to execute arbitrary SQL commands via unknown vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
|
|
GHSA-g9q9-wh2q-x3pm | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Spiffy Plugins WP Flow Plus allows Stored XSS.This issue affects WP Flow Plus: from n/a through 5.2.2. | []
|
|
CVE-2021-45061 | Adobe Acrobat Reader DC Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
]
|
GHSA-3346-hwjm-fgpv | Insufficient memory protection for Intel(R) Ethernet I218 Adapter driver for Windows* 10 before version 24.1 may allow an authenticated user to potentially enable information disclosure via local access. | []
|
|
GHSA-9g8w-c3c6-8wxm | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n. | []
|
|
CVE-2022-45076 | WordPress Flexible Elementor Panel Plugin <= 2.3.8 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in WebMat Flexible Elementor Panel plugin <= 2.3.8 versions. | [
"cpe:2.3:a:webmat:flexible_elementor_panel:*:*:*:*:*:wordpress:*:*"
]
|
GHSA-r55x-7v7f-p64g | Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image. | []
|
|
GHSA-rr9f-vrp3-f94h | Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in WordPress WP Google Maps plugin (versions <= 8.1.12). Vulnerable parameters: &dataset_name, &wpgmza_gdpr_retention_purpose, &wpgmza_gdpr_company_name, &name #2, &name, &polyname #2, &polyname, &address. | []
|
|
CVE-2018-7781 | In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, by sending a specially crafted request an authenticated user can view password in clear text and results in privilege escalation. | [
"cpe:2.3:o:schneider-electric:imps110-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imps110-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imps110-1e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imps110-1e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imps110-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imps110-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:ibps110-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ibps110-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp1110-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp1110-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp1110-1e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp1110-1e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp1110-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp1110-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:ibp1110-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ibp1110-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp219-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp219-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp219-1e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp219-1e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp219-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp219-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:ibp219-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ibp219-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp319-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp319-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp319-1e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp319-1e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp319-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp319-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:ibp319-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ibp319-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp519-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp519-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp519-1e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp519-1e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:imp519-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:imp519-1er:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:ibp519-1er_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:ibp519-1er:-:*:*:*:*:*:*:*"
]
|
|
GHSA-cp2m-j67p-96qc | The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.6, macOS Sequoia 15.5, macOS Sonoma 14.7.6. An app may be able to bypass ASLR. | []
|
|
GHSA-w2h6-9f22-wxjx | An Integer Overflow exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22001B in the Accops HyWorks Windows Client prior to v 3.2.8.200 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | []
|
|
GHSA-h27r-x6vq-qp4c | The msm gpu driver for custom Linux kernels on the Xiaomi perseus-p-oss MIX 3 device through 2018-11-26 has an integer overflow and OOPS because of missing checks of the count argument in _sde_debugfs_conn_cmd_tx_write in drivers/gpu/drm/msm/sde/sde_connector.c. This is exploitable for a device crash via a syscall by a crafted application on a rooted device. | []
|
|
CVE-2021-23272 | TIBCO BPM Cross Site Scripting (XSS) | The Application Development Clients component of TIBCO Software Inc.'s TIBCO BPM Enterprise and TIBCO BPM Enterprise Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a Cross Site Scripting (XSS) attack on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO BPM Enterprise: versions 4.3.0 and below and TIBCO BPM Enterprise Distribution for TIBCO Silver Fabric: versions 4.3.0 and below. | [
"cpe:2.3:a:tibco:bpm_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:bpm_enterprise_distribution_for_silver_fabric:*:*:*:*:*:*:*:*"
]
|
GHSA-9fmj-x3g8-hmqv | Windows Credential Guard Domain-joined Public Key Elevation of Privilege Vulnerability. | []
|
|
CVE-2022-20816 | Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability | A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to delete arbitrary files from an affected system. This vulnerability exists because the affected software does not properly validate HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to delete arbitrary files from the affected system. | [
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*"
]
|
CVE-2024-0463 | code-projects Online Faculty Clearance HTTP POST Request admin_view_info.php sql injection | A vulnerability was found in code-projects Online Faculty Clearance 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /production/admin_view_info.php of the component HTTP POST Request Handler. The manipulation of the argument haydi leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250568. | [
"cpe:2.3:a:fabianros:online_faculty_clearance_system:1.0:*:*:*:*:*:*:*"
]
|
CVE-2012-4539 | Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability." | [
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"
]
|
|
CVE-2021-47000 | ceph: fix inode leak on getattr error in __fh_to_dentry | In the Linux kernel, the following vulnerability has been resolved:
ceph: fix inode leak on getattr error in __fh_to_dentry | []
|
GHSA-997q-cp6v-cm6w | stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow. | []
|
|
CVE-2009-2163 | Cross-site scripting (XSS) vulnerability in login/default.aspx in Sitecore CMS before 6.0.2 Update-1 090507 allows remote attackers to inject arbitrary web script or HTML via the sc_error parameter. | [
"cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:cms:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:cms:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sitecore:cms:6.0.1:*:*:*:*:*:*:*"
]
|
|
GHSA-cw2p-h75f-wq2f | The Avaya 4602 SW IP Phone (Model 4602D02A) with 2.2.2 and earlier SIP firmware uses a constant media port number for calls, which allows remote attackers to cause a denial of service (audio quality loss) via a flood of packets to the RTP port. | []
|
|
GHSA-fwm6-ghvh-8mr4 | The Affiliates Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.9.34. This is due to missing or incorrect nonce validation on the process_bulk_action function in ListAffiliatesTable.php. This makes it possible for unauthenticated attackers to delete affiliates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | []
|
|
GHSA-5378-fj29-782c | The mintToken function of a smart contract implementation for SlidebitsToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | []
|
|
GHSA-8p5q-qwh5-4pqj | Opera before 11.10 allows remote attackers to hijack (1) searches and (2) customizations via unspecified third party applications. | []
|
|
CVE-2025-24152 | The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app may be able to cause unexpected system termination or corrupt kernel memory. | []
|
|
GHSA-3wcf-84jq-4rxx | An issue discovered in pdfmake 0.2.9 allows remote attackers to run arbitrary code via crafted POST request to the path '/pdf'. | []
|
|
CVE-2020-2756 | Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). | [
"cpe:2.3:a:oracle:jdk:1.7.0:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*"
]
|
|
GHSA-c3q7-q63g-7jw7 | ASP-Nuke RC2 and earlier allows remote attackers to list all logged-in users by submitting an invalid "pseudo" cookie. | []
|
|
GHSA-mmgj-46r8-x39q | SQL injection vulnerability in ajax_udf.php in OpenDocMan before 1.2.7.2 allows remote attackers to execute arbitrary SQL commands via the add_value parameter. | []
|
|
CVE-2024-5649 | Universal Slider <= 1.6.5 - Authenticated (Contributor+) PHP Object Injection | The Universal Slider plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.6.5 via deserialization of untrusted input 'fsl_get_gallery_value' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | [
"cpe:2.3:a:webhuntinfotech:universal_slider:*:*:*:*:*:wordpress:*:*"
]
|
CVE-2022-41999 | A denial of service vulnerability exists in the DDS native tile reading functionality of OpenImageIO Project OpenImageIO v2.3.19.0 and v2.4.4.2. A specially-crafted .dds can lead to denial of service. An attacker can provide a malicious file to trigger this vulnerability. | [
"cpe:2.3:a:openimageio:openimageio:2.3.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openimageio:openimageio:2.4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
]
|
|
CVE-2020-3351 | Cisco SD-WAN Solution Software Denial of Service Vulnerability | A vulnerability in Cisco SD-WAN Solution Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper validation of fields in Cisco SD-WAN peering messages that are encapsulated in UDP packets. An attacker could exploit this vulnerability by sending crafted UDP messages to the targeted system. A successful exploit could allow the attacker to cause services on the device to fail, resulting in a DoS condition that could impact the targeted device and other devices that depend on it. | [
"cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:vedge_cloud_router:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*"
]
|
CVE-2022-41687 | Insecure inherited permissions in the HotKey Services for some Intel(R) NUC P14E Laptop Element software for Windows 10 before version 1.1.44 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:nuc_p14e_laptop_element:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*"
]
|
|
CVE-2015-4779 | Unspecified vulnerability in the Data Store component in Oracle Berkeley DB 11.2.5.1.29, 11.2.5.2.42, 11.2.5.3.28, and 12.1.6.0.35 allows local users to affect integrity and availability via unknown vectors, a different vulnerability than CVE-2015-4774 and CVE-2015-4788. | [
"cpe:2.3:a:oracle:berkeley_db:11.2.5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:11.2.5.2.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:11.2.5.3.28:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:berkeley_db:12.1.6.0.35:*:*:*:*:*:*:*"
]
|
|
GHSA-q8p9-93xv-92jh | SQL injection vulnerability in default.aspx in easypage allows remote attackers to execute arbitrary SQL commands via the srch parameter in the Search page. | []
|
|
GHSA-hhx2-5833-74qf | DG Remote Control Server 1.6.2 allows remote attackers to cause a denial of service (crash or CPU consumption) and possibly execute arbitrary code via a long message to TCP port 1071 or 1073, possibly due to a buffer overflow. | []
|
|
CVE-2023-22342 | Improper input validation in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*"
]
|
|
CVE-2023-42562 | Integer overflow vulnerability in detectionFindFaceSupportMultiInstance of libFacePreProcessingjni.camera.samsung.so prior to SMR Dec-2023 Release 1 allows attacker to trigger heap overflow. | [
"cpe:2.3:o:samsung:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*"
]
|
|
GHSA-fg35-c4c9-gp8p | There is an improper authentication vulnerability in several smartphones. Certain function interface in the system does not sufficiently validate the caller's identity in certain share scenario, successful exploit could cause information disclosure. Affected product versions include:Mate 30 Pro versions Versions earlier than 10.0.0.205(C00E202R7P2);Mate 30 versions Versions earlier than 10.0.0.205(C00E201R7P2). | []
|
|
GHSA-w9jj-mrhj-pwhj | In K7 Antivirus 15.1.0306, the driver file (K7Sentry.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x950025b0. | []
|
|
CVE-2006-0276 | Multiple unspecified vulnerabilities in Oracle Collaboration Suite Release 2, version 9.0.4.2 (Oracle9i) have unspecified impact and attack vectors, as identified by Oracle Vuln# (1) OCS01, 2) OCS02, 3) OCS03, 4) OCS04, 5) OCS05, 6) OCS06, 7) OCS07, (8) OCS08, and (9) OCS09 in the (a) Email Server component; 10) OCS10 (and (11) OCS11 in the (b) Oracle Collaboration Suite Wireless & Voice (component; 12) OCS12 and (13) OCS13 in the (c) Oracle Content (Management SDK component; 14) OCS14 and (15) OCS15 in the (d) Oracle (Content Services component. | [
"cpe:2.3:a:oracle:collaboration_suite:9.0.4.2:r2:*:*:*:*:*:*"
]
|
|
CVE-2021-27850 | Bypass of the fix for CVE-2019-0195 | A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.1, upgrade to 5.6.2 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later. | [
"cpe:2.3:a:apache:tapestry:*:*:*:*:*:*:*:*"
]
|
GHSA-fc49-wgh2-47f2 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in apollo13themes Rife Free allows Stored XSS.This issue affects Rife Free: from n/a through 2.4.19. | []
|
|
CVE-1999-1388 | passwd in SunOS 4.1.x allows local users to overwrite arbitrary files via a symlink attack and the -F command line argument. | [
"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*"
]
|
|
CVE-2020-6557 | Inappropriate implementation in networking in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
]
|
|
GHSA-r9vc-pgpj-x6f4 | Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010. | []
|
|
CVE-2018-4214 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to cause a denial of service (memory corruption and Safari crash) or possibly have unspecified other impact via a crafted web site. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
]
|
|
GHSA-j2hp-jqgm-85pf | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AccessAlly PopupAlly allows Stored XSS.This issue affects PopupAlly: from n/a through 2.1.1. | []
|
|
GHSA-9f3p-cpj2-496g | Stack-based buffer overflow in the FindConfigChildeKeyList method in the XNSSDKDEVICE.XnsSdkDeviceCtrlForIpInstaller.1 ActiveX control in Samsung iPOLiS Device Manager before 1.8.7 allows remote attackers to execute arbitrary code via a long value. | []
|
|
CVE-2004-1571 | AJ-Fork 167 allows remote attackers to gain sensitive information via a direct request to (1) auto-acronyms.php, (2) auto-archive.php, (3) ount-article-views.php, (4) kses.php, (5) custom-quick-tags.php, (6) disable-all-comments.php, (7) easy-date-format.php, (8) enable-disable-comments.php, (9) filter-by-author.php, (10) format-switcher.php, (11) long-to-short.php, (12) prospective-posting.php, or (13) sort-by-xfield.php, which displays the full path in an error message. | [
"cpe:2.3:a:aj-fork:aj-fork:167:*:*:*:*:*:*:*"
]
|
|
CVE-2008-1323 | Cross-site request forgery (CSRF) vulnerability in index.php in WoltLab Burning Board Lite (wBB) 2 Beta 1 allows remote attackers to delete threads as other users via the ThreadDelete action. | [
"cpe:2.3:a:woltlab:burning_board_lite:2.0:beta_1:*:*:*:*:*:*"
]
|
|
CVE-2024-43912 | wifi: nl80211: disallow setting special AP channel widths | In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: disallow setting special AP channel widths
Setting the AP channel width is meant for use with the normal
20/40/... MHz channel width progression, and switching around
in S1G or narrow channels isn't supported. Disallow that. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
|
GHSA-383h-xx34-hq84 | A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control). | []
|
|
CVE-2006-1397 | Multiple cross-site scripting (XSS) vulnerabilities in (a) phpAdsNew and (b) phpPgAds before 2.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) certain parameters to the banner delivery module, which is not properly handled in the administrator interface, or (2) certain parameters to the login form. | [
"cpe:2.3:a:phpadsnew:phpadsnew:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpadsnew:phpadsnew:2_dev_2001-10-09:*:*:*:*:*:*:*",
"cpe:2.3:a:phppgads:phppgads:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phppgads:phppgads:2.0.4_pr2:*:*:*:*:*:*:*",
"cpe:2.3:a:phppgads:phppgads:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phppgads:phppgads:2.0.7:*:*:*:*:*:*:*"
]
|
|
GHSA-7v6g-m3gq-vpm5 | An issue was discovered in Observium Professional, Enterprise & Community 20.8.10631. It is vulnerable to Cross-Site Scripting (XSS) due to the fact that it is possible to inject and store malicious JavaScript code within it. This can occur via /alert_check/action=delete_alert_checker/alert_test_id= because of pages/alert_check.inc.php. | []
|
|
CVE-2020-4975 | IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192435. | [
"cpe:2.3:a:ibm:doors_next:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:doors_next:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:doors_next:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_requirements_quality_assistant_on-premises:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_workflow_management:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:global_configuration_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*"
]
|
|
GHSA-g28x-287m-pqv9 | A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files, aka "Windows Theme API Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. | []
|
|
GHSA-g6f8-f8f2-6wh5 | In the Linux kernel, the following vulnerability has been resolved:i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlockA deadlock may happen since the i3c_master_register() acquires
&i3cbus->lock twice. See the log below.
Use i3cdev->desc->info instead of calling i3c_device_info() to
avoid acquiring the lock twice.v2:Modified the title and commit message============================================
WARNING: possible recursive locking detected
6.11.0-mainlineinit/1 is trying to acquire lock:
f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_bus_normaluse_lockbut task is already holding lock:
f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_master_registerother info that might help us debug this:
Possible unsafe locking scenario:lock(&i3cbus->lock);
lock(&i3cbus->lock);*** DEADLOCK ***May be due to missing lock nesting notation2 locks held by init/1:
#0: fcffff809b6798f8 (&dev->mutex){....}-{3:3}, at: __driver_attach
#1: f1ffff80a6a40dc0 (&i3cbus->lock){++++}-{3:3}, at: i3c_master_registerstack backtrace:
CPU: 6 UID: 0 PID: 1 Comm: init
Call trace:
dump_backtrace+0xfc/0x17c
show_stack+0x18/0x28
dump_stack_lvl+0x40/0xc0
dump_stack+0x18/0x24
print_deadlock_bug+0x388/0x390
__lock_acquire+0x18bc/0x32ec
lock_acquire+0x134/0x2b0
down_read+0x50/0x19c
i3c_bus_normaluse_lock+0x14/0x24
i3c_device_get_info+0x24/0x58
i3c_device_uevent+0x34/0xa4
dev_uevent+0x310/0x384
kobject_uevent_env+0x244/0x414
kobject_uevent+0x14/0x20
device_add+0x278/0x460
device_register+0x20/0x34
i3c_master_register_new_i3c_devs+0x78/0x154
i3c_master_register+0x6a0/0x6d4
mtk_i3c_master_probe+0x3b8/0x4d8
platform_probe+0xa0/0xe0
really_probe+0x114/0x454
__driver_probe_device+0xa0/0x15c
driver_probe_device+0x3c/0x1ac
__driver_attach+0xc4/0x1f0
bus_for_each_dev+0x104/0x160
driver_attach+0x24/0x34
bus_add_driver+0x14c/0x294
driver_register+0x68/0x104
__platform_driver_register+0x20/0x30
init_module+0x20/0xfe4
do_one_initcall+0x184/0x464
do_init_module+0x58/0x1ec
load_module+0xefc/0x10c8
__arm64_sys_finit_module+0x238/0x33c
invoke_syscall+0x58/0x10c
el0_svc_common+0xa8/0xdc
do_el0_svc+0x1c/0x28
el0_svc+0x50/0xac
el0t_64_sync_handler+0x70/0xbc
el0t_64_sync+0x1a8/0x1ac | []
|
|
CVE-2020-2851 | Vulnerability in the Oracle Solaris product of Oracle Systems (component: Common Desktop Environment). Supported versions that are affected are 10 and 11. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*"
]
|
|
CVE-2019-19587 | In WSO2 Enterprise Integrator 6.5.0, reflected XSS occurs when updating the message processor configuration from the source view in the Management Console. | [
"cpe:2.3:a:wso2:enterprise_integrator:6.5.0:*:*:*:*:*:*:*"
]
|
|
CVE-2007-4543 | Cross-site scripting (XSS) vulnerability in enter_bug.cgi in Bugzilla 2.17.1 through 2.20.4, 2.22.x before 2.22.3, and 3.x before 3.0.1 allows remote attackers to inject arbitrary web script or HTML via the buildid field in the "guided form." | [
"cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*"
]
|
|
CVE-2021-3692 | Use of Predictable Algorithm in Random Number Generator in yiisoft/yii2 | yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator | [
"cpe:2.3:a:yiiframework:yii:*:*:*:*:*:*:*:*"
]
|
CVE-2013-2462 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment. | [
"cpe:2.3:a:oracle:jre:*:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*"
]
|
|
GHSA-f4m4-vgf6-42vm | Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | []
|
|
GHSA-w6cm-9c76-c988 | A credentials leak was found in the OpenShift Container Platform. The private key for the external cluster certificate was stored incorrectly in the oauth-serving-cert ConfigMaps, and accessible to any authenticated OpenShift user or service-account. A malicious user could exploit this flaw by reading the oauth-serving-cert ConfigMap in the openshift-config-managed namespace, compromising any web traffic secured using that certificate. | []
|
|
CVE-2018-1000856 | DomainMOD version 4.09.03 and above. Also verified in the latest version 4.11.01 contains a Cross Site Scripting (XSS) vulnerability in Segment Name field in the segments page that can result in Arbitrary script can be executed on all users browsers who visit the affected page. This attack appear to be exploitable via Victim must visit the vulnerable page. This vulnerability appears to have been fixed in No fix yet. | [
"cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*"
]
|
|
CVE-2018-20843 | In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks). | [
"cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_res_3700:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*"
]
|
|
GHSA-c9gq-c7g6-cr8x | In MuPDF 1.12.0 and earlier, multiple reachable assertions in the PDF parser allow an attacker to cause a denial of service (assert crash) via a crafted file. | []
|
|
CVE-2004-0167 | DiskArbitration in Mac OS X 10.2.8 and 10.3.2 does not properly initialize writeable removable media. | [
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*"
]
|
|
CVE-2022-31749 | Authenticated arbitrary file read/write in WatchGuard Fireware OS | An argument injection vulnerability in the diagnose and import pac commands in WatchGuard Fireware OS before 12.8.1, 12.1.4, and 12.5.10 allows an authenticated remote attacker with unprivileged credentials to upload or read files to limited, arbitrary locations on WatchGuard Firebox and XTM appliances | []
|
GHSA-5r53-xj9v-rj4f | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0590, CVE-2019-0591, CVE-2019-0593, CVE-2019-0605, CVE-2019-0607, CVE-2019-0610, CVE-2019-0642, CVE-2019-0644, CVE-2019-0651, CVE-2019-0652, CVE-2019-0655. | []
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.