id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
CVE-2021-1781
A privacy issue existed in the handling of Contact cards. This was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A malicious application may be able to leak sensitive user information.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
GHSA-m626-6hq4-mf59
Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21675, CVE-2023-21747, CVE-2023-21748, CVE-2023-21749, CVE-2023-21750, CVE-2023-21755, CVE-2023-21772, CVE-2023-21773, CVE-2023-21774.
[]
GHSA-6j88-f863-hqhv
Cross-site scripting (XSS) vulnerability in the SB Universal Plugin (SBuniplug) extension 2.0.1 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
CVE-2008-3014
Buffer overflow in gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed WMF image file that triggers improper memory allocation, aka "GDI+ WMF Buffer Overrun Vulnerability."
[ "cpe:2.3:a:microsoft:digital_image_suite:2006:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:forefront_client_security:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:*:gold:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_powerpoint_viewer:2003:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:report_viewer:2005:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:report_viewer:2008:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:server:2008:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server_reporting_services:2000:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:works:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:server:2003:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:server:2003:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows-nt:vista:*:gold:*:*:*:*:*", "cpe:2.3:o:microsoft:windows-nt:xp:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*" ]
CVE-2025-21787
team: better TEAM_OPTION_TYPE_STRING validation
In the Linux kernel, the following vulnerability has been resolved: team: better TEAM_OPTION_TYPE_STRING validation syzbot reported following splat [1] Make sure user-provided data contains one nul byte. [1] BUG: KMSAN: uninit-value in string_nocheck lib/vsprintf.c:633 [inline] BUG: KMSAN: uninit-value in string+0x3ec/0x5f0 lib/vsprintf.c:714 string_nocheck lib/vsprintf.c:633 [inline] string+0x3ec/0x5f0 lib/vsprintf.c:714 vsnprintf+0xa5d/0x1960 lib/vsprintf.c:2843 __request_module+0x252/0x9f0 kernel/module/kmod.c:149 team_mode_get drivers/net/team/team_core.c:480 [inline] team_change_mode drivers/net/team/team_core.c:607 [inline] team_mode_option_set+0x437/0x970 drivers/net/team/team_core.c:1401 team_option_set drivers/net/team/team_core.c:375 [inline] team_nl_options_set_doit+0x1339/0x1f90 drivers/net/team/team_core.c:2662 genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline] genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline] genl_rcv_msg+0x1214/0x12c0 net/netlink/genetlink.c:1210 netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2543 genl_rcv+0x40/0x60 net/netlink/genetlink.c:1219 netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline] netlink_unicast+0xf52/0x1260 net/netlink/af_netlink.c:1348 netlink_sendmsg+0x10da/0x11e0 net/netlink/af_netlink.c:1892 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg+0x30f/0x380 net/socket.c:733 ____sys_sendmsg+0x877/0xb60 net/socket.c:2573 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2627 __sys_sendmsg net/socket.c:2659 [inline] __do_sys_sendmsg net/socket.c:2664 [inline] __se_sys_sendmsg net/socket.c:2662 [inline] __x64_sys_sendmsg+0x212/0x3c0 net/socket.c:2662 x64_sys_call+0x2ed6/0x3c30 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f
[]
GHSA-x36q-879q-h59v
Buffer overflow in IBM Informix Dynamic Server (IDS) 9.40.xC1 and 9.40.xC2 allows local users to execute arbitrary code via a long GL_PATH environment variable.
[]
GHSA-rp8c-pc5p-39jg
The parse-get function in utils.c for apt-www-proxy 0.1 allows remote attackers to cause a denial of service (crash) via an empty HTTP request, which causes a null dereference.
[]
CVE-2024-2476
The OceanWP theme for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the load_theme_panel_pane function in all versions up to, and including, 3.5.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to expose sensitive information such as system/environment data and API keys.
[]
GHSA-969h-25hq-6mxh
A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-219716.
[]
GHSA-78v4-cfmf-qvqv
IBM Tivoli Common Reporting (TCR) 2.1 before IF14, 2.1.1 before IF22, 2.1.1.2 before IF9, 3.1.0.0 through 3.1.2 as used in Cognos Business Intelligence before 10.2 IF16, and 3.1.2.1 as used in Cognos Business Intelligence before 10.2.1.1 IF12 allows local users to bypass the Cognos Application Firewall (CAF) protection mechanism via leading whitespace in the BackURL field.
[]
GHSA-h2qv-f8w8-72wh
The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'question_id' parameter in all versions up to, and including, 9.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
CVE-2023-23850
A missing permission check in Synopsys Jenkins Coverity Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:synopsys_coverity:*:*:*:*:*:jenkins:*:*" ]
GHSA-2hrr-4p8h-j38c
Cross-Site Request Forgery (CSRF) vulnerability leading to Stored Cross-Site Scripting (XSS) in Vladimir Anokhin's Shortcodes Ultimate plugin <= 5.12.0 on WordPress.
[]
CVE-2014-8752
Multiple cross-site scripting (XSS) vulnerabilities in view.php in JCE-Tech PHP Video Script (aka Video Niche Script) 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) video or (2) title parameter.
[ "cpe:2.3:a:jce-tech:video_niche_script:4.0:*:*:*:*:*:*:*" ]
CVE-2013-4996
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a crafted database name, (2) a crafted user name, (3) a crafted logo URL in the navigation panel, (4) a crafted entry in a certain proxy list, or (5) crafted content in a version.json file.
[ "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8:rc1:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*" ]
CVE-2020-11785
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, RBK50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.
[ "cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax120:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*" ]
CVE-2010-2384
Unspecified vulnerability in Oracle Solaris 9 and 10 allows local users to affect confidentiality and integrity via unknown vectors related to Solaris Management Console.
[ "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*" ]
GHSA-j6fm-wq3j-46v7
Multiple SQL injection vulnerabilities in KerviNet Forum 1.1 and earlier allow remote attackers to execute arbitrary SQL commands via (1) an enter_parol cookie to index.php in an auto action or (2) the topic parameter to message.php. NOTE: vector 2 can be leveraged for a cross-site scripting (XSS) attack.
[]
GHSA-733p-2xhq-34m8
cPanel before 62.0.4 allows self XSS on the webmail Password and Security page (SEC-199).
[]
GHSA-cx3f-qjc6-76hq
The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
[]
GHSA-pqfr-vmq2-988m
The MediaTek Wi-Fi driver in Android before 2016-05-01 on Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 27549705.
[]
CVE-2017-1372
IBM TRIRIGA Application Platform 3.3, 3.4, and 3.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126865.
[ "cpe:2.3:a:ibm:tririga_application_platform:3.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.3.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.4.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tririga_application_platform:3.5.2.2:*:*:*:*:*:*:*" ]
GHSA-4pfv-vgmw-jgcr
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Global Meatadata parameter in the Global Settings Menu component.
[]
GHSA-h3hv-63q5-jgpr
Microsoft Security Advisory CVE-2023-36799: .NET Denial of Service Vulnerability
Microsoft Security Advisory CVE-2023-36799: .NET Denial of Service Vulnerability<a name="executive-summary"></a>Executive summaryMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.A vulnerability exists in .NET where reading a maliciously crafted X.509 certificate may result in Denial of Service. This issue only affects Linux systems.AnnouncementAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/275<a name="mitigation-factors"></a>Mitigation factorsMicrosoft has not identified any mitigating factors for this vulnerability.<a name="affected-software"></a>Affected softwareAny .NET 7.0 application running on .NET 7.0.10 or earlier.Any .NET 6.0 application running on .NET 6.0.21 or earlier.If your application uses the following package versions, ensure you update to the latest version of .NET.<a name=".NET 7"></a>.NET 7Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NETCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-arm64) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-arm64) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-arm) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-arm) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-x64) | >= 7.0.0, <= 7.0.10 | 7.0.11 [Microsoft.NETCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-x64) | >= 7.0.0, <= 7.0.10 | 7.0.11<a name=".NET 6"></a>.NET 6Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.NETCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-arm64) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-arm64) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-arm) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-arm) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-x64) | >= 6.0.0, <= 6.0.21 | 6.0.22 [Microsoft.NETCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.NETCore.App.Runtime.linux-musl-x64) | >= 6.0.0, <= 6.0.21 | 6.0.22Advisory FAQ<a name="how-affected"></a>How do I know if I am affected?If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.<a name="how-fix"></a>How do I fix the issue?To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.If you are using one of the affected packages, please update to the patched version listed above.If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;If you're using .NET 7.0, you should download and install Runtime 7.0.11 or SDK 7.0.111 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.If you're using .NET 6.0, you should download and install Runtime 6.0.22 or SDK 6.0.317 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0..NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.Other InformationReporting Security IssuesIf you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to [email protected]. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.SupportYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.DisclaimerThe information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.External Links[CVE-2023-36799]( https://www.cve.org/CVERecord?id=CVE-2023-36799)RevisionsV1.0 (September 12, 2023): Advisory published._Version 1.0__Last Updated 2023-09-12_
[]
GHSA-2q23-rcvx-x24x
The ExifImageFile::readDHT function in ExifImageFileRead.cpp in OpenExif 2.1.4 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted jpg file.
[]
GHSA-c7pc-vh27-jpqf
Directory traversal vulnerability in the routing component in ownCloud Server before 5.0.17 and 6.0.x before 6.0.4 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in a filename, related to index.php.
[]
CVE-2024-47640
WordPress WP ERP plugin <= 1.13.2 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in weDevs WP ERP allows Reflected XSS.This issue affects WP ERP: from n/a through 1.13.2.
[ "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:*:wordpress:*:*" ]
GHSA-r8jg-75qw-69pw
In the Linux kernel, the following vulnerability has been resolved:x86/mce: Make sure to grab mce_sysfs_mutex in set_bank()Modifying a MCA bank's MCA_CTL bits which control which error types to be reported is done over/sys/devices/system/machinecheck/ β”œβ”€β”€ machinecheck0 β”‚Β Β  β”œβ”€β”€ bank0 β”‚Β Β  β”œβ”€β”€ bank1 β”‚Β Β  β”œβ”€β”€ bank10 β”‚Β Β  β”œβ”€β”€ bank11 ...sysfs nodes by writing the new bit mask of events to enable.When the write is accepted, the kernel deletes all current timers and reinits all banks.Doing that in parallel can lead to initializing a timer which is already armed and in the timer wheel, i.e., in use already:ODEBUG: init active (active state 0) object: ffff888063a28000 object type: timer_list hint: mce_timer_fn+0x0/0x240 arch/x86/kernel/cpu/mce/core.c:2642 WARNING: CPU: 0 PID: 8120 at lib/debugobjects.c:514 debug_print_object+0x1a0/0x2a0 lib/debugobjects.c:514Fix that by grabbing the sysfs mutex as the rest of the MCA sysfs code does.Reported by: Yue Sun <[email protected]> Reported by: xingwei lee <[email protected]>
[]
GHSA-72w4-56w3-7485
A stored cross-site scripting (XSS) vulnerability in the Create Circuit Types (/circuits/circuit-types/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
[]
GHSA-gc6x-jwj2-5837
VMware Workspace ONE Access, Identity Manager and vRealize Automation contains a privilege escalation vulnerability. A malicious actor with local access can escalate privileges to 'root'.
[]
GHSA-gv8g-hw9g-385h
The Contact Form 7 Math Captcha WordPress plugin through 2.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users.
[]
GHSA-6vx6-fgqf-mphh
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mobil365 Informatics Saha365 App allows SQL Injection.This issue affects Saha365 App: before 30.09.2024.
[]
CVE-2024-34034
An issue was discovered in FlexRIC 2.0.0. It crashes during a Subscription Request denial-of-service (DoS) attack, triggered by an assertion error. An attacker must send a high number of E42 Subscription Requests to the Near-RT RIC component.
[]
GHSA-wxg7-r552-jqq6
In EPESI 1.8.2 rev20170830, there is Stored XSS in the Tasks Alerts Title parameter.
[]
GHSA-h3wp-4mqq-v8c4
There is a memory corruption vulnerability due to an out of bounds write in CheckPins() when using the SymbolEditor in NI Circuit Design Suite. Β This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .sym file. This vulnerability affects NI Circuit Design Suite 14.3.0 and prior versions.
[]
CVE-2019-3598
McAfee Agent update fixes a vulnerability in handling UDP requests
Buffer Access with Incorrect Length Value in McAfee Agent (MA) 5.x allows remote unauthenticated users to potentially cause a denial of service via specifically crafted UDP packets.
[ "cpe:2.3:a:mcafee:agent:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:agent:5.6.0:*:*:*:*:*:*:*" ]
GHSA-g95f-gpxv-v7rj
COMFAST (Shenzhen Sihai Zhonglian Network Technology Co., Ltd) CF-WR623N Router firmware V2.3.0.1 is vulnerable to Cross Site Scripting (XSS) via the URL filtering feature in the router.
[]
GHSA-9q3g-m353-cp4p
Denial of Service in Packetbeat
Packetbeat versions prior to 5.6.4 and 6.0.0 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic.
[]
CVE-2023-28618
WordPress Enhanced Plugin Admin Plugin <= 1.16 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Marios Alexandrou Enhanced Plugin Admin plugin <=Β 1.16 versions.
[ "cpe:2.3:a:infolific:enhanced_plugin_admin:*:*:*:*:*:wordpress:*:*" ]
GHSA-fj6j-88c7-c8gx
Mount Manager in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles symlinks, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Mount Manager Elevation of Privilege Vulnerability."
[]
GHSA-wh8f-x7rp-h62h
Multiple PHP remote file inclusion vulnerabilities in sablonlar/gunaysoft/gunaysoft.php in PHPortal 1.2 Beta allow remote attackers to execute arbitrary PHP code via a URL in (1) icerikyolu, (2) sayfaid, and (3) uzanti parameters.
[]
GHSA-3jxm-cp2c-65rc
Open redirect vulnerability in Booked versions prior to 3.3 allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.
[]
GHSA-h42j-7h79-mp5m
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Nicolas Lemoine WP Better Emails plugin <= 0.4 versions.
[]
CVE-2016-0932
Use-after-free vulnerability in the Doc object implementation in Adobe Reader and Acrobat before 11.0.14, Acrobat and Acrobat Reader DC Classic before 15.006.30119, and Acrobat and Acrobat Reader DC Continuous before 15.010.20056 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0934, CVE-2016-0937, CVE-2016-0940, and CVE-2016-0941.
[ "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:11.0.12:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:11.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*" ]
CVE-2020-14556
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:jdk:1.8.0:update251:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:11.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:14.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update251:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*" ]
GHSA-h6pg-m4p7-g99g
In encode of wlandata.cpp, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-243130019References: N/A
[]
CVE-2009-1711
WebKit in Apple Safari before 4.0 does not properly initialize memory for Attr DOM objects, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document.
[ "cpe:2.3:a:apple:safari:*:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:0.8:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:0.9:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.0.3:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.1:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.2:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.1:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:1.3.2:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.2:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:2.0.4:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.3:*:mac:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.1:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.2:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.3:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.0.4:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.1:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.1.2:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.1:*:windows:*:*:*:*:*", "cpe:2.3:a:apple:safari:3.2.2:*:windows:*:*:*:*:*" ]
GHSA-gcwg-xr3q-h23m
Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) for macOS are affected by a security feature bypass that could result in dynamic library code injection by the Adobe Reader process. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
GHSA-8qww-fpgr-w297
The affected products have a CSRF vulnerability that could allow an attacker to execute code and upload malicious files.
[]
GHSA-hm8f-p8g8-ghjv
MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.
[]
GHSA-55p6-pg28-3hh3
Lack of verification in haserl, a component of Alpine Linux Configuration Framework, before 0.9.36 allows local users to read the contents of any file on the filesystem.
[]
GHSA-gc9c-5cvm-jfhx
Information disclosure due to buffer over-read in Bluetooth HOST while processing GetFolderItems and GetItemAttribute Cmds from peer device.
[]
CVE-2023-22066
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*" ]
GHSA-jxxp-mqwv-8hqg
adolph_dudu ratio-swiper 0.0.2 was discovered to contain a prototype pollution via the function parse. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties.
[]
CVE-2023-42728
In phasecheckserver, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed
[ "cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
CVE-2025-6524
70mai 1S Video Services improper authentication
A vulnerability classified as problematic has been found in 70mai 1S up to 20250611. This affects an unknown part of the component Video Services. The manipulation leads to improper authentication. Access to the local network is required for this attack to succeed. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-ggjg-37r9-4hhp
A vulnerability in the Cisco Prime Infrastructure (PI) and Evolved Programmable Network Manager (EPNM) SQL database interface could allow an authenticated, remote attacker to impact the confidentiality and integrity of the application by executing arbitrary SQL queries, aka SQL Injection. More Information: CSCvc23892 CSCvc35270 CSCvc35626 CSCvc35630 CSCvc49568. Known Affected Releases: 3.1(1) 2.0(4.0.45B).
[]
CVE-2018-0158
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device to be processed. A successful exploit could cause an affected device to continuously consume memory and eventually reload, resulting in a DoS condition. Cisco Bug IDs: CSCvf22394.
[ "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1.9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1.12:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s1.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s1.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s1.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s1.9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s1.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s1.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s1.12:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900:-:*:*:*:*:*:*:*" ]
CVE-2024-12475
WP Multi Store Locator <= 2.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
The WP Multi Store Locator plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-x92g-43qc-p6jq
Multiple cross-site request forgery (CSRF) vulnerabilities in ownCloud before 4.0.12 and 4.5.x before 4.5.7 allow remote attackers to hijack the authentication of users for requests that (1) change the timezone for the user via the lat and lng parameters to apps/calendar/ajax/settings/guesstimezone.php, (2) disable or enable the automatic timezone detection via the timezonedetection parameter to apps/calendar/ajax/settings/timezonedetection.php, (3) import user accounts via the admin_export parameter to apps/admin_migrate/settings.php, (4) overwrite user files via the operation parameter to apps/user_migrate/ajax/export.php, or (5) change the authentication server URL via unspecified vectors to apps/user_ldap/settings.php.
[]
CVE-2024-20154
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00720348; Issue ID: MSV-2392.
[]
GHSA-vwh5-q72r-gr35
A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0), SCALANCE S612 (All versions >= V3.0), SCALANCE S623 (All versions >= V3.0), SCALANCE S627-2M (All versions >= V3.0). Specially crafted packets sent to port 443/tcp of affected devices could cause a Denial-of-Service condition of the web server. A cold reboot is required to restore the functionality of the device.
[]
GHSA-2wx9-x824-p464
A vulnerability in the FTP inspection engine of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software fails to release spinlocks when a device is running low on system memory, if the software is configured to apply FTP inspection and an access control rule to transit traffic, and the access control rule is associated with an FTP file policy. An attacker could exploit this vulnerability by sending a high rate of transit traffic through an affected device to cause a low-memory condition on the device. A successful exploit could allow the attacker to cause a software panic on the affected device, which could cause the device to reload and result in a temporary DoS condition.
[]
GHSA-q4jp-jp3r-92m9
Availability Booking Calendar 5.0 is vulnerable to Multiple HTML Injection issues via SMS API Key or Default Country Code.
[]
GHSA-rv75-22v3-44rx
The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests.
[]
GHSA-xgj8-4j2v-mq6w
The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation.
[]
CVE-2006-1754
SQL injection vulnerability in index.php in SWSoft Confixx 3.0.6, 3.0.8, and 3.1.2 allows remote attackers to execute arbitrary SQL commands via the SID parameter.
[ "cpe:2.3:a:swsoft:confixx:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:swsoft:confixx:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:swsoft:confixx:3.1.2:*:*:*:*:*:*:*" ]
CVE-2024-9660
School Management <= 91.5.0 - Authenticated (Student+) Arbitrary File Upload
The School Management System for Wordpress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the mj_smgt_load_documets_new() and mj_smgt_load_documets() functions in all versions up to, and including, 91.5.0. This makes it possible for authenticated attackers, with Student-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
[ "cpe:2.3:a:dasinfomedia:school_management_system:*:*:*:*:*:*:*:*" ]
GHSA-239g-m969-jgx2
Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability.
[]
CVE-2017-10067
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:jdk:1.6.0:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update141:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update131:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update151:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update141:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update131:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vsphere:*:*", "cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vsphere:*:*", "cpe:2.3:a:netapp:virtual_storage_console:6.2.2:*:*:*:*:vsphere:*:*" ]
GHSA-7vq3-m8xm-2392
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application, aka "Win32k Multiple Fetch Vulnerability," a different vulnerability than CVE-2013-1342, CVE-2013-1343, CVE-2013-1344, and CVE-2013-3864.
[]
CVE-2024-42258
mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines
In the Linux kernel, the following vulnerability has been resolved: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines Yves-Alexis Perez reported commit 4ef9ad19e176 ("mm: huge_memory: don't force huge page alignment on 32 bit") didn't work for x86_32 [1]. It is because x86_32 uses CONFIG_X86_32 instead of CONFIG_32BIT. !CONFIG_64BIT should cover all 32 bit machines. [1] https://lore.kernel.org/linux-mm/CAHbLzkr1LwH3pcTgM+aGQ31ip2bKqiqEQ8=FQB+t2c3dhNKNHA@mail.gmail.com/
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-5h67-gj5j-53f7
Sophos Anti-Virus for Windows before 7.6.3, Anti-Virus for Windows NT/9x before 4.7.18, Anti-Virus for OS X before 4.9.18, Anti-Virus for Linux before 6.4.5, Anti-Virus for UNIX before 7.0.5, Anti-Virus for Unix and Netware before 4.37.0, Sophos EM Library, and Sophos small business solutions, when CAB archive scanning is enabled, allows remote attackers to cause a denial of service (segmentation fault) via a "fuzzed" CAB archive file, as demonstrated by the OUSPG PROTOS GENOME test suite for Archive Formats.
[]
CVE-2024-39681
WordPress Cooked Plugin - Cross-Site Request Forgery to Apply Template to All Recipes
Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:boxystudio:cooked:*:*:*:*:*:*:*:*" ]
GHSA-hh5q-w4xj-4q6g
Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.
[]
CVE-2010-1201
Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.0.3:*:*:*:*:*:*:*" ]
CVE-2020-15370
Brocade Fabric OS versions before Brocade Fabric OS v7.4.2g could allow an authenticated, remote attacker to view a user password in cleartext. The vulnerability is due to incorrectly logging the user password in log files.
[ "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*" ]
CVE-2022-40324
SysAid Help Desk before 22.1.65 allows XSS via the Linked SRs field, aka FR# 67258.
[ "cpe:2.3:a:sysaid:help_desk:*:*:*:*:*:*:*:*" ]
CVE-2019-16027
Cisco IOS XR Software Intermediate System–to–Intermediate System Denial of Service Vulnerability
A vulnerability in the implementation of the Intermediate System&ndash;to&ndash;Intermediate System (IS&ndash;IS) routing protocol functionality in Cisco IOS XR Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition in the IS&ndash;IS process. The vulnerability is due to improper handling of a Simple Network Management Protocol (SNMP) request for specific Object Identifiers (OIDs) by the IS&ndash;IS process. An attacker could exploit this vulnerability by sending a crafted SNMP request to the affected device. A successful exploit could allow the attacker to cause a DoS condition in the IS&ndash;IS process.
[ "cpe:2.3:o:cisco:ios_xr:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:xr_12404:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:xr_12406:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:xr_12410:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:xr_12416:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:5.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.2.25:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_6000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_6008:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5002:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5011:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.3.15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:crs:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:xrv_9000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_560:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.3.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9000v:v2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9920:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*" ]
GHSA-rhrf-w5v6-jgp3
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.19 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).
[]
CVE-2023-1203
Improper removal of sensitive data in the entry edit feature of Hub Business submodule in Devolutions Remote Desktop Manager PowerShell Module 2022.3.1.5 and earlier allows an authenticated user to access sensitive data on entries that were edited using the affected submodule.
[ "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:*:*:*:*" ]
GHSA-g528-27f5-rgqv
An issue was discovered on Renesas RX65 and RX65N devices. With a VCC glitch, an attacker can extract the security ID key from the device. Then, the protected firmware can be extracted.
[]
CVE-2016-5995
Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program.
[ "cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.1:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.5:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:advanced_enterprise:*:*:*", "cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:advanced_workgroup:*:*:*", "cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:express:*:*:*", "cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:workgroup:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.1:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.1:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.2:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.2:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.3:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.3:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.4:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.4:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.5:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.5:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.6:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.6:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.7:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.7:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.8:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.8:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.9:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.9:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.9:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.10:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.10:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.10:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.11:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.11:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:9.7.0.11:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.1:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.1:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.2:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.2:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.3:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.3:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.4:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.4:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.5:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.1.0.5:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.1:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.1:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.1:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.2:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.2:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.2:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.3:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.3:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.3:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.4:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.4:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.5:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.5:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.5:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.6:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.6:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.6:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.7:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.7:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:10.5.0.7:*:*:*:unlimited:*:*:*", "cpe:2.3:a:ibm:db2_connect:11.1.0.0:*:*:*:application_server:*:*:*", "cpe:2.3:a:ibm:db2_connect:11.1.0.0:*:*:*:enterprise:*:*:*", "cpe:2.3:a:ibm:db2_connect:11.1.0.0:*:*:*:unlimited:*:*:*", "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2007-3649
Absolute path traversal vulnerability in a certain ActiveX control in hpqvwocx.dll 2.1.0.556 in Hewlett-Packard (HP) Digital Imaging allows remote attackers to create or overwrite arbitrary files via the second argument to the SaveToFile method.
[ "cpe:2.3:a:hp:photo_digital_imaging_activex_control:2.1.0.556:*:*:*:*:*:*:*" ]
CVE-2006-1201
Directory traversal vulnerability in resetpw.php in eschew.net phpBannerExchange 2.0 and earlier, and other versions before 2.0 Update 5, allows remote attackers to read arbitrary files via a .. (dot dot) in the email parameter during a "Recover password" operation (recoverpw.php).
[ "cpe:2.3:a:eschew.net:phpbannerexchange:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:eschew.net:phpbannerexchange:2.0_update_1:*:*:*:*:*:*:*", "cpe:2.3:a:eschew.net:phpbannerexchange:2.0_update_2:*:*:*:*:*:*:*", "cpe:2.3:a:eschew.net:phpbannerexchange:2.0_update_3:*:*:*:*:*:*:*", "cpe:2.3:a:eschew.net:phpbannerexchange:2.0_update_4:*:*:*:*:*:*:*" ]
GHSA-6j7m-gh9c-97r6
The Royal Elementor Addons plugin for WordPress is vulnerable to unauthenticated API key disclosure in versions up to, and including, 1.3.70 due to the plugin adding the API key to the source code of any page running the MailChimp block. This makes it possible for unauthenticated attackers to obtain a site's MailChimp API key. We recommend resetting any MailChimp API keys if running a vulnerable version of this plugin with the MailChimp block enabled as the API key may have been compromised.
[]
GHSA-48p4-hjrh-5j5v
Cross-site scripting (XSS) vulnerability in Scriptme SmE GB Host 1.21 and SmE Blog Host allows remote attackers to inject arbitrary web script or HTML via the BBcode url tag.
[]
CVE-2006-3599
SQL injection vulnerability in the Nuke Advanced Classifieds module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id_ads parameter in an EditAds op.
[ "cpe:2.3:a:php-nuke:advanced_classified_module:*:*:*:*:*:*:*:*" ]
CVE-2021-38012
Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
GHSA-vmv3-ppc5-6979
Cisco Internetwork Operating System (IOS) 12.0S through 12.3T attempts to process SNMP solicited operations on improper ports (UDP 162 and a randomly chosen UDP port), which allows remote attackers to cause a denial of service (device reload and memory corruption).
[]
GHSA-4c72-mrhf-23cg
Apache Syncope uses a weak PNRG
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.
[]
CVE-2025-21794
HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()
In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() Syzbot[1] has detected a stack-out-of-bounds read of the ep_addr array from hid-thrustmaster driver. This array is passed to usb_check_int_endpoints function from usb.c core driver, which executes a for loop that iterates over the elements of the passed array. Not finding a null element at the end of the array, it tries to read the next, non-existent element, crashing the kernel. To fix this, a 0 element was added at the end of the array to break the for loop. [1] https://syzkaller.appspot.com/bug?extid=9c9179ac46169c56c1ad
[]
CVE-2014-7937
Multiple off-by-one errors in libavcodec/vorbisdec.c in FFmpeg before 2.4.2, as used in Google Chrome before 40.0.2214.91, allow remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Vorbis I data.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
CVE-2019-18998
Asset Suite Direct Object Reference Access
Insufficient access control in the web interface of ABB Asset Suite versions 9.0 to 9.3, 9.4 prior to 9.4.2.6, 9.5 prior to 9.5.3.2 and 9.6.0 enables full access to directly referenced objects. An attacker with knowledge of a resource's URL can access the resource directly.
[ "cpe:2.3:a:hitachienergy:asset_suite:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachienergy:asset_suite:9.6.0:*:*:*:*:*:*:*" ]
CVE-2017-13718
The HTTP API supported by Starry Station (aka Starry Router) allows brute forcing the PIN setup by the user on the device, and this allows an attacker to change the Wi-Fi settings and PIN, as well as port forward and expose any internal device's port to the Internet. It was identified that the device uses custom Python code called "rodman" that allows the mobile appication to interact with the device. The APIs that are a part of this rodman Python file allow the mobile application to interact with the device using a secret, which is a uuid4 based session identifier generated by the device the first time it is set up. However, in some cases, these APIs can also use a security code. This security code is nothing but the PIN number set by the user to interact with the device when using the touch interface on the router. This allows an attacker on the Internet to interact with the router's HTTP interface when a user navigates to the attacker's website, and brute force the credentials. Also, since the device's server sets the Access-Control-Allow-Origin header to "*", an attacker can easily interact with the JSON payload returned by the device and steal sensitive information about the device.
[ "cpe:2.3:o:starry:s00111_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:starry:s00111:-:*:*:*:*:*:*:*" ]
GHSA-w859-pxm6-vjr6
SQL injection vulnerability in articles.php in JPortal 2.3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the topic parameter.
[]
GHSA-wfrc-qmgf-x82w
Executing transaction WRCK in SAP R/3 Enterprise Retail (EHP6) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
[]
GHSA-84rj-w682-g977
A use-after-free vulnerability exists in a way Pixar OpenUSD 20.08 processes reference paths textual USD files. A specially crafted file can trigger the reuse of a freed memory which can result in further memory corruption and arbitrary code execution. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file.
[]
GHSA-6w35-m3mc-pf7x
In the Linux kernel, the following vulnerability has been resolved:topology: Keep the cpumask unchanged when printing cpumapDuring fuzz testing, the following warning was discovered:different return values (15 and 11) from vsnprintf("%*pbl ", ...)test:keyward is WARNING in kvasprintf WARNING: CPU: 55 PID: 1168477 at lib/kasprintf.c:30 kvasprintf+0x121/0x130 Call Trace: kvasprintf+0x121/0x130 kasprintf+0xa6/0xe0 bitmap_print_to_buf+0x89/0x100 core_siblings_list_read+0x7e/0xb0 kernfs_file_read_iter+0x15b/0x270 new_sync_read+0x153/0x260 vfs_read+0x215/0x290 ksys_read+0xb9/0x160 do_syscall_64+0x56/0x100 entry_SYSCALL_64_after_hwframe+0x78/0xe2The call trace shows that kvasprintf() reported this warning during the printing of core_siblings_list. kvasprintf() has several steps:(1) First, calculate the length of the resulting formatted string.(2) Allocate a buffer based on the returned length.(3) Then, perform the actual string formatting.(4) Check whether the lengths of the formatted strings returned in steps (1) and (2) are consistent.If the core_cpumask is modified between steps (1) and (3), the lengths obtained in these two steps may not match. Indeed our test includes cpu hotplugging, which should modify core_cpumask while printing.To fix this issue, cache the cpumask into a temporary variable before calling cpumap_print_{list, cpumask}_to_buf(), to keep it unchanged during the printing process.
[]
CVE-2023-32602
WordPress CALL ME NOW Plugin <= 3.0 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in LOKALYZE CALL ME NOW plugin <=Β 3.0 versions.
[ "cpe:2.3:a:lokalyze:call_me_now:*:*:*:*:*:wordpress:*:*" ]