id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2025-37788 | cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path | In the Linux kernel, the following vulnerability has been resolved:
cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path
In the for loop used to allocate the loc_array and bmap for each port, a
memory leak is possible when the allocation for loc_array succeeds,
but the allocation for bmap fails. This is because when the control flow
goes to the label free_eth_finfo, only the allocations starting from
(i-1)th iteration are freed.
Fix that by freeing the loc_array in the bmap allocation error path. | [] |
GHSA-qgwf-v74m-338m | Multiple versions of GitLab expose sensitive user credentials when assigning a user to an issue or merge request. A fix was included in versions 8.15.8, 8.16.7, and 8.17.4, which were released on March 20th 2017 at 23:59 UTC. | [] |
|
CVE-2025-22722 | WordPress Widget Options plugin <= 4.0.8 - Broken Access Control to Notice Dimissal vulnerability | Missing Authorization vulnerability in Widget Options Team Widget Options allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Widget Options: from n/a through 4.0.8. | [] |
CVE-2020-6501 | Insufficient policy enforcement in CSP in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-4888 | Cross-site scripting (XSS) vulnerability in ZOHO ManageEngine ServiceDesk Plus before 9.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:zohocorp:servicedesk_plus:*:*:*:*:*:*:*:*"
] |
|
GHSA-h89p-p4m6-2496 | Multiple SQL injection vulnerabilities in Advanced Poll 2.02 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter to comments.php or (2) poll_id parameter to page.php. | [] |
|
CVE-2022-32940 | The issue was addressed with improved bounds checks. This issue is fixed in tvOS 16.1, iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. An app may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-hhx5-95gj-mjx7 | Google Chrome before 15.0.874.102 does not properly handle downloading files that have whitespace characters at the end of a filename, which has unspecified impact and user-assisted remote attack vectors. | [] |
|
GHSA-x8qh-xq3w-x7fx | Cross Site Scripting vulnerability in Faculty Evaulation System using PHP/MySQLi v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the page parameter. | [] |
|
CVE-2024-50155 | netdevsim: use cond_resched() in nsim_dev_trap_report_work() | In the Linux kernel, the following vulnerability has been resolved:
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
I am still seeing many syzbot reports hinting that syzbot
might fool nsim_dev_trap_report_work() with hundreds of ports [1]
Lets use cond_resched(), and system_unbound_wq
instead of implicit system_wq.
[1]
INFO: task syz-executor:20633 blocked for more than 143 seconds.
Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor state:D stack:25856 pid:20633 tgid:20633 ppid:1 flags:0x00004006
...
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 16760 Comm: kworker/1:0 Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events nsim_dev_trap_report_work
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210
Code: 89 fb e8 23 00 00 00 48 8b 3d 04 fb 9c 0c 48 89 de 5b e9 c3 c7 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 c0 d7 03 00 65 8b 15 60 f0
RSP: 0018:ffffc90000a187e8 EFLAGS: 00000246
RAX: 0000000000000100 RBX: ffffc90000a188e0 RCX: ffff888027d3bc00
RDX: ffff888027d3bc00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88804a2e6000 R08: ffffffff8a4bc495 R09: ffffffff89da3577
R10: 0000000000000004 R11: ffffffff8a4bc2b0 R12: dffffc0000000000
R13: ffff88806573b503 R14: dffffc0000000000 R15: ffff8880663cca00
FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc90a747f98 CR3: 000000000e734000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 000000000000002b DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
<NMI>
</NMI>
<TASK>
__local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
spin_unlock_bh include/linux/spinlock.h:396 [inline]
nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]
nsim_dev_trap_report_work+0x75d/0xaa0 drivers/net/netdevsim/dev.c:850
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
worker_thread+0x870/0xd30 kernel/workqueue.c:3391
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
</TASK> | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*"
] |
GHSA-gm2g-2xr9-pxxj | Temporal Server vulnerable to Incorrect Authorization and Insecure Default Initialization of Resource | Insecure defaults in open-source Temporal Server before version 1.20 on all platforms allows an attacker to craft a task token with access to a namespace other than the one specified in the request. Creation of this task token must be done outside of the normal Temporal server flow. It requires the namespace UUID and information from the workflow history for the target namespace. Under these conditions, it is possible to interfere with pending tasks in other namespaces, such as marking a task failed or completed.
If a task is targeted for completion by the attacker, the targeted namespace must also be using the same data converter configuration as the initial, valid, namespace for the task completion payload to be decoded by workers in the target namespace. | [] |
CVE-2001-0454 | Directory traversal vulnerability in SlimServe HTTPd 1.1a allows remote attackers to read arbitrary files via a ... (modified dot dot) in the HTTP request. | [
"cpe:2.3:a:whitsoft:slimserve:*:*:*:*:*:*:*:*"
] |
|
GHSA-5rcx-gfw8-cjvv | The rpc.sprayd service is running. | [] |
|
CVE-2024-51823 | WordPress Add Ribbon Shortcode plugin <= 1.0.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sherwin Calims Add Ribbon Shortcode allows DOM-Based XSS.This issue affects Add Ribbon Shortcode: from n/a through 1.0.1. | [] |
CVE-2008-1574 | Integer overflow in ImageIO in Apple Mac OS X before 10.5.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG2000 image that triggers a heap-based buffer overflow. | [
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*"
] |
|
CVE-2013-4276 | Multiple stack-based buffer overflows in LittleCMS (aka lcms or liblcms) 1.19 and earlier allow remote attackers to cause a denial of service (crash) via a crafted (1) ICC color profile to the icctrans utility or (2) TIFF image to the tiffdiff utility. | [
"cpe:2.3:a:littlecms:little_cms_color_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.07:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.08:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.09:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:littlecms:little_cms_color_engine:1.18:*:*:*:*:*:*:*"
] |
|
CVE-2025-22114 | btrfs: don't clobber ret in btrfs_validate_super() | In the Linux kernel, the following vulnerability has been resolved:
btrfs: don't clobber ret in btrfs_validate_super()
Commit 2a9bb78cfd36 ("btrfs: validate system chunk array at
btrfs_validate_super()") introduces a call to validate_sys_chunk_array()
in btrfs_validate_super(), which clobbers the value of ret set earlier.
This has the effect of negating the validity checks done earlier, making
it so btrfs could potentially try to mount invalid filesystems. | [] |
GHSA-gw7q-2989-89j8 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WooCommerce Product Vendors plugin <= 2.1.76 versions. | [] |
|
GHSA-f67x-vqh9-8p43 | The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. | [] |
|
CVE-2018-18877 | In firmware version MS_2.6.9900 of Columbia Weather MicroServer, an authenticated web user can access an alternative configuration page config_main.php that allows manipulation of the device. | [
"cpe:2.3:o:columbiaweather:weather_microserver_firmware:ms_2.6.9900:*:*:*:*:*:*:*",
"cpe:2.3:h:columbiaweather:weather_microserver:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-48786 | An issue in SWITCHBOT INC SwitchBot (com.theswitchbot.switchbot) 5.0.4 allows a remote attacker to obtain sensitive information via the firmware update process. | [
"cpe:2.3:o:switchbot:switchbot_firmware:5.0.4:*:*:*:*:*:*:*"
] |
|
GHSA-qqj7-f934-r35q | SQL Injection exists in Twilio WEB To Fax Machine System 1.0 via the email or password parameter to login_check.php, or the id parameter to add_email.php or edit_content.php. | [] |
|
GHSA-pc76-wwrm-9rgw | The Photo Gallery, Sliders, Proofing and WordPress plugin before 3.59.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [] |
|
CVE-2019-0278 | Under certain conditions the Monitoring Servlet of the SAP NetWeaver Process Integration (Messaging System), fixed in versions 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker to see the names of database tables used by the application, leading to information disclosure. | [
"cpe:2.3:a:sap:netweaver_process_integration:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_process_integration:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_process_integration:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_process_integration:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_process_integration:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_process_integration:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_process_integration:7.50:*:*:*:*:*:*:*"
] |
|
CVE-2022-44054 | The d8s-xml for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-utility package. The affected version of d8s-htm is 0.1.0. | [
"cpe:2.3:a:democritus:d8s-xml:0.1.0:*:*:*:*:python:*:*"
] |
|
GHSA-wqjf-hq52-vg86 | cloudforms version, cloudforms 5.8 and cloudforms 5.9, is vulnerable to a cross-site-scripting. A flaw was found in CloudForms's v2v infrastructure mapping delete feature. A stored cross-site scripting due to improper sanitization of user input in Name field. | [] |
|
CVE-2025-34025 | Versa Concerto Insecure Docker Mount Container Escape | The Versa Concerto SD-WAN orchestration platform is vulnerable to an privileges escalation and container escape vulnerability caused by unsafe default mounting of host binary paths that allow the container to modify host paths. The escape can be used to trigger remote code execution or direct host access depending on the host operating system configuration.This issue is known to affect Concerto from 12.1.2 through 12.2.0. Additional versions may be vulnerable. | [] |
GHSA-3fx3-qcjv-qr6h | The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not properly enforce context of ZoneInfo objects during deserialization, which allows remote attackers to run untrusted applets and applications in a privileged context, as demonstrated by "deserializing Calendar objects". | [] |
|
CVE-2021-28198 | ASUS BMC's firmware: buffer overflow - Firmware protocol configuration | The Firmware protocol configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. | [
"cpe:2.3:o:asus:asmb9-ikvm_firmware:1.11.12:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:asmb9-ikvm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720a-e9-rs24-e_firmware:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720a-e9-rs24-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700a-e9-rs4_firmware:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700a-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700-e9-rs4_firmware:1.09:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc4000_g4x_firmware:1.11.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc4000_g4x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700-e9-rs12_firmware:1.11.5:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700-e9-rs12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs100-e10-pi2_firmware:1.13.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs100-e10-pi2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs300-e10-ps4_firmware:1.13.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs300-e10-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs300-e10-rs4_firmware:1.13.6:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs300-e10-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e9-ps4_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e9-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e9-rs4_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e9_rs4_u_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e9_rs4_u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:e700_g4_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:e700_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:ws_c422_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:ws_c422_pro\\/se:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:ws_x299_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:ws_x299_pro\\/se:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-u12_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-u12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-u12\\/10g-2s_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-u12\\/10g-2s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:knpa-u16_firmware:1.13.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:knpa-u16:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc4000_dhd_g4_firmware:1.13.7:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc4000_dhd_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc4000_g4_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc4000_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720q-e9-rs24-s_firmware:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720q-e9-rs24-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720q-e9-rs8_firmware:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720q-e9-rs8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720q-e9-rs8-s_firmware:1.15.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720q-e9-rs8-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-d8_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-d8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pa-d8c_firmware:1.14.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pa-d8c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720-e9-rs24-u_firmware:1.14.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720-e9-rs24-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720-e9-rs8-g_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720-e9-rs8-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500-e9-ps4_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500-e9-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:pro_e800_g4_firmware:1.14.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:pro_e800_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500-e9-rs4_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500-e9-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500-e9-rs4-u_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500-e9-rs4-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs520-e9-rs12-e_firmware:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs520-e9-rs12-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs520-e9-rs8_firmware:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs520-e9-rs8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc8000_g4_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc8000_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:esc8000_g4\\/10g_firmware:1.15.4:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:esc8000_g4\\/10g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720-e9-rs12-e_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720-e9-rs12-e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:ws_c621e_sage_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:ws_c621e_sage:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e10-ps4_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e10-ps4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs500a-e10-rs4_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs500a-e10-rs4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700a-e9-rs12v2_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700a-e9-rs12v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs700a-e9-rs4v2_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs700a-e9-rs4v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720a-e9-rs12v2_firmware:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720a-e9-rs12v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:rs720a-e9-rs24v2_firmware:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rs720a-e9-rs24v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:asus:z11pr-d16_firmware:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:z11pr-d16:-:*:*:*:*:*:*:*"
] |
GHSA-28mp-cr2q-8xfm | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GTmetrix GTmetrix for WordPress plugin <= 0.4.6 versions. | [] |
|
GHSA-rcc5-5h4f-vvxj | SWFTools commit 772e55a2 was discovered to contain a memory leak via /lib/mem.c. | [] |
|
GHSA-6473-gqrj-4p65 | Improper Link Resolution Before File Access in Jenkins Pipeline: Groovy Plugin | Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers able to configure Pipelines to read arbitrary files on the Jenkins controller file system. | [] |
GHSA-99v4-8cf2-6hxj | The project import functionality in SoapUI 5.3.0 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL project file. | [] |
|
CVE-2022-35023 | OTFCC commit 617837b was discovered to contain a segmentation violation via /lib/x86_64-linux-gnu/libc.so.6+0xbb384. | [
"cpe:2.3:a:otfcc_project:otfcc:*:*:*:*:*:*:*:*"
] |
|
GHSA-vjjx-869w-gg2x | WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7095, CVE-2015-7097, CVE-2015-7098, CVE-2015-7099, CVE-2015-7100, CVE-2015-7101, CVE-2015-7102, and CVE-2015-7103. | [] |
|
CVE-2021-3279 | sz.chat version 4 allows injection of web scripts and HTML in the message box. | [
"cpe:2.3:a:fortics:szchat:4:*:*:*:*:*:*:*"
] |
|
CVE-2007-5950 | Cross-site scripting (XSS) vulnerability in NetCommons before 1.0.11, and 1.1.x before 1.1.2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2006-4165. | [
"cpe:2.3:a:netcommons:netcommons:*:*:*:*:*:*:*:*"
] |
|
GHSA-fq75-6gpr-m5fm | In libxaac there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118492594 | [] |
|
CVE-2022-24565 | Checkmk <=2.0.0p19 Fixed in 2.0.0p20 and Checkmk <=1.6.0p27 Fixed in 1.6.0p28 are affected by a Cross Site Scripting (XSS) vulnerability. The Alias of a site was not properly escaped when shown as condition for notifications. | [
"cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p19:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p20:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p21:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p22:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p23:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p24:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p25:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p26:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:1.6.0:p27:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*",
"cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*"
] |
|
GHSA-g466-57gh-cqfw | Spree uses a hardcoded hash value | The session cookie store implementation in Spree 0.2.0 uses a hardcoded `config.action_controller_session` hash value (aka secret key), which makes it easier for remote attackers to bypass cryptographic protection mechanisms by leveraging an application that contains this value within the `config/environment.rb` file. | [] |
CVE-2019-17051 | Evernote before 7.13 GA on macOS allows code execution because the com.apple.quarantine attribute is not used for attachment files, as demonstrated by a one-click attack involving a drag-and-drop operation on a crafted Terminal file. | [
"cpe:2.3:a:evernote:evernote:*:*:*:*:*:macos:*:*"
] |
|
CVE-2017-3070 | Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the ConvolutionFilter class. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-h6vc-5925-xpc3 | Windows Remote Desktop Configuration Service Tampering Vulnerability | [] |
|
CVE-2022-21522 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] |
|
GHSA-ph2j-5hxq-gxrr | Drupal Node Validation Bypass in the node module API | The node module API in Drupal 5.x before 5.11 allows remote attackers to bypass node validation and have unspecified other impact via unknown vectors related to contributed modules. | [] |
GHSA-6x6h-5999-c5q3 | Multiple cross-site request forgery (CSRF) vulnerabilities in twitget.php in the Twitget plugin before 3.3.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that change unspecified plugin options via a request to wp-admin/options-general.php. | [] |
|
GHSA-qqr3-c8vc-pm7v | Stored cross-site scripting (XSS) vulnerability due to missing origin validation in postMessage. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 37391. | [] |
|
GHSA-x3ph-vm9w-xx64 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
CVE-2007-3442 | Format string vulnerability on the Research in Motion BlackBerry 7270 before 4.0 SP1 Bundle 108 allows remote attackers to cause a denial of service (blocked call reception and calling) via format string specifiers in an SIP INVITE message that lacks a host name in the Contact header. | [
"cpe:2.3:h:research_in_motion_limited:blackberry_7270:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-6040 | IBM Jazz Foundation could allow an authenticated user to take over a previously logged in user due to session expiration not being enforced. | [
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*"
] |
|
CVE-2024-37542 | WordPress Gallery – Image and Video Gallery with Thumbnails plugin <= 2.0.3 - Broken Access Control vulnerability | Missing Authorization vulnerability in WpDevArt Responsive Image Gallery, Gallery Album.This issue affects Responsive Image Gallery, Gallery Album: from n/a through 2.0.3. | [
"cpe:2.3:a:wpdevart:gallery:*:*:*:*:*:wordpress:*:*"
] |
GHSA-r4px-9294-wc7w | The SurfaceFlinger service in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allows attackers to obtain sensitive information via a crafted application, related to lack of a default constructor in include/ui/FrameStats.h, aka internal bug 28592402. | [] |
|
CVE-2016-7117 | Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] |
|
GHSA-rv9j-p5m2-3523 | The Apache OFBiz HTTP engine (org.apache.ofbiz.service.engine.HttpEngine.java) handles requests for HTTP services via the /webtools/control/httpService endpoint. This service takes the `serviceContent` parameter in the request and deserializes it using XStream. This `XStream` instance is slightly guarded by disabling the creation of `ProcessBuilder`. However, this can be easily bypassed (and in multiple ways). Mitigation: Upgrade to 16.11.06 or manually apply the following commits on branch 16 r1850017+1850019 | [] |
|
GHSA-3cfj-8mxg-4897 | Improper initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable information disclosure via local access. | [] |
|
GHSA-72r8-vmj4-cfrp | IBM Cognos Analytics 11 Configuration tool, under certain circumstances, will bypass OIDC namespace signature verification on its id_token. IBM X-Force ID: 150902. | [] |
|
CVE-2023-22849 | Apache Sling App CMS: XSS in CMS Reference / UI Components | An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Sling App CMS version 1.1.4 and prior may allow an authenticated remote attacker to perform a reflected cross-site scripting (XSS) attack in multiple features.
Upgrade to Apache Sling App CMS >= 1.1.6
| [
"cpe:2.3:a:apache:sling_cms:*:*:*:*:*:*:*:*"
] |
GHSA-r79m-gm95-v29g | The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel before 4.13.4 allows local users to obtain sensitive information from uninitialized kernel heap-memory locations via an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0. | [] |
|
CVE-2014-2706 | Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"
] |
|
GHSA-gq7r-qxw5-w38c | A vulnerability have been reported to affect multiple QNAP operating systems. If exploited, the vulnerability allow remote authenticated users to get secret values. The vulnerabilities affect the following QNAP operating systems: QTS, QuTS hero, QuTScloud, QVP (QVR Pro appliances) We have already fixed the vulnerabilities in the following operating system versions: QTS 5.0.1.2346 build 20230322 and later QuTS hero h5.0.1.2348 build 20230324 and later | [] |
|
GHSA-pmq9-x3vc-v6f7 | A vulnerability classified as critical has been found in TOTOLINK N150RT 3.4.0-B20190525. This affects an unknown part of the file /boa/formWSC. The manipulation of the argument targetAPSsid leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-c8fq-785c-3vm3 | SQL injection vulnerability in index.php in 724Networks 724CMS 4.01 and earlier allows remote attackers to execute arbitrary SQL commands via the ID parameter. | [] |
|
CVE-2023-32448 |
PowerPath for Windows, versions 7.0, 7.1 & 7.2 contains License Key Stored in Cleartext vulnerability. A local user with access to the installation directory can retrieve the license key of the product and use it to install and license PowerPath on different systems.
| [
"cpe:2.3:a:dell:powerpath:7.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:dell:powerpath:7.1:*:*:*:*:windows:*:*",
"cpe:2.3:a:dell:powerpath:7.2:*:*:*:*:windows:*:*"
] |
|
CVE-2014-7810 | The Expression Language (EL) implementation in Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web application that leverages use of incorrect privileges during EL evaluation. | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.46:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.48:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.49:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.31:*:*:*:*:*:*:*"
] |
|
GHSA-97v8-9w8c-8wvm | In the Linux kernel, the following vulnerability has been resolved:ALSA: pcm: Check for null pointer of pointer substream before dereferencing itPointer substream is being dereferenced on the assignment of pointer card
before substream is being null checked with the macro PCM_RUNTIME_CHECK.
Although PCM_RUNTIME_CHECK calls BUG_ON, it still is useful to perform the
the pointer check before card is assigned. | [] |
|
GHSA-hgwm-pv9h-q5m7 | Potential XSS in jQuery dependency in Mirador | ImpactMirador users less than v3.0.0 (alpha-rc) versions that have an unpatched jQuery. When adopters update jQuery they will find some of Mirador functionality to be broken.PatchesMirador adopters should update to v3.0.0, no updates exist for v2.x releases.WorkaroundsYes, Mirador users could fork and create their own custom build of Mirador and make the bug fixes themselves.Referenceshttps://github.com/advisories/GHSA-gxr4-xjj5-5px2
https://github.com/advisories/GHSA-jpcq-cgw6-v4j6https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
https://jquery.com/upgrade-guide/3.5/ | [] |
CVE-2006-5389 | tools/tellhim.php in PHP-Wyana allows remote attackers to obtain sensitive information via an invalid lang parameter, which reveals the path in an error message. | [
"cpe:2.3:a:wyana:php-wyana:*:*:*:*:*:*:*:*"
] |
|
GHSA-v3w2-x73g-vf6m | Apsis Pound before 2.8a allows request smuggling via crafted headers, a different vulnerability than CVE-2005-3751. | [] |
|
GHSA-m23q-gpmv-x839 | A vulnerability was found in PCMan FTP Server 2.0.7 and classified as problematic. This issue affects some unknown processing of the component STOR Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251555. | [] |
|
GHSA-68hp-93h9-78mg | An inconsistent bits-per-sample value in the ff_mpeg4_decode_picture_header function in libavcodec/mpeg4videodec.c in FFmpeg 4.0 may trigger an assertion violation while converting a crafted AVI file to MPEG4, leading to a denial of service. | [] |
|
CVE-2025-48883 | Chrome PHP is missing encoding in `CssSelector` | Chrome PHP allows users to start playing with chrome/chromium in headless mode from PHP. Prior to version 1.14.0, CSS Selector expressions are not properly encoded, which can lead to XSS (cross-site scripting) vulnerabilities. This is patched in v1.14.0. As a workaround, users can apply encoding manually to their selectors if they are unable to upgrade. | [] |
GHSA-w6j4-9556-fjfj | In Open vSwitch (OvS) 2.5.0, a malformed IP packet can cause the switch to read past the end of the packet buffer due to an unsigned integer underflow in `lib/flow.c` in the function `miniflow_extract`, permitting remote bypass of the access control list enforced by the switch. | [] |
|
CVE-2024-45143 | Substance3D - Stager | Heap-based Buffer Overflow (CWE-122) | Substance3D - Stager versions 3.0.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:substance_3d_stager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-g9g4-w2mf-449q | In the Linux kernel, the following vulnerability has been resolved:wireguard: socket: free skb in send6 when ipv6 is disabledI got a memory leak report:unreferenced object 0xffff8881191fc040 (size 232):
comm "kworker/u17:0", pid 23193, jiffies 4295238848 (age 3464.870s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff814c3ef4>] slab_post_alloc_hook+0x84/0x3b0
[<ffffffff814c8977>] kmem_cache_alloc_node+0x167/0x340
[<ffffffff832974fb>] __alloc_skb+0x1db/0x200
[<ffffffff82612b5d>] wg_socket_send_buffer_to_peer+0x3d/0xc0
[<ffffffff8260e94a>] wg_packet_send_handshake_initiation+0xfa/0x110
[<ffffffff8260ec81>] wg_packet_handshake_send_worker+0x21/0x30
[<ffffffff8119c558>] process_one_work+0x2e8/0x770
[<ffffffff8119ca2a>] worker_thread+0x4a/0x4b0
[<ffffffff811a88e0>] kthread+0x120/0x160
[<ffffffff8100242f>] ret_from_fork+0x1f/0x30In function wg_socket_send_buffer_as_reply_to_skb() or wg_socket_send_
buffer_to_peer(), the semantics of send6() is required to free skb. But
when CONFIG_IPV6 is disable, kfree_skb() is missing. This patch adds it
to fix this bug. | [] |
|
CVE-2022-34294 | totd 1.5.3 uses a fixed UDP source port in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks. | [
"cpe:2.3:a:totd_project:totd:1.5.3:*:*:*:*:*:*:*"
] |
|
GHSA-g766-68j4-g7vw | An issue was discovered mjson thru 1.4.1 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. | [] |
|
GHSA-6c8r-hqwx-qpf2 | Cybozu Office 9.0.0 through 10.4.0 allows remote attackers to cause a denial of service. | [] |
|
GHSA-647p-v28r-5qg4 | WEB-DAV Linux File System (davfs2) 1.4.6 and 1.4.7 allow local users to gain privileges via unknown attack vectors in (1) kernel_interface.c and (2) mount_davfs.c, related to the "system" function. | [] |
|
CVE-2017-12843 | Cyrus IMAP before 3.0.3 allows remote authenticated users to write to arbitrary files via a crafted (1) SYNCAPPLY, (2) SYNCGET or (3) SYNCRESTORE command. | [
"cpe:2.3:a:cyrusimap:cyrus_imap:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*"
] |
|
GHSA-wp6v-hmrg-73q2 | CNCSoft Version 1.00.83 and prior with ScreenEditor Version 1.00.54 has two out-of-bounds read vulnerabilities could cause the software to crash due to lacking user input validation for processing project files. Which may allow an attacker to gain remote code execution with administrator privileges if exploited. | [] |
|
CVE-2023-36554 | A improper access control in Fortinet FortiManager version 7.4.0, version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.10, version 6.4.0 through 6.4.13, 6.2 all versions allows attacker to execute unauthorized code or commands via specially crafted HTTP requests. | [
"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*"
] |
|
CVE-2008-2588 | Unspecified vulnerability in the Oracle JDeveloper component in Oracle Application Server 10.1.2.2 allows local users to affect confidentiality via unknown vectors. | [
"cpe:2.3:a:oracle:jdeveloper:10.1.2.2:*:*:*:*:*:*:*"
] |
|
GHSA-qj74-fm89-4g8f | crpyto/tls in Go 1.1 before 1.3.2, when SessionTicketsDisabled is enabled, allows man-in-the-middle attackers to spoof clients via unspecified vectors. | [] |
|
CVE-2024-9396 | It is currently unknown if this issue is exploitable but a condition may arise where the structured clone of certain objects could lead to memory corruption. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-2119 | Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, and CVE-2011-2122. | [
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*"
] |
|
CVE-2023-2985 | A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-wr48-m8vq-hpjp | Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCut50727. | [] |
|
CVE-2023-36737 | Azure Network Watcher VM Agent Elevation of Privilege Vulnerability | Azure Network Watcher VM Agent Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:azure_network_watcher:*:*:*:*:*:*:*:*"
] |
GHSA-v8xr-q4f3-9wmf | Windows Mobile Broadband Driver Elevation of Privilege Vulnerability | [] |
|
GHSA-hg78-c92r-hvwr | Denial of Service in mqtt | Affected versions of `mqtt` will cause the node process to crash when receiving specially crafted MQTT packets, making the application vulnerable to a denial of service condition.RecommendationUpdate to v1.0.0 or later | [] |
CVE-2015-5069 | The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.3 and 1.13.x before 1.13.1 allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. | [
"cpe:2.3:a:wesnoth:battle_for_wesnoth:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
] |
|
GHSA-x89m-vq45-vjjr | Zeacom Chat Server before 5.1 uses too short a random string for the JSESSIONID value, which makes it easier for remote attackers to hijack sessions or cause a denial of service (Chat Server crash or Tomcat daemon crash) via a brute-force attack. | [] |
|
CVE-2007-5304 | Multiple cross-site scripting (XSS) vulnerabilities in ELSEIF CMS Beta 0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) repertimage parameter to utilisateurs/vousetesbannis.php, the (2) elseifvotetxtresultatduvote parameter to utilisateurs/votesresultats.php, and the (3) elseifforumtxtmenugeneraleduforum parameter to moduleajouter/depot/adminforum.php. | [
"cpe:2.3:a:yannick_tanguy:else_if_cms:0.6-beta:*:*:*:*:*:*:*"
] |
|
GHSA-7qf4-c29g-g9jg | The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context. | [] |
|
GHSA-33cw-2rgg-pqmh | SQL injection vulnerability in intouch.lib.php in inTouch 0.5.1 Alpha allows remote attackers to execute arbitrary SQL commands via the user parameter. | [] |
|
GHSA-r9pr-hcq4-m3jp | Untrusted search path vulnerability in the HGFS (aka Shared Folders) feature in VMware Tools 10.0.5 in VMware ESXi 5.0 through 6.0, VMware Workstation Pro 12.1.x before 12.1.1, VMware Workstation Player 12.1.x before 12.1.1, and VMware Fusion 8.1.x before 8.1.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory. | [] |
|
GHSA-44fv-7q57-6rj5 | OX App Suite through 7.10.4 allows XSS via an inline image with a crafted filename. | [] |
|
CVE-2019-13208 | WavesSysSvc in Waves MAXX Audio allows privilege escalation because the General registry key has Full Control access for the Users group, leading to DLL side loading. This affects WavesSysSvc64.exe 1.9.29.0. | [
"cpe:2.3:a:maxx:waves_maxx_audio:1.9.29.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-46070 | A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service Requests Section in login panel. | [
"cpe:2.3:a:vehicle_service_management_system_project:vehicle_service_management_system:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-20458 | Cisco ATA 190 Series Analog Telephone Adapter Software Vulnerabilities | A vulnerability in the web-based management interface of Cisco ATA 190 Series Analog Telephone Adapter firmware could allow an unauthenticated, remote attacker to view or delete the configuration or change the firmware on an affected device.
This vulnerability is due to a lack of authentication on specific HTTP endpoints. An attacker could exploit this vulnerability by browsing to a specific URL. A successful exploit could allow the attacker to view or delete the configuration or change the firmware. | [
"cpe:2.3:o:cisco:ata_190_firmware:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.1.0_msr4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.2.2_msr1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:11.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1_sr5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_190_firmware:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ata_191_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ata_191:-:*:*:*:on-premises:*:*:*",
"cpe:2.3:h:cisco:ata_191:-:*:*:*:multiplatform:*:*:*",
"cpe:2.3:o:cisco:ata_192_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ata_192:-:*:*:*:multiplatform:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.