id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
GHSA-3c4f-jhr6-22q6
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 7.1 through 7.1.1.8, and Maximo Asset Management 7.1 through 7.1.1.8 and 7.2 for Tivoli IT Asset Management for IT and certain other products, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-0104, CVE-2015-0107, and CVE-2015-0108.
[]
CVE-2025-6210
Hardlink-Based Path Traversal in run-llama/llama_index
A vulnerability in the ObsidianReader class of the run-llama/llama_index repository, specifically in version 0.12.27, allows for hardlink-based path traversal. This flaw permits attackers to bypass path restrictions and access sensitive system files, such as /etc/passwd, by exploiting hardlinks. The vulnerability arises from inadequate handling of hardlinks in the load_data() method, where the security checks fail to differentiate between real files and hardlinks. This issue is resolved in version 0.5.2.
[]
GHSA-4rc5-7v2h-gq36
Password reset tokens are generated using an insecure source of randomness. Attackers who know the username of the Journyx installation user can bruteforce the password reset and change the administrator password.
[]
CVE-2008-6248
Cross-site scripting (XSS) vulnerability in all.php in Galatolo WebManager 1.3a and earlier allows remote attackers to inject arbitrary web script or HTML via the tag parameter.
[ "cpe:2.3:a:galatolo:galatolo_webmanager:1.3a:*:*:*:*:*:*:*" ]
GHSA-p9f7-3xg3-4mr6
Server-Side Request Forgery (SSRF) vulnerability in Iulia Cazan Easy Replace Image allows Server Side Request Forgery. This issue affects Easy Replace Image: from n/a through 3.5.0.
[]
GHSA-qfjv-m3mh-pmwp
The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability."
[]
CVE-2023-6387
Incorrect buffer parsing in Bluetooth LE sample code may lead to buffer overflow
A potential buffer overflow exists in the Bluetooth LE HCI CPC sample application in the Gecko SDK which may result in a denial of service or remote code execution
[ "cpe:2.3:a:silabs:gecko_software_development_kit:*:*:*:*:*:*:*:*" ]
GHSA-wv4h-rrpm-qxq9
MyBB (MyBulletinBoard) 1.1.0 does not set the constant KILL_GLOBAL variable in (1) global.php and (2) inc/init.php, which allows remote attackers to initialize arbitrary variables that are processed by an @extract command, which could then be leveraged to conduct cross-site scripting (XSS) or SQL injection attacks.
[]
CVE-2024-34616
Improper handling of insufficient permission in KnoxDualDARPolicy prior to SMR Aug-2024 Release 1 allows local attackers to access sensitive data.
[ "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*" ]
GHSA-4x5q-5p8j-63qv
Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
CVE-2013-1091
Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.74:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.78:*:*:*:*:*:*:*", "cpe:2.3:a:novell:iprint:5.82:*:*:*:*:*:*:*" ]
CVE-2008-4879
SQL injection vulnerability in prod.php in Maran PHP Shop allows remote attackers to execute arbitrary SQL commands via the cat parameter, a different vector than CVE-2008-4880.
[ "cpe:2.3:a:maran:php_shop:*:*:*:*:*:*:*:*" ]
GHSA-7cxw-p58p-m7w4
User ID references at mentions in document comments were not correctly sanitized. Script code could be injected to a users session when working with a malicious document. Please deploy the provided updates and patch releases. User-defined content like comments and mentions are now filtered to avoid potentially malicious content. No publicly available exploits are known.
[]
GHSA-57q8-q6rw-6f83
Google Chrome before 6.0.472.53 does not properly restrict copying to the clipboard, which has unspecified impact and attack vectors.
[]
GHSA-x6g6-rcq8-4hmf
Use after free in Blink in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
[]
CVE-2023-4969
GPU kernel implementations susceptible to memory leak
A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.
[ "cpe:2.3:a:khronos:opencl:*:*:*:*:*:*:*:*", "cpe:2.3:a:khronos:vulkan:*:*:*:*:*:*:*:*", "cpe:2.3:a:imaginationtech:ddk:*:*:*:*:*:*:*:*", "cpe:2.3:o:amd:instinct_mi300x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:instinct_mi300x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:instinct_mi300a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:instinct_mi300a:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:instinct_mi250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:instinct_mi250:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:instinct_mi210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:instinct_mi210:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:instinct_mi100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:instinct_mi100:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_instinct_mi50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_instinct_mi50:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_instinct_mi25_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_instinct_mi25:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_v620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_v620:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_v520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_v520:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w7600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w7500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w6400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w6500m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w6300m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w5700x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w5500x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7900xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7800xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7700xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7600xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_6950xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6950xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_6900xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6900xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_6800xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_6800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5300m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5300xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5500m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5500xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5600m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5600xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5700m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5700xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7945hx3d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7945hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7845hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7745hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7645hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7940h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_pro_7945hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7945hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7840h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_pro_7840u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7840u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7640h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_7640u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_7640u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_7545u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_7545u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_7540u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_7540u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_7440u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600gt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600gt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5500gt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5500gt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7736u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7735u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7535u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_7335u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7520u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_7320u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_6800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_6800u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_6600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_6600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_4900hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4800hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4980u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4680u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7950x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7700x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7600x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7500f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_3000g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*" ]
GHSA-mwrg-g727-8qpv
Vulnerability in the Oracle Enterprise Command Center Framework product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are ECC:11-13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Command Center Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Command Center Framework accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
[]
GHSA-hg75-2frp-v4c6
Memory corruption while invoking IOCTL calls from userspace to camera kernel driver to dump request information.
[]
CVE-2019-5640
Rapid7 Nexpose Information Disclosure after logout
Rapid7 Nexpose versions prior to 6.6.114 suffer from an information exposure issue whereby, when the user's session has ended due to inactivity, an attacker can use the inspect element browser feature to remove the login panel and view the details available in the last webpage visited by previous user
[ "cpe:2.3:a:rapid7:nexpose:*:*:*:*:*:*:*:*" ]
GHSA-87rq-q3hc-xxgf
Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Java Server Faces). The supported version that is affected is 3.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GlassFish Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GlassFish Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
[]
CVE-2015-2914
Securifi Almond devices with firmware before AL1-R201EXP10-L304-W34 and Almond-2015 devices with firmware before AL2-R088M use a fixed source-port number in outbound DNS queries performed on behalf of any device, which makes it easier for remote attackers to spoof responses by using this number for the destination port, a different vulnerability than CVE-2015-7296.
[ "cpe:2.3:o:securifi:almond_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:securifi:almond:*:*:*:*:*:*:*:*", "cpe:2.3:o:securifi:almond-2015_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:securifi:almond-2015:*:*:*:*:*:*:*:*" ]
CVE-2014-5190
Cross-site scripting (XSS) vulnerability in captcha-secureimage/test/index.php in the SI CAPTCHA Anti-Spam plugin 2.7.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
[ "cpe:2.3:a:si_captcha_anti-spam_project:si_captcha_anti-spam:2.7.4:*:*:*:*:*:*:*" ]
CVE-2018-18561
An issue was discovered in Roche Accu-Chek Inform II Base Unit / Base Unit Hub before 03.01.04 and CoaguChek / cobas h232 Handheld Base Unit before 03.01.04. Insecure permissions in a service interface may allow authenticated attackers in the adjacent network to execute arbitrary commands on the operating system.
[ "cpe:2.3:o:roche:accu-chek_inform_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:roche:accu-chek_inform_ii:-:*:*:*:*:*:*:*", "cpe:2.3:o:roche:cobas_h_232_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:roche:cobas_h_232:-:*:*:*:*:*:*:*", "cpe:2.3:o:roche:coaguchek_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:roche:coaguchek:-:*:*:*:*:*:*:*", "cpe:2.3:o:roche:base_unit_hub_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:roche:base_unit_hub:-:*:*:*:*:*:*:*" ]
CVE-2022-35171
When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
GHSA-pfwc-4frf-4gf8
Cross-site scripting in Liferay Portal
Cross-site scripting (XSS) vulnerability in Layout module in Liferay Portal 7.3.4 through 7.4.3.68, and Liferay DXP 7.3 before update 24, and 7.4 before update 69 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a container type layout fragment's `URL` text field.
[]
CVE-2017-15048
Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.
[ "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*" ]
GHSA-3j3g-6r9w-9pc8
In the Linux kernel, the following vulnerability has been resolved:misc: fastrpc: Fix use-after-free race condition for mapsIt is possible that in between calling fastrpc_map_get() until map->fl->lock is taken in fastrpc_free_map(), another thread can call fastrpc_map_lookup() and get a reference to a map that is about to be deleted.Rewrite fastrpc_map_get() to only increase the reference count of a map if it's non-zero. Propagate this to callers so they can know if a map is about to be deleted.Fixes this warning: refcount_t: addition on 0; use-after-free. WARNING: CPU: 5 PID: 10100 at lib/refcount.c:25 refcount_warn_saturate ... Call trace: refcount_warn_saturate [fastrpc_map_get inlined] [fastrpc_map_lookup inlined] fastrpc_map_create fastrpc_internal_invoke fastrpc_device_ioctl __arm64_sys_ioctl invoke_syscall
[]
GHSA-397r-7mqg-j52j
Lotus Domino HTTP server does not properly disable anonymous access for the cgi-bin directory.
[]
GHSA-gc3j-vvwf-4rp8
Resque vulnerable to reflected XSS in resque-web failed and queues lists
ImpactThe following paths in resque-web have been found to be vulnerable to reflected XSS:Patchesv2.2.1WorkaroundsNo known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.Referenceshttps://github.com/resque/resque/pull/1790
[]
CVE-2024-51447
A vulnerability has been identified in Polarion V2310 (All versions), Polarion V2404 (All versions < V2404.2). The login implementation of the affected application contains an observable response discrepancy vulnerability when validating usernames. This could allow an unauthenticated remote attacker to distinguish between valid and invalid usernames.
[]
GHSA-wpcm-754j-j834
A vulnerability classified as critical was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=delete_img of the component Image Handler. The manipulation of the argument path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225343.
[]
CVE-2024-9781
Improper Handling of Missing Values in Wireshark
AppleTalk and RELOAD Framing dissector crash in Wireshark 4.4.0 and 4.2.0 to 4.2.7 allows denial of service via packet injection or crafted capture file
[ "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:4.4.0:*:*:*:*:*:*:*" ]
GHSA-jh82-c5jw-pxpc
Denial of Service in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/).Vulnerability ID: OTF-012Vulnerability type: Denial of ServiceThreat level: ModerateDescription:The receive mode limits concurrent uploads to 100 per second and blocks other uploads in the same second, which can be triggered by a simple script.Technical description:The following script uses GNU parallel and curl with around 6000 requests in parallel to send 10000 requests. A change in the `ulimit -n` configuration is required for it to work. This is sufficient to block file upload on a (public) receive instance.Attack duration was around 80 seconds.Cases where over 99 requests were sent per second:Cases where files were successfully written to disk:This means that during the attack time 1601 requests of 10000 were dropped. We tried to upload multiple files in the web interface during the attack and were not successful.The failsafe is used to prevent creating more than 100 directories per second:https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/cli/onionshare_cli/web/receive_mode.py#L386-L427The limit of 100 requests/second is significantly lower than the possible network bandwidth and greatly reduces the attack complexity for denial of service. Our test was conducted over the tor network, which showed no limitation for the required bandwidth.Impact:An adversary with access to the receive mode can block file upload for others. There is no way to block this attack in public mode due to the anonymity properties of the tor network.Recommendation:Remove this limitation, orDerive directory name from milliseconds
[]
CVE-2009-1692
WebKit before r41741, as used in Apple iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Safari, and other software, allows remote attackers to cause a denial of service (memory consumption or device reset) via a web page containing an HTMLSelectElement object with a large length attribute, related to the length property of a Select object.
[ "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" ]
CVE-2023-45321
The Android Client application, when enrolled with the define method 1 (the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable by the user. Due to the lack of encryption of HTTP,this issue allows an attacker placed in the same subnet network of the HMI device to intercept username and password necessary to authenticate to the MQTT server responsible to implement the remote management protocol.
[ "cpe:2.3:h:boschrexroth:ctrlx_hmi_web_panel_wr2107:-:*:*:*:*:*:*:*", "cpe:2.3:o:boschrexroth:ctrlx_hmi_web_panel_wr2107_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:boschrexroth:ctrlx_hmi_web_panel_wr2110_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:boschrexroth:ctrlx_hmi_web_panel_wr2110:-:*:*:*:*:*:*:*", "cpe:2.3:o:boschrexroth:ctrlx_hmi_web_panel_wr2115_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:boschrexroth:ctrlx_hmi_web_panel_wr2115:-:*:*:*:*:*:*:*" ]
CVE-2022-24028
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the libcommonprod.so binary.
[ "cpe:2.3:o:tcl:linkhub_mesh_wifi_ac1200:ms1g_00_01.00_14:*:*:*:*:*:*:*", "cpe:2.3:h:tcl:linkhub_mesh_wifi_ac1200:-:*:*:*:*:*:*:*" ]
CVE-2023-5423
SourceCodester Online Pizza Ordering System sql injection
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=confirm_order. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-241384.
[ "cpe:2.3:a:oretnom23:online_pizza_ordering_system:1.0:*:*:*:*:*:*:*" ]
CVE-2020-4547
IBM Jazz Foundation products could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 183315.
[ "cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_insights:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_lifecycle_management:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_requirements_management_doors_next:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_requirements_management_doors_next:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:global_configuration_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_model_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_model_manager:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_model_manager:7.0:*:*:*:*:*:*:*" ]
CVE-2012-0669
Buffer overflow in Apple QuickTime before 7.7.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with Sorenson encoding.
[ "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.60.92.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.62.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.64.17.73:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.65.17.80:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.66.71.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.67.75.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.68.75.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:quicktime:7.69.80.9:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
GHSA-2qhj-xvhg-5rmf
Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2024-32947
WordPress WP ADA Compliance Check Basic plugin <= 3.1.3 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in AlumniOnline Web Services LLC WP ADA Compliance Check Basic.This issue affects WP ADA Compliance Check Basic: from n/a through 3.1.3.
[]
CVE-2021-3958
SQL Injection Vulnerability in Ipack SCADA Software
Improper Handling of Parameters vulnerability in Ipack Automation Systems Ipack SCADA Software allows : Blind SQL Injection.This issue affects Ipack SCADA Software: from unspecified before 1.1.0.
[ "cpe:2.3:a:ipack:scada_automation:*:*:*:*:*:*:*:*" ]
GHSA-vwpc-3fpv-xgxg
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
[]
CVE-2023-1956
SourceCodester Online Computer and Laptop Store Image path traversal
A vulnerability classified as critical was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=delete_img of the component Image Handler. The manipulation of the argument path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225343.
[ "cpe:2.3:a:oretnom23:online_computer_and_laptop_store:1.0:*:*:*:*:*:*:*" ]
CVE-2012-1658
Cross-site scripting (XSS) vulnerability in the Read More Link module 6.x-3.x before 6.x-3.1 for Drupal allows remote authenticated users with the access administration pages permission to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:fourkitchens:ed_readmore:6.x-3.0:*:*:*:*:*:*:*", "cpe:2.3:a:fourkitchens:ed_readmore:6.x-3.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
GHSA-6g7c-jv9q-8ph3
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2024-42104
nilfs2: add missing check for inode numbers on directory entries
In the Linux kernel, the following vulnerability has been resolved: nilfs2: add missing check for inode numbers on directory entries Syzbot reported that mounting and unmounting a specific pattern of corrupted nilfs2 filesystem images causes a use-after-free of metadata file inodes, which triggers a kernel bug in lru_add_fn(). As Jan Kara pointed out, this is because the link count of a metadata file gets corrupted to 0, and nilfs_evict_inode(), which is called from iput(), tries to delete that inode (ifile inode in this case). The inconsistency occurs because directories containing the inode numbers of these metadata files that should not be visible in the namespace are read without checking. Fix this issue by treating the inode numbers of these internal files as errors in the sanity check helper when reading directory folios/pages. Also thanks to Hillf Danton and Matthew Wilcox for their initial mm-layer analysis.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-98gp-w8mx-vgw9
In the Linux kernel, the following vulnerability has been resolved:LoongArch: Set all reserved memblocks on Node#0 at initializationAfter commit 61167ad5fecdea ("mm: pass nid to reserve_bootmem_region()") we get a panic if DEFERRED_STRUCT_PAGE_INIT is enabled:[ 0.000000] CPU 0 Unable to handle kernel paging request at virtual address 0000000000002b82, era == 90000000040e3f28, ra == 90000000040e3f18 [ 0.000000] Oops[#1]: [ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.5.0+ #733 [ 0.000000] pc 90000000040e3f28 ra 90000000040e3f18 tp 90000000046f4000 sp 90000000046f7c90 [ 0.000000] a0 0000000000000001 a1 0000000000200000 a2 0000000000000040 a3 90000000046f7ca0 [ 0.000000] a4 90000000046f7ca4 a5 0000000000000000 a6 90000000046f7c38 a7 0000000000000000 [ 0.000000] t0 0000000000000002 t1 9000000004b00ac8 t2 90000000040e3f18 t3 90000000040f0800 [ 0.000000] t4 00000000000f0000 t5 80000000ffffe07e t6 0000000000000003 t7 900000047fff5e20 [ 0.000000] t8 aaaaaaaaaaaaaaab u0 0000000000000018 s9 0000000000000000 s0 fffffefffe000000 [ 0.000000] s1 0000000000000000 s2 0000000000000080 s3 0000000000000040 s4 0000000000000000 [ 0.000000] s5 0000000000000000 s6 fffffefffe000000 s7 900000000470b740 s8 9000000004ad4000 [ 0.000000] ra: 90000000040e3f18 reserve_bootmem_region+0xec/0x21c [ 0.000000] ERA: 90000000040e3f28 reserve_bootmem_region+0xfc/0x21c [ 0.000000] CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE) [ 0.000000] PRMD: 00000000 (PPLV0 -PIE -PWE) [ 0.000000] EUEN: 00000000 (-FPE -SXE -ASXE -BTE) [ 0.000000] ECFG: 00070800 (LIE=11 VS=7) [ 0.000000] ESTAT: 00010800 [PIL] (IS=11 ECode=1 EsubCode=0) [ 0.000000] BADV: 0000000000002b82 [ 0.000000] PRID: 0014d000 (Loongson-64bit, Loongson-3A6000) [ 0.000000] Modules linked in: [ 0.000000] Process swapper (pid: 0, threadinfo=(____ptrval____), task=(____ptrval____)) [ 0.000000] Stack : 0000000000000000 9000000002eb5430 0000003a00000020 90000000045ccd00 [ 0.000000] 900000000470e000 90000000002c1918 0000000000000000 9000000004110780 [ 0.000000] 00000000fe6c0000 0000000480000000 9000000004b4e368 9000000004110748 [ 0.000000] 0000000000000000 900000000421ca84 9000000004620000 9000000004564970 [ 0.000000] 90000000046f7d78 9000000002cc9f70 90000000002c1918 900000000470e000 [ 0.000000] 9000000004564970 90000000040bc0e0 90000000046f7d78 0000000000000000 [ 0.000000] 0000000000004000 90000000045ccd00 0000000000000000 90000000002c1918 [ 0.000000] 90000000002c1900 900000000470b700 9000000004b4df78 9000000004620000 [ 0.000000] 90000000046200a8 90000000046200a8 0000000000000000 9000000004218b2c [ 0.000000] 9000000004270008 0000000000000001 0000000000000000 90000000045ccd00 [ 0.000000] ... [ 0.000000] Call Trace: [ 0.000000] [<90000000040e3f28>] reserve_bootmem_region+0xfc/0x21c [ 0.000000] [<900000000421ca84>] memblock_free_all+0x114/0x350 [ 0.000000] [<9000000004218b2c>] mm_core_init+0x138/0x3cc [ 0.000000] [<9000000004200e38>] start_kernel+0x488/0x7a4 [ 0.000000] [<90000000040df0d8>] kernel_entry+0xd8/0xdc [ 0.000000] [ 0.000000] Code: 02eb21ad 00410f4c 380c31ac <262b818d> 6800b70d 02c1c196 0015001c 57fe4bb1 260002cdThe reason is early memblock_reserve() in memblock_init() set node id to MAX_NUMNODES, making NODE_DATA(nid) a NULL dereference in the call chain reserve_bootmem_region() -> init_reserved_page(). After memblock_init(), those late calls of memblock_reserve() operate on subregions of memblock .memory regions. As a result, these reserved regions will be set to the correct node at the first iteration of memmap_init_reserved_pages().So set all reserved memblocks on Node#0 at initialization can avoid this panic.
[]
GHSA-hw4f-rwcw-rpqj
Prevx Prevx1 2, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
[]
CVE-2019-0152
Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*" ]
CVE-2014-5809
The Smart Browser (aka smartbrowser.geniuscloud) application 2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:geniuscloud:smart_browser:2.0:*:*:*:*:android:*:*" ]
GHSA-j923-xmpp-p4g8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
[]
CVE-2023-22076
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Personalization). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:e-business_suite:*:*:*:*:*:*:*:*" ]
GHSA-g897-v7rw-6gvc
Buffer overflow in the Steema TeeChart ActiveX control, as used in Schneider Electric Vijeo Historian 4.30 and earlier, CitectHistorian 4.30 and earlier, and CitectSCADAReports 4.10 and earlier, allows remote attackers to cause a denial of service via unspecified vectors.
[]
GHSA-chhg-p6wv-vx5r
Multiple cross-site scripting (XSS) vulnerabilities in Maian Music 1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) keywords parameter in a search action to index.php, and the (2) msg_script parameter to admin/inc/footer.php.
[]
CVE-2020-13095
Little Snitch version 4.5.1 and older changed ownership of a directory path controlled by the user. This allowed the user to escalate to root by linking the path to a directory containing code executed by root.
[ "cpe:2.3:a:obdev:little_snitch:*:*:*:*:*:*:*:*" ]
CVE-2025-5244
GNU Binutils ld elflink.c elf_gc_sweep memory corruption
A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.45 is able to address this issue. It is recommended to upgrade the affected component.
[]
CVE-2025-22786
WordPress ElementInvader Addons for Elementor plugin <= 1.2.6 - Local File Inclusion vulnerability
Path Traversal vulnerability in ElementInvader ElementInvader Addons for Elementor allows PHP Local File Inclusion.This issue affects ElementInvader Addons for Elementor: from n/a through 1.2.6.
[]
GHSA-ff6q-8852-cwpp
Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an attacker to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more information about these vulnerabilities, see the Details section of this advisory.
[]
CVE-2023-28203
The issue was addressed with improved checks. This issue is fixed in Apple Music 4.2.0 for Android. An app may be able to access contacts.
[ "cpe:2.3:a:apple:music:*:*:*:*:*:android:*:*" ]
CVE-2015-1188
The certificate verification functions in the HNDS service in Swisscom Centro Grande (ADB) DSL routers with firmware before 6.14.00 allows remote attackers to access the management functions via unknown vectors.
[ "cpe:2.3:o:swisscom:centro_grande_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:swisscom:centro_grande:-:*:*:*:*:*:*:*" ]
GHSA-w5hm-7wh2-cc9c
An issue was discovered in libiff through 20190123. A global-buffer-overflow exists in the function IFF_errorId located in error.c. It allows an attacker to cause code Execution.
[]
GHSA-8hp8-42cx-5q42
A remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template.
[]
CVE-2022-27212
Jenkins List Git Branches Parameter Plugin 0.0.9 and earlier does not escape the name of the 'List Git branches (and more)' parameter, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[ "cpe:2.3:a:jenkins:list_git_branches_parameter:*:*:*:*:*:jenkins:*:*" ]
CVE-2013-0841
Array index error in the content-blocking functionality in Google Chrome before 24.0.1312.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1272.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1272.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1273.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1274.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1275.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1276.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1276.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1277.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1278.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1279.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1280.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1281.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1282.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1283.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1284.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1285.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1286.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1286.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1287.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1287.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1288.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1288.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1289.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1289.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1290.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1291.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1292.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1293.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1294.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1295.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1296.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1297.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1298.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1299.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1300.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1301.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1301.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1302.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1303.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1304.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1304.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1305.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1306.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1306.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1307.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1307.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1308.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1309.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1310.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1311.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1311.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:24.0.1312.54:*:*:*:*:*:*:*" ]
CVE-2010-4159
Untrusted search path vulnerability in metadata/loader.c in Mono 2.8 and earlier allows local users to gain privileges via a Trojan horse shared library in the current working directory.
[ "cpe:2.3:a:mono:mono:*:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.12:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.13.4:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.13.5:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.13.6:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.13.7:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.13.8:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.13.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.14:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.15:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.9:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:1.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:mono:mono:2.6.4:*:*:*:*:*:*:*" ]
GHSA-grj4-g57c-9xmv
Moodle Bypass email verification secret when confirming account registration
When creating a user account, it was possible to verify the account without having access to the verification email link/secret in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
[]
CVE-2006-0496
Cross-site scripting (XSS) vulnerability in Mozilla 1.7.12 and possibly earlier, Mozilla Firefox 1.0.7 and possibly earlier, and Netscape 8.1 and possibly earlier, allows remote attackers to inject arbitrary web script or HTML via the -moz-binding (Cascading Style Sheets) CSS property, which does not require that the style sheet have the same origin as the web page, as demonstrated by the compromise of a large number of LiveJournal accounts.
[ "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7:alpha:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:mozilla:1.7.12:*:*:*:*:*:*:*" ]
CVE-2022-22851
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the specialization parameter in doctors.php
[ "cpe:2.3:a:hospital\\'s_patient_records_management_system_project:hospital\\'s_patient_records_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-9275-c4xq-9m4g
Vulnerability in the Oracle E-Business Intelligence product of Oracle E-Business Suite (component: DBI Setups). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle E-Business Intelligence. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle E-Business Intelligence, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle E-Business Intelligence accessible data as well as unauthorized update, insert or delete access to some of Oracle E-Business Intelligence accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
GHSA-h536-vfr2-h6pw
An issue was discovered in Exiv2 0.27. There is infinite recursion at BigTiffImage::printIFD in the file bigtiffimage.cpp. This can be triggered by a crafted file. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
[]
CVE-2006-1904
Cross-site scripting (XSS) vulnerability in index.php in AnimeGenesis Gallery allows remote attackers to inject arbitrary web script or HTML via the cat parameter.
[ "cpe:2.3:a:animegenesis:gallery:*:*:*:*:*:*:*:*" ]
CVE-2020-4729
IBM Safer Payments denial of service
IBM Counter Fraud Management for Safer Payments 5.7.0.00 through 5.7.0.10, 6.0.0.00 through 6.0.0.07, 6.1.0.00 through 6.1.0.05, and 6.2.0.00 through 6.2.1.00 could allow an authenticated attacker under special circumstances to send multiple specially crafted API requests that could cause the application to crash. IBM X-Force ID: 188052.
[ "cpe:2.3:a:ibm:safer_payments:*:*:*:*:*:*:*:*" ]
CVE-2022-3321
Lock WARP switch feature bypass on WARP mobile client for iOS
It was possible to bypass Lock WARP switch feature https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/warp-settings/#lock-warp-switch  on the WARP iOS mobile client by enabling both "Disable for cellular networks" and "Disable for Wi-Fi networks" switches at once in the application settings. Such configuration caused the WARP client to disconnect and allowed the user to bypass restrictions and policies enforced by the Zero Trust platform.
[ "cpe:2.3:a:cloudflare:warp_mobile_client:*:*:*:*:*:iphone_os:*:*" ]
GHSA-rpjx-3g4c-xqfh
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with Administrator privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as a low-privileged user to execute the affected commands. A successful exploit could allow the attacker to execute commands with Administrator privileges.
[]
CVE-2021-1065
NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which input data is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
[ "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*", "cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*" ]
GHSA-fg86-xg34-2fr5
Windows Network Load Balancing Remote Code Execution Vulnerability
[]
GHSA-xm9j-3ggw-w823
IBM AIX 5.3, 6.1, 7.1, and 7.2 contains a vulnerability in the rmsock command that may be used to expose kernel memory. IBM X-Force ID: 144748.
[]
CVE-2011-2486
nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.
[ "cpe:2.3:a:nspluginwrapper:nspluginwrapper:1.4.2:*:*:*:*:*:*:*" ]
CVE-2023-27308
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows before version 88 may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*" ]
CVE-2018-9312
The Head Unit HU_NBT (aka Infotainment) component on BMW i Series, BMW X Series, BMW 3 Series, BMW 5 Series, and BMW 7 Series vehicles produced in 2012 through 2018 allows a local attack when a USB device is plugged in.
[ "cpe:2.3:o:bmw:head_unit_hu_nbt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:bmw:head_unit_hu_nbt:-:*:*:*:*:*:*:*" ]
CVE-2017-1000122
The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate certain message metadata, allowing a compromised secondary process to cause a denial of service (release assertion) of the UI process. This vulnerability does not affect Apple products.
[ "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*" ]
CVE-2023-49839
Reflected Cross-Site Scripting vulnerability in multiple WordPress components by KlbTheme
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in KlbTheme Cosmetsy theme (core plugin), KlbTheme Partdo theme (core plugin), KlbTheme Bacola theme (core plugin), KlbTheme Medibazar theme (core plugin), KlbTheme Furnob theme (core plugin), KlbTheme Clotya theme (core plugin) allows Reflected XSS.This issue affects Cosmetsy theme (core plugin): from n/a through 1.3.0; Partdo theme (core plugin): from n/a through 1.0.9; Bacola theme (core plugin): from n/a through 1.3.3; Medibazar theme (core plugin): from n/a through 1.2.3; Furnob theme (core plugin): from n/a through 1.1.7; Clotya theme (core plugin): from n/a through 1.1.5.
[]
CVE-2020-7995
The htdocs/index.php?mainmenu=home login page in Dolibarr 10.0.6 allows an unlimited rate of failed authentication attempts.
[ "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:10.0.6:*:*:*:*:*:*:*" ]
GHSA-f4x7-2w77-444m
Cross-site scripting (XSS) vulnerability in the view_queryform function in lib/viewvc.py in ViewVC before 1.0.10, and 1.1.x before 1.1.4, allows remote attackers to inject arbitrary web script or HTML via "user-provided input."
[]
GHSA-j34m-g9vq-47p3
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists in Certificates page on Webserver that could cause an unvalidated data injected by authenticated malicious user leading to modify or read data in a victim’s browser.
[]
CVE-2024-45960
Zenario 9.7.61188 allows authenticated admin users to upload PDF files containing malicious code into the target system. If the PDF file is accessed through the website, it can trigger a Cross Site Scripting (XSS) attack.
[ "cpe:2.3:a:tribalsystems:zenario:9.7.61188:*:*:*:*:*:*:*" ]
CVE-2011-4408
The Single Sign On Client (ubuntu-sso-client) for Ubuntu 11.04 and 11.10 does not properly validate SSL certificates when using HTTPS, which allows remote attackers to spoof a server and modify or read sensitive data via a man-in-the-middle (MITM) attack.
[ "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" ]
CVE-2024-51074
Incorrect access control in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to arbitrarily change odometer readings in the vehicle by targeting the instrument cluster through the unsecured CAN network. NOTE: this is disputed by the supplier because the CAN bus is not externally exposed, and because the packets can only increase the odometer reading (which typically has no value to an adversary). Also, this is disputed by the Supplier because the findings came from a potentially unrealistic test environment (an isolated ECU part that was not in a vehicle), and because the observed behavior follows the UDS (Unified Diagnostic Services) specification.
[]
CVE-2017-2940
Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability when processing JPEG 2000 files. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
GHSA-64r4-fw2x-4244
ROADS search.pl program allows remote attackers to read arbitrary files by specifying the file name in the form parameter and terminating the filename with a null byte.
[]
CVE-2018-25105
File Manager <= 3.0 - Unauthenticated Arbitrary File Upload/Download
The File Manager plugin for WordPress is vulnerable to authorization bypass due to a missing capability check in the /inc/root.php file in versions up to, and including, 3.0. This makes it possible for unauthenticated attackers to download arbitrary files from the server and upload arbitrary files that can be used for remote code execution.
[ "cpe:2.3:a:mndpsingh287:file_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:*:wordpress:*:*" ]
CVE-2022-20513
In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-244569759
[ "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
GHSA-hp26-q6wq-vrfp
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute vulnerability in Johnson Controls System Configuration Tool (SCT) version 14 prior to 14.2.3 and version 15 prior to 15.0.3 could allow access to the cookie.
[]
CVE-2025-28998
WordPress SERPed.net plugin <= 4.6 - Local File Inclusion Vulnerability
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in serpednet SERPed.net allows PHP Local File Inclusion. This issue affects SERPed.net: from n/a through 4.6.
[]
GHSA-xpff-c35g-j3cr
silverstripe/framework Privilege Escalation Risk in Member Edit form
A member with the permission `EDIT_PERMISSIONS` and access to the "Security" section is able to re-assign themselves (or another member) to `ADMIN` level.CMS Fields for the member are constructed using DirectGroups instead of Groups relation which results in bypassing security logic preventing privilege escalation.
[]
GHSA-436p-pp82-ppwq
xfpt versions prior to 1.01 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment.
[]
GHSA-6228-hc88-4m3g
The JNLPClassLoader class in IcedTea-Web before 1.0.1, as used in OpenJDK Runtime Environment 1.6.0, allows remote attackers to gain privileges via unknown vectors related to multiple signers and the assignment of "an inappropriate security descriptor."
[]
GHSA-33rg-rm58-mc58
Missing Authorization vulnerability in Code4Life Database for CF7 allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Database for CF7: from n/a through 1.2.4.
[]
CVE-2014-6317
Array index error in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to cause a denial of service (reboot) via a crafted TrueType font, aka "Denial of Service in Windows Kernel Mode Driver Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]