id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2023-42756 | Kernel: netfilter: race condition between ipset_cmd_add and ipset_cmd_swap | A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system. | [
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/a:redhat:enterprise_linux:9::realtime",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
]
|
CVE-2022-27256 | A PHP Local File inclusion vulnerability in the Redbasic theme for Hubzilla before version 7.2 allows remote attackers to include arbitrary php files via the schema parameter. | [
"cpe:2.3:a:hubzilla:hubzilla:*:*:*:*:*:*:*:*"
]
|
|
CVE-2025-51672 | A time-based blind SQL injection vulnerability was identified in the PHPGurukul Dairy Farm Shop Management System 1.3. The vulnerability exists in the manage-companies.php file and allows remote attackers to execute arbitrary SQL code via the companyname parameter in a POST request. | []
|
|
GHSA-q4p7-87j5-56xv | Insertion of Sensitive Information into Log File vulnerability in smackcoders AIO Performance Profiler, Monitor, Optimize, Compress & Debug allows Retrieve Embedded Sensitive Data. This issue affects AIO Performance Profiler, Monitor, Optimize, Compress & Debug: from n/a through 1.2. | []
|
|
CVE-2024-50829 | A SQL Injection vulnerability was found in /admin/edit_subject.php in kashipara E-learning Management System Project 1.0 via the unit parameter. | [
"cpe:2.3:a:kashipara:e_learning_management_system_project:*:*:*:*:*:*:*:*",
"cpe:2.3:a:lopalopa:e-learning_management_system:1.0:*:*:*:*:*:*:*"
]
|
|
GHSA-6jp2-hggx-8j7p | Jenkins GitHub Branch Source Plugin allows any user with Overall/Read permission to get list of valid credentials IDs | GitHub Branch Source provides a list of applicable credential IDs to allow users configuring a job to select the one they'd like to use. This functionality did not check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those could be used as part of an attack to capture the credentials using another vulnerability. An enumeration of credentials IDs in this plugin now requires the permission to have Extended Read permission (when that permission is enabled; otherwise Configure permission) to the job in whose context credentials are being accessed. If no job context exists, Overall/Administer permission is required. | []
|
GHSA-85xx-xhjm-rhrw | Socket.IO-client Java before 2.0.1 vulnerable to NULL Pointer Dereference | The package io.socket:socket.io-client before 2.0.1 is vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format. | []
|
CVE-2023-20615 | In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629572; Issue ID: ALPS07629572. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
]
|
|
CVE-2005-3675 | The Transmission Control Protocol (TCP) allows remote attackers to cause a denial of service (bandwidth consumption) by sending ACK messages for packets that have not yet been received (optimistic ACKs), which can cause the sender to increase its transmission rate until it fills available bandwidth. | [
"cpe:2.3:a:tcp:tcp:*:*:*:*:*:*:*:*"
]
|
|
CVE-2024-20362 | A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. | []
|
|
CVE-2024-3108 |
An implicit intent vulnerability was reported for Motorola’s Time Weather Widget application that could allow a local application to acquire the location of the device without authorization.
| []
|
|
CVE-2024-24622 | Softaculous Webuzo Password Reset Command Injection | Softaculous Webuzo contains a command injection in the password reset functionality. A remote, authenticated attacker can exploit this vulnerability to gain code execution on the system. | [
"cpe:2.3:a:softaculous:webuzo:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:softaculous:webuzo:*:*:*:*:*:*:*:*"
]
|
CVE-2025-0695 | An Allocation of Resources Without Limits or Throttling vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input. | []
|
|
CVE-2024-6420 | Hide My WP Ghost < 5.2.02 - Hidden Login Page Disclosure | The Hide My WP Ghost WordPress plugin before 5.2.02 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page. | [
"cpe:2.3:a:wpplugins:hide_my_wp_ghost:*:*:*:*:*:wordpress:*:*"
]
|
CVE-2022-39296 | Path traversal in MelisAssetManager | MelisAssetManager provides deliveries of Melis Platform's assets located in every module's public folder. Attackers can read arbitrary files on affected versions of `melisplatform/melis-asset-manager`, leading to the disclosure of sensitive information. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-asset-manager` >= 5.0.1. This issue was addressed by restricting access to files to intended directories only. | [
"cpe:2.3:a:melistechnology:melis-asset-manager:*:*:*:*:*:*:*:*"
]
|
GHSA-9p96-pf4v-v529 | A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281. | []
|
|
CVE-2024-34431 | WordPress WP etracker plugin <= 1.0.2 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP-etracker WP etracker allows Reflected XSS.This issue affects WP etracker: from n/a through 1.0.2.
| []
|
GHSA-9x4v-pj6r-qf85 | Cross-site scripting (XSS) vulnerability in Open Searchable Image Catalogue (OSIC) 0.7.0.1 and earlier allows remote attackers to inject arbitrary web scripts or HTML via the item_list parameter in search.php. | []
|
|
CVE-2018-6958 | VMware vRealize Automation (vRA) prior to 7.3.1 contains a vulnerability that may allow for a DOM-based cross-site scripting (XSS) attack. Exploitation of this issue may lead to the compromise of the vRA user's workstation. | [
"cpe:2.3:a:vmware:vrealize_automation:*:*:*:*:*:*:*:*"
]
|
|
CVE-2017-12961 | There is an assertion abort in the function parse_attributes() in data/sys-file-reader.c of the libpspp library in GNU PSPP before 1.0.1 that will lead to remote denial of service. | [
"cpe:2.3:a:gnu:pspp:0.11.0:*:*:*:*:*:*:*"
]
|
|
GHSA-9wgj-g8wc-6p76 | Microsoft IIS 5.0 allows remote attackers to cause a denial of service via an HTTP request with a content-length value that is larger than the size of the request, which prevents IIS from timing out the connection. | []
|
|
CVE-2019-13324 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.909. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of TIFF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-8782. | [
"cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
|
|
CVE-2022-3877 | Click Studios Passwordstate URL Field cross site scripting | A vulnerability, which was classified as problematic, was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. Affected is an unknown function of the component URL Field Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. VDB-216246 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:clickstudios:passwordstate:-:*:*:*:*:-:*:*",
"cpe:2.3:a:clickstudios:passwordstate:-:*:*:*:*:chrome:*:*"
]
|
CVE-2019-11135 | TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. | [
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:a:slackware:slackware:14.2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:apollo_4200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:apollo_4200:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:apollo_2000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:apollo_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_bl460c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_bl460c:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_dl580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl580:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_dl560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl560:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_dl380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl380:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_dl360_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl360:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_dl180_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl180:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_dl160_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl160:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_dl120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl120:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_dl20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_dl20:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_ml350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_ml350:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_ml110_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_ml110:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_ml30_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_ml30:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_xl450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl450:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_xl270d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl270d:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_xl230k_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl230k:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_xl190r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl190r:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_xl170r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_xl170r:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:synergy_480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:synergy_480:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:synergy_660_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:synergy_660:gen10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proliant_e910_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proliant_e910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8253_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8253:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8256_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8256:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8260_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8260l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8260l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8260m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8260m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8260y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8260y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8268_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8268:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8270_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8276_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8276:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8276l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8276l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8276m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8276m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8280l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8280l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_8280m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_8280m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_9220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_9220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_9221_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_9221:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_9222_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_9222:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_9242_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_9242:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_9282_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_9282:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5215l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5215l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5215m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5215m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5215r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5215r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5217_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5217:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5218_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5218:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5218b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5218b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5218n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5218n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5218t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5218t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5220r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5220r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5220s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5220s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5220t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5220t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_5222_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_5222:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6222v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6222v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6226_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6226:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6230n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6230n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6230t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6230t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6234_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6234:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6238_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6238:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6238l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6238l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6238m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6238m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6238t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6238t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6240_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6240l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6240l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6240m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6240m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6240y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6240y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6242_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6242:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6244_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6244:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6246_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6246:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6248_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6248:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6252_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6252:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6252n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6252n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6254_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6254:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_6262v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_6262v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4208r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4208r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4209t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4209t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4210r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4210r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4214_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4214:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4214c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4214c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4214r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4214r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4214y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4214y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4216_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_4216r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_4216r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3204_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_3204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_3206r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_3206r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_6405u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_6405u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_5305u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*"
]
|
|
GHSA-g2mr-92g8-fj73 | WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1. | []
|
|
CVE-2005-3752 | Unspecified vulnerability in ldapdiff before 1.1.1 has unknown impact and attack vectors, related to "ldapdiff.conf path construction". | [
"cpe:2.3:a:ldapdiff:ldapdiff:*:*:*:*:*:*:*:*"
]
|
|
GHSA-v2jx-72wh-2fm2 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPOPAL Opal Woo Custom Product Variation allows Path Traversal.This issue affects Opal Woo Custom Product Variation: from n/a through 1.1.3. | []
|
|
CVE-2021-43232 | Windows Event Tracing Remote Code Execution Vulnerability | Windows Event Tracing Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2366:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2366:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2366:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2366:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1977:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1977:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1415:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1415:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1415:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.405:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1415:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1415:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1415:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1415:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1415:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.376:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.376:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.1415:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.1415:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.1415:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19145:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19145:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4825:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4825:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4825:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20207:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20207:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20207:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23545:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23540:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20207:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
|
CVE-2016-0306 | IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.41, 8.0 before 8.0.0.13, and 8.5 before 8.5.5.10, when FIPS 140-2 is enabled, misconfigures TLS, which allows man-in-the-middle attackers to obtain sensitive information via unspecified vectors. | [
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:8.5.5.9:*:*:*:*:*:*:*"
]
|
|
CVE-2006-5321 | Multiple cross-site scripting (XSS) vulnerabilities in phplist before 2.10.3 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:tincan:phplist:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:tincan:phplist:2.10.1:*:*:*:*:*:*:*"
]
|
|
CVE-2017-9567 | The avb-bank-mobile-banking/id592565443 app 3.0.0 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:meafinancial:avb_bank_mobile_banking:3.0.0:*:*:*:*:iphone_os:*:*"
]
|
|
CVE-2022-41303 | A user may be tricked into opening a malicious FBX file which may exploit a use-after-free vulnerability in Autodesk FBX SDK 2020 version causing the application to reference a memory location controlled by an unauthorized third party, thereby running arbitrary code on the system. | [
"cpe:2.3:a:autodesk:fbx_software_development_kit:2020.0:*:*:*:*:*:*:*"
]
|
|
GHSA-fggx-frxq-cpx8 | Use after free in Garbage Collection in Google Chrome prior to 119.0.6045.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | []
|
|
CVE-2013-4930 | The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*"
]
|
|
GHSA-qxx9-pw4x-fc72 | A missing check on incoming client requests can be exploited to cause a situation where the Kea server's lease storage contains leases which are rejected as invalid when the server tries to load leases from storage on restart. If the number of such leases exceeds a hard-coded limit in the Kea code, a server trying to restart will conclude that there is a problem with its lease store and give up. Versions affected: 1.4.0 to 1.5.0, 1.6.0-beta1, and 1.6.0-beta2 | []
|
|
GHSA-4mp7-2m29-gqxf | HashiCorp Vault Authentication bypass | HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1. | []
|
CVE-2019-13118 | In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data. | [
"cpe:2.3:a:xmlsoft:libxslt:1.1.33:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update231:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.12.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.12.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.12.6:security_update_2019-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
]
|
|
GHSA-vmqv-5mr3-r7f5 | Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature. | []
|
|
CVE-2021-41134 | Stored XSS in Jupyter nbdime | nbdime provides tools for diffing and merging of Jupyter Notebooks. In affected versions a stored cross-site scripting (XSS) issue exists within the Jupyter-owned nbdime project. It appears that when reading the file name and path from disk, the extension does not sanitize the string it constructs before returning it to be displayed. The diffNotebookCheckpoint function within nbdime causes this issue. When attempting to display the name of the local notebook (diffNotebookCheckpoint), nbdime appears to simply append .ipynb to the name of the input file. The NbdimeWidget is then created, and the base string is passed through to the request API function. From there, the frontend simply renders the HTML tag and anything along with it. Users are advised to patch to the most recent version of the affected product. | [
"cpe:2.3:a:jupyter:nbdime:*:*:*:*:*:python:*:*",
"cpe:2.3:a:jupyter:nbdime:*:*:*:*:*:node.js:*:*",
"cpe:2.3:a:jupyter:nbdime-jupyterlab:*:*:*:*:*:node.js:*:*"
]
|
CVE-2024-22333 | IBM Maximo Application Suite information disclosure | IBM Maximo Asset Management 7.6.1.3 and IBM Maximo Application Suite 8.10 and 8.11 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 279973. | [
"cpe:2.3:a:ibm:maximo_application_suite:8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_application_suite:8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.6.1.3:*:*:*:*:*:*:*"
]
|
CVE-2020-36213 | An issue was discovered in the abi_stable crate before 0.9.1 for Rust. A retain call can create an invalid UTF-8 string, violating soundness. | [
"cpe:2.3:a:abi_stable_project:abi_stable:*:*:*:*:*:rust:*:*"
]
|
|
GHSA-r73w-7cph-wwm7 | An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory, aka 'Windows Runtime Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1169. | []
|
|
GHSA-xxx3-q2f4-59h7 | The login page of IDSWebApp in the Web Administration Tool in IBM Tivoli Directory Server (TDS) 6.2 before 6.2.0.3-TIV-ITDS-IF0004 does not have an off autocomplete attribute for authentication fields, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation. | []
|
|
GHSA-8qfw-jqf8-hx6m | PHP remote file inclusion vulnerability in tell_a_friend.inc.php for Tell A Friend Script 2.7 before 20050305 allows remote attackers to execute arbitrary PHP code by modifying the script_root parameter to reference a URL on a remote web server that contains the code. NOTE: it was later reported that 2.4 is also affected. | []
|
|
GHSA-vjx2-3329-45vg | A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.1. Affected is an unknown function of the file /admin/store.php. The manipulation of the argument tag leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | []
|
|
GHSA-8c8x-phvc-5p9w | Cockpit is a content management system that allows addition of content management functionality to any site. In versions 0.12.2 and prior, bad HTML sanitization in `htmleditor.js` may lead to cross-site scripting (XSS) issues. There are no known patches for this issue. | []
|
|
GHSA-5g96-3868-4x48 | An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC200 versions 03.00.39(12) and 03.01.07(13), and WAGO PFC100 version 03.00.39(12). A specially crafted authentication request can bypass regular expression filters, resulting in sensitive information disclosure. | []
|
|
GHSA-cfq2-3x3p-fqxp | In the Linux kernel, the following vulnerability has been resolved:net, neigh: Fix null-ptr-deref in neigh_table_clear()When IPv6 module gets initialized but hits an error in the middle,
kenel panic with:KASAN: null-ptr-deref in range [0x0000000000000598-0x000000000000059f]
CPU: 1 PID: 361 Comm: insmod
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
RIP: 0010:__neigh_ifdown.isra.0+0x24b/0x370
RSP: 0018:ffff888012677908 EFLAGS: 00000202
...
Call Trace:
<TASK>
neigh_table_clear+0x94/0x2d0
ndisc_cleanup+0x27/0x40 [ipv6]
inet6_init+0x21c/0x2cb [ipv6]
do_one_initcall+0xd3/0x4d0
do_init_module+0x1ae/0x670
...
Kernel panic - not syncing: Fatal exceptionWhen ipv6 initialization fails, it will try to cleanup and calls:neigh_table_clear()
neigh_ifdown(tbl, NULL)
pneigh_queue_purge(&tbl->proxy_queue, dev_net(dev == NULL))
# dev_net(NULL) triggers null-ptr-deref.Fix it by passing NULL to pneigh_queue_purge() in neigh_ifdown() if dev
is NULL, to make kernel not panic immediately. | []
|
|
GHSA-q3vr-4pr5-g9fw | The Zenon Lite theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter within the theme's Button shortcode in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
|
|
GHSA-jw9v-4476-63rf | In JetBrains TeamCity before 2021.2.1, a redirection to an external site was possible. | []
|
|
CVE-2023-26563 | The Syncfusion EJ2 Node File Provider 0102271 is vulnerable to filesystem-server.js directory traversal. As a result, an unauthenticated attacker can: - On Windows, list files in any directory, read any file, delete any file, upload any file to any directory accessible by the web server. - On Linux, read any file, download any directory, delete any file, upload any file to any directory accessible by the web server. | [
"cpe:2.3:a:syncfusion:nodejs_file_system_provider:0102271:*:*:*:*:*:*:*"
]
|
|
GHSA-h7v9-p38v-6rr9 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Ventura 13.5, macOS Monterey 12.6.8, macOS Big Sur 11.7.9. Processing a file may lead to a denial-of-service or potentially disclose memory contents. | []
|
|
GHSA-3mx5-5456-727x | SQL Injection vulnerability in Chamilo LMS v.1.11 thru v.1.11.20 allows a remote privileged attacker to obtain sensitive information via the import sessions functions. | []
|
|
GHSA-xpmp-pq5g-mgh6 | In the Linux kernel, the following vulnerability has been resolved:tracing/eprobes: Have event probes be consistent with kprobes and uprobesCurrently, if a symbol "@" is attempted to be used with an event probe
(eprobes), it will cause a NULL pointer dereference crash.Both kprobes and uprobes can reference data other than the main registers.
Such as immediate address, symbols and the current task name. Have eprobes
do the same thing.For "comm", if "comm" is used and the event being attached to does not
have the "comm" field, then make it the "$comm" that kprobes has. This is
consistent to the way histograms and filters work. | []
|
|
CVE-2016-7644 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
|
|
CVE-2020-26597 | An issue was discovered on LG mobile devices with Android OS 9.0 and 10 software. The Wi-Fi subsystem has incorrect input validation, leading to a crash. The LG ID is LVE-SMP-200022 (October 2020). | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
|
|
GHSA-r577-4hq7-73qh | Remote Code Execution in Apache Dubbo | Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers will use SnakeYAML library to load the rules which by default will enable calling arbitrary constructors. An attacker with access to the configuration center he will be able to poison the rule so when retrieved by the consumers, it will get RCE on all of them. This was fixed in Dubbo 2.7.13, 3.0.2 | []
|
CVE-2012-1592 | A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files. | [
"cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*"
]
|
|
CVE-2023-51072 | A stored cross-site scripting (XSS) vulnerability in the NOC component of Nagios XI version up to and including 2024R1 allows low-privileged users to execute malicious HTML or JavaScript code via the audio file upload functionality from the Operation Center section. This allows any authenticated user to execute arbitrary JavaScript code on behalf of other users, including the administrators. | [
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nagios:nagios_xi:2024:r1:*:*:*:*:*:*"
]
|
|
GHSA-f94m-q2w2-2g64 | SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL. | []
|
|
CVE-2013-6746 | Cross-site scripting (XSS) vulnerability in FileNet P8 Platform Documentation Installable Info Center 4.5.1 through 5.2.0 in IBM FileNet Business Process Manager 4.5.1 through 5.1.0, FileNet Content Manager 4.5.1 through 5.2.0, and Case Foundation 5.2.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:ibm:filenet_case_foundation:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_content_manager:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_content_manager:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_content_manager:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_content_manager:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_content_manager:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_business_process_manager:4.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_business_process_manager:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_business_process_manager:5.1.0:*:*:*:*:*:*:*"
]
|
|
GHSA-5qw2-5c88-vprw | Integer overflow in Mojo in Google Chrome prior to 90.0.4430.85 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | []
|
|
CVE-2022-29884 | A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions < CPC80 V16.30), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions < CPC80 V16.30), CP-8021 MASTER MODULE (All versions < CPC80 V16.30), CP-8022 MASTER MODULE WITH GPRS (All versions < CPC80 V16.30). When using the HTTPS server under specific conditions, affected devices do not properly free resources. This could allow an unauthenticated remote attacker to put the device into a denial of service condition. | [
"cpe:2.3:o:siemens:sicam_a8000_cp-8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_a8000_cp-8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sicam_a8000_cp-8021_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_a8000_cp-8021:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:sicam_a8000_cp-8022_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:sicam_a8000_cp-8022:-:*:*:*:*:*:*:*"
]
|
|
GHSA-qg5r-9v52-4mfm | cashIT! - serving solutions. Devices from "PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH" to 03.A06rks 2023.02.37 are affected by a origin bypass via the host header in an HTTP request. This vulnerability can be triggered by an HTTP endpoint exposed to the network. | []
|
|
GHSA-5p8h-m559-wpw7 | An issue has been discovered in GitLab EE affecting all versions starting from 8.13 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to abuse the `Allowed to merge` permission as a guest user, when granted the permission through a group. | []
|
|
GHSA-7g8m-7qrw-wg8g | com/salesmanager/central/profile/ProfileAction.java in Shopizer 1.1.5 and earlier does not restrict the number of authentication attempts, which makes it easier for remote attackers to guess passwords via a brute force attack. | []
|
|
CVE-2022-20411 | In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-232023771 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
|
|
GHSA-cvhx-qp79-fg83 | In telephony service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed | []
|
|
CVE-2025-2623 | westboy CicadasCMS save cross site scripting | A vulnerability was found in westboy CicadasCMS 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /system/cms/content/save. The manipulation of the argument title/content/laiyuan leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | []
|
GHSA-4hf8-w7gm-6656 | Cross-site scripting (XSS) vulnerability in STphp EasyNews PRO 4.0 allows remote attackers to inject arbitrary web script or HTML via a news post, which is stored in news/ without sanitization. | []
|
|
CVE-2016-5163 | The bidirectional-text implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not ensure left-to-right (LTR) rendering of URLs, which allows remote attackers to spoof the address bar via crafted right-to-left (RTL) Unicode text, related to omnibox/SuggestionView.java and omnibox/UrlBar.java in Chrome for Android. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
]
|
|
GHSA-j28m-hq2p-7rq8 | Vulnerability in the Portable Clusterware component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1 and 18c. Easily exploitable vulnerability allows high privileged attacker having Grid Infrastructure User privilege with logon to the infrastructure where Portable Clusterware executes to compromise Portable Clusterware. While the vulnerability is in Portable Clusterware, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Portable Clusterware. CVSS 3.0 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). | []
|
|
CVE-2015-5727 | The BER decoder in Botan 1.10.x before 1.10.10 and 1.11.x before 1.11.19 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, related to a length field. | [
"cpe:2.3:a:botan_project:botan:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.12:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.13:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.14:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.15:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.16:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.17:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.18:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
]
|
|
CVE-2020-25718 | A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
]
|
|
GHSA-cc2j-mf6c-hch7 | In Splunk IT Service Intelligence (ITSI) versions below 4.13.3 or 4.15.3, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed.The vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine. | []
|
|
CVE-2017-16654 | An issue was discovered in Symfony before 2.7.38, 2.8.31, 3.2.14, 3.3.13, 3.4-BETA5, and 4.0-BETA5. The Intl component includes various bundle readers that are used to read resource bundles from the local filesystem. The read() methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a URL parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack, aka Directory Traversal. | [
"cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
|
|
GHSA-q6v3-24wc-vg36 | Improper access control in Elenos ETG150 FM transmitter v3.12 allows attackers to make arbitrary configuration edits that are only accessed by privileged users. | []
|
|
GHSA-vr5h-9245-q2mh | WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file. | []
|
|
CVE-2017-9417 | Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute arbitrary code via unspecified vectors, aka the "Broadpwn" issue. | [
"cpe:2.3:o:broadcom:bcm43xx_wi-fi_chipset_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm4354_wi-fi_chipset:-:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm4358_wi-fi_chipset:-:*:*:*:*:*:*:*",
"cpe:2.3:h:broadcom:bcm4359_wi-fi_chipset:-:*:*:*:*:*:*:*"
]
|
|
CVE-2020-6811 | The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
]
|
|
CVE-2014-5528 | The Appsflyer library for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:appsflyer:appsflyer:-:*:*:*:*:android:*:*"
]
|
|
GHSA-8g7p-mx5x-8frc | A improper neutralization of special elements used in a template engine [CWE-1336] in FortiManager versions 7.4.1 and below, versions 7.2.4 and below, and 7.0.10 and below allows attacker to execute unauthorized code or commands via specially crafted templates. | []
|
|
CVE-2025-2544 | AI Content Pipelines <= 1.6 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload | The AI Content Pipelines plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. | []
|
GHSA-xgrf-pj3c-wvq6 | Stack-based buffer overflow in Music Animation Machine MIDI Player 2006aug19 Release 035 and possibly other versions allows user-assisted remote attackers to execute arbitrary code via a long line in a .mamx file. | []
|
|
GHSA-45jr-jmpw-3gj4 | Unspecified vulnerability in the Solaris Platform Information and Control Library daemon (picld) in Sun Solaris 8 through 10, and OpenSolaris builds snv_01 through snv_95, allows local users to cause a denial of service via unknown vectors that prevent operation of utilities such as prtdiag, prtpicl, and prtfru. | []
|
|
GHSA-x93r-v7f3-hcpj | Directory traversal vulnerability in Dynu FTP server 1.05 and earlier allows remote attackers to read arbitrary files via a .. in the CD (CWD) command. | []
|
|
CVE-2024-30806 | An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42aac. | [
"cpe:2.3:a:bento4:bento4:*:*:*:*:*:*:*:*"
]
|
|
GHSA-8v8j-5gpm-fvqv | The installer of Kaspersky VPN Secure Connection prior to 5.0 was vulnerable to arbitrary file deletion that could allow an attacker to delete any file in the system. | []
|
|
CVE-2023-24763 | In the module "Xen Forum" (xenforum) for PrestaShop, an authenticated user can perform SQL injection in versions up to 2.13.0. | [
"cpe:2.3:a:prestashop:xen_forum:*:*:*:*:*:prestashop:*:*"
]
|
|
GHSA-9frc-xwrq-mf76 | Unspecified vulnerability in the Java VM component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. | []
|
|
CVE-2015-2126 | Unspecified vulnerability in pppoec in HP HP-UX 11iv2 and 11iv3 allows local users to gain privileges by leveraging setuid permissions. | [
"cpe:2.3:o:hp:hp-ux:11.11iv2:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11iv3:*:*:*:*:*:*:*"
]
|
|
GHSA-j86v-2j25-g3c3 | Cscms Music Portal System v4.2 was discovered to contain a redirection vulnerability via the backurl parameter. | []
|
|
CVE-2013-2566 | The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. | [
"cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:11.1.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:12.2.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:http_server:12.2.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:integrated_lights_out_manager_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:sparc_enterprise_m3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:sparc_enterprise_m3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:sparc_enterprise_m4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:sparc_enterprise_m4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:sparc_enterprise_m5000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:sparc_enterprise_m5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:sparc_enterprise_m8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:sparc_enterprise_m8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:sparc_enterprise_m9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:sparc_enterprise_m9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*"
]
|
|
GHSA-mm73-86f9-5x5c | Moodle Grade information disclosure in grade's external fetch functions | It was found in Moodle before version 3.10.1, 3.9.4 and 3.8.7 that a insufficient capability checks in some grade related web services meant students were able to view other students grades. | []
|
CVE-2018-1148 | In Nessus before 7.1.0, Session Fixation exists due to insufficient session management within the application. An authenticated attacker could maintain system access due to session fixation after a user password change. | [
"cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*"
]
|
|
GHSA-97pc-4h67-c2qp | Adobe Bridge version 12.0.1 (and earlier versions) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
|
|
CVE-2021-27448 | A miscommunication in the file system allows adversaries with access to the MU320E to escalate privileges on the MU320E (all firmware versions prior to v04A00.1). | [
"cpe:2.3:o:ge:mu320e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ge:mu320e:-:*:*:*:*:*:*:*"
]
|
|
GHSA-7rw5-6f53-767h | An issue was discovered in Foxit Reader and PhantomPDF before 9.5. It allows signature validation bypass via a modified file or a file with non-standard signatures. | []
|
|
CVE-2023-32342 | IBM GSKit information disclosure | IBM GSKit could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 255828. | [
"cpe:2.3:a:ibm:http_server:*:*:*:*:*:*:*:*"
]
|
GHSA-74ch-7c47-jp63 | Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability." | []
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.