id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-jrxq-f8wf-pgjr | A vulnerability was found in SourceCodester Grade Point Average GPA Calculator 1.0 and classified as problematic. Affected by this issue is the function get_scale of the file Master.php. The manipulation of the argument perc leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224672. | [] |
|
GHSA-q48q-r88f-6j34 | Unspecified vulnerability in the Oracle Internet Directory component in Oracle Database 9.2.0.8, 9.2.0.8, and DV; and Oracle Fusion Middleware 10.1.2.3 and 10.1.4.0.1; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. | [] |
|
CVE-2024-47412 | Animate | Use After Free (CWE-416) | Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2013-4221 | The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources using the Java XMLDecoder, which allows remote attackers to execute arbitrary Java code via crafted XML. | [
"cpe:2.3:a:restlet:restlet:*:*:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone1:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone4:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone5:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:milestone6:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc4:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc5:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1:rc6:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:restlet:restlet:2.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2022-49236 | bpf: Fix UAF due to race between btf_try_get_module and load_module | In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix UAF due to race between btf_try_get_module and load_module
While working on code to populate kfunc BTF ID sets for module BTF from
its initcall, I noticed that by the time the initcall is invoked, the
module BTF can already be seen by userspace (and the BPF verifier). The
existing btf_try_get_module calls try_module_get which only fails if
mod->state == MODULE_STATE_GOING, i.e. it can increment module reference
when module initcall is happening in parallel.
Currently, BTF parsing happens from MODULE_STATE_COMING notifier
callback. At this point, the module initcalls have not been invoked.
The notifier callback parses and prepares the module BTF, allocates an
ID, which publishes it to userspace, and then adds it to the btf_modules
list allowing the kernel to invoke btf_try_get_module for the BTF.
However, at this point, the module has not been fully initialized (i.e.
its initcalls have not finished). The code in module.c can still fail
and free the module, without caring for other users. However, nothing
stops btf_try_get_module from succeeding between the state transition
from MODULE_STATE_COMING to MODULE_STATE_LIVE.
This leads to a use-after-free issue when BPF program loads
successfully in the state transition, load_module's do_init_module call
fails and frees the module, and BPF program fd on close calls module_put
for the freed module. Future patch has test case to verify we don't
regress in this area in future.
There are multiple points after prepare_coming_module (in load_module)
where failure can occur and module loading can return error. We
illustrate and test for the race using the last point where it can
practically occur (in module __init function).
An illustration of the race:
CPU 0 CPU 1
load_module
notifier_call(MODULE_STATE_COMING)
btf_parse_module
btf_alloc_id // Published to userspace
list_add(&btf_mod->list, btf_modules)
mod->init(...)
... ^
bpf_check |
check_pseudo_btf_id |
btf_try_get_module |
returns true | ...
... | module __init in progress
return prog_fd | ...
... V
if (ret < 0)
free_module(mod)
...
close(prog_fd)
...
bpf_prog_free_deferred
module_put(used_btf.mod) // use-after-free
We fix this issue by setting a flag BTF_MODULE_F_LIVE, from the notifier
callback when MODULE_STATE_LIVE state is reached for the module, so that
we return NULL from btf_try_get_module for modules that are not fully
formed. Since try_module_get already checks that module is not in
MODULE_STATE_GOING state, and that is the only transition a live module
can make before being removed from btf_modules list, this is enough to
close the race and prevent the bug.
A later selftest patch crafts the race condition artifically to verify
that it has been fixed, and that verifier fails to load program (with
ENXIO).
Lastly, a couple of comments:
1. Even if this race didn't exist, it seems more appropriate to only
access resources (ksyms and kfuncs) of a fully formed module which
has been initialized completely.
2. This patch was born out of need for synchronization against module
initcall for the next patch, so it is needed for correctness even
without the aforementioned race condition. The BTF resources
initialized by module initcall are set up once and then only looked
up, so just waiting until the initcall has finished ensures correct
behavior. | [] |
CVE-2021-28858 | TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 does not use SSL by default. Attacker on the local network can monitor traffic and capture the cookie and other sensitive information. | [
"cpe:2.3:o:tp-link:tl-wpa4220_firmware:4.0.2:build_20180308_rel.37064:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wpa4220:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-x227-wfq2-5jxp | The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data. | [] |
|
CVE-2008-0822 | Directory traversal vulnerability in index.php in Scribe 0.2 allows remote attackers to read arbitrary local files via a .. (dot dot) in the page parameter. | [
"cpe:2.3:a:scribe:scribe:0.2:*:*:*:*:*:*:*"
] |
|
GHSA-5f29-9332-frq6 | The Pulsating Chat Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3.6. This is due to missing or incorrect nonce validation on the amin_chat_button_settings_page() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] |
|
CVE-2006-6982 | 3proxy 0.5 to 0.5.2 does not offer NTLM authentication before basic authentication, which might cause browsers with incomplete RFC2616/RFC2617 support to use basic cleartext authentication even if NTLM is available, which makes it easier for attackers to steal credentials. | [
"cpe:2.3:a:3proxy:3proxy:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:3proxy:3proxy:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:3proxy:3proxy:0.5.2:*:*:*:*:*:*:*"
] |
|
CVE-2010-3616 | ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520. | [
"cpe:2.3:a:isc:dhcp:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*"
] |
|
CVE-2017-12582 | Unprivileged user can access all functions in the Surveillance Station component in QNAP TS212P devices with firmware 4.2.1 build 20160601. Unprivileged user cannot login at front end but with that unprivileged user SID, all function can access at Surveillance Station. | [
"cpe:2.3:o:qnap:ts-212p_firmware:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:qnap:ts-212p:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-47337 | WordPress Joy Of Text Lite plugin <= 2.3.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in Stuart Wilson Joy Of Text Lite.This issue affects Joy Of Text Lite: from n/a through 2.3.1. | [] |
GHSA-2gv7-cc99-m2pr | IBM Security Verify Governance 10.0.2 Identity Manageruses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the product does not also use a salt as part of the input. | [] |
|
GHSA-9p7f-7v7j-rq7j | The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data. | [] |
|
GHSA-h5fx-pwfx-5925 | Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access. | [] |
|
CVE-2022-3566 | Linux Kernel TCP tcp_setsockopt race condition | A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability. | [
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
CVE-2017-9861 | An issue was discovered in SMA Solar Technology products. The SIP implementation does not properly use authentication with encryption: it is vulnerable to replay attacks, packet injection attacks, and man in the middle attacks. An attacker is able to successfully use SIP to communicate with the device from anywhere within the LAN. An attacker may use this to crash the device, stop it from communicating with the SMA servers, exploit known SIP vulnerabilities, or find sensitive information from the SIP communications. Furthermore, because the SIP communication channel is unencrypted, an attacker capable of understanding the protocol can eavesdrop on communications. For example, passwords can be extracted. NOTE: the vendor's position is that authentication with encryption is not required on an isolated subnetwork. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected | [
"cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-12850 | The following vulnerability applies only to the Pydio Cells Enterprise OVF version 2.0.4. Prior versions of the Pydio Cells Enterprise OVF (such as version 2.0.3) have a looser policy restriction allowing the “pydio” user to execute any privileged command using sudo. In version 2.0.4 of the appliance, the user pydio is responsible for running all the services and binaries that are contained in the Pydio Cells web application package, such as mysqld, cells, among others. This user has privileges restricted to run those services and nothing more. | [
"cpe:2.3:a:pydio:cells:2.0.4:*:*:*:enterprise:*:*:*"
] |
|
GHSA-jrp8-rcj4-qwj2 | Verydows v2.0 was discovered to contain an arbitrary file deletion vulnerability via \backend\database_controller.php. | [] |
|
CVE-2014-9474 | Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str. | [
"cpe:2.3:a:mpfr:gnu_mpfr:*:p10:*:*:*:*:*:*"
] |
|
GHSA-7c8f-c5jx-87w6 | An issue was discovered in Logitech Options. The OAuth 2.0 state parameter was not properly validated. This leaves applications vulnerable to CSRF attacks during authentication and authorization operations. | [] |
|
CVE-2024-42480 | Kamaji's RBAC Roles for `etcd` are not disjunct | Kamaji is the Hosted Control Plane Manager for Kubernetes. In versions 1.0.0 and earlier, Kamaji uses an "open at the top" range definition in RBAC for etcd roles leading to some TCPs API servers being able to read, write, and delete the data of other control planes. This vulnerability is fixed in edge-24.8.2. | [
"cpe:2.3:a:clastix:kamaji:*:*:*:*:*:*:*:*"
] |
GHSA-wvvr-qwjx-m9v3 | Cisco WebEx Meetings Server (WMS) 2.5 allows remote attackers to trigger the download of arbitrary files via a crafted URL, aka Bug ID CSCup10343. | [] |
|
GHSA-q8xv-9qcc-5wr2 | .In srtd service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges. | [] |
|
CVE-2004-2351 | Cross-site scripting (XSS) vulnerability in GBook for Php-Nuke 1.0 allows remote attackers to inject arbitrary web script or HTML via multiple parameters, including (1) name, (2) email, (3) city, and (4) message, which do not use the <script> and <style> tags, which are filtered by PHP-Nuke. | [
"cpe:2.3:a:martin_bauer:gbook:*:*:*:*:*:*:*:*",
"cpe:2.3:a:martin_bauer:gbook:1.4:*:*:*:*:*:*:*"
] |
|
GHSA-w88m-x3f4-8fp7 | A passback vulnerability which relates to production printers and office multifunction printers. | [] |
|
CVE-2023-1651 | ChatBot < 4.4.9 - Subscriber+ OpenAI Settings Update to Stored XSS | The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in the AJAX action responsible to update the OpenAI settings, allowing any authenticated users, such as subscriber to update them. Furthermore, due to the lack of escaping of the settings, this could also lead to Stored XSS | [
"cpe:2.3:a:quantumcloud:ai_chatbot:*:*:*:*:*:wordpress:*:*"
] |
GHSA-425v-6qh8-hmjx | Missing Authorization vulnerability in cedcommerce Ship Per Product allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Ship Per Product: from n/a through 2.1.0. | [] |
|
CVE-2021-29567 | Lack of validation in `SparseDenseCwiseMul` | TensorFlow is an end-to-end open source platform for machine learning. Due to lack of validation in `tf.raw_ops.SparseDenseCwiseMul`, an attacker can trigger denial of service via `CHECK`-fails or accesses to outside the bounds of heap allocated data. Since the implementation(https://github.com/tensorflow/tensorflow/blob/38178a2f7a681a7835bb0912702a134bfe3b4d84/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L68-L80) only validates the rank of the input arguments but no constraints between dimensions(https://www.tensorflow.org/api_docs/python/tf/raw_ops/SparseDenseCwiseMul), an attacker can abuse them to trigger internal `CHECK` assertions (and cause program termination, denial of service) or to write to memory outside of bounds of heap allocated tensor buffers. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] |
GHSA-wx33-9hcf-h8wc | IBM SOAR QRadar Plugin App 1.0 through 5.0.3 could allow an authenticated user to manipulate output written to log files. IBM X-Force ID: 260576. | [] |
|
GHSA-g6vq-wc8w-4g69 | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | [] |
CVE-2004-1504 | The displaycontent function in config.php for Just Another Flat file (JAF) CMS 3.0RC allows remote attackers to gain sensitive information via a blank show parameter, which reveals the installation path in an error message, as demonstrated using index.php. | [
"cpe:2.3:a:salims_softhouse:jaf_cms:3.0:rc:*:*:*:*:*:*"
] |
|
CVE-2024-31185 | NULL Pointer Dereference in libfluid_msg library | Unchecked Return Value to NULL Pointer Dereference vulnerability in Open Networking Foundation (ONF) libfluid (libfluid_msg module). This vulnerability is associated with program routine fluid_msg::of13::MeterBandList::unpack.
This issue affects libfluid: 0.1.0. | [
"cpe:2.3:a:open_networking_foundation:libfluid:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opennetworking:libfluid_msg:0.1.0:*:*:*:*:*:*:*"
] |
GHSA-5g2m-vp9w-hprq | The option-tree plugin before 2.6.0 for WordPress has XSS via an add_list_item or add_social_links AJAX request. | [] |
|
GHSA-wgjr-h635-jgcv | Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formWifiWpsStart. | [] |
|
GHSA-pxx2-jxr9-c92g | SQL Server Native Client Remote Code Execution Vulnerability | [] |
|
CVE-2023-41974 | A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-2665 | includes/specials/SpecialChangePassword.php in MediaWiki before 1.19.14, 1.20.x and 1.21.x before 1.21.8, and 1.22.x before 1.22.5 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account, as demonstrated by tracking the victim's activity, related to a "login CSRF" issue. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.19.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.20.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.21.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.22.4:*:*:*:*:*:*:*"
] |
|
GHSA-vr64-4m52-33x2 | Stack-based buffer overflow in Device Type Manager (DTM) 3.1.6 and earlier for Schneider Electric Invensys SRD Control Valve Positioner devices 960 and 991 allows local users to gain privileges via a malformed DLL file. | [] |
|
CVE-2020-12077 | The mappress-google-maps-for-wordpress plugin before 2.53.9 for WordPress does not correctly implement AJAX functions with nonces (or capability checks), leading to remote code execution. | [
"cpe:2.3:a:mappresspro:mappress:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2010-2214 | Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2216. | [
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3.9120:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_linux:10.0.15.3:*:*:*:*:*:*:*"
] |
|
GHSA-m2j3-fr23-v3jf | 3D Viewer Remote Code Execution Vulnerability | [] |
|
CVE-2024-4080 | Memory Corruption Due to Improper Length Checks in LabVIEW tdcore.dll | A memory corruption issue due to an improper length check in LabVIEW tdcore.dll may disclose information or result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions. | [
"cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ni:labview:2021:-:*:*:*:*:*:*",
"cpe:2.3:a:ni:labview:2021:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
"cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
"cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
"cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
"cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
"cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*"
] |
CVE-2020-24401 | Incorrect permissions following the deletion of a user role or deactivation of a user | Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect authorization vulnerability. A user can still access resources provisioned under their old role after an administrator removes the role or disables the user's account. | [
"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:-:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:-:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:p1:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.3.5:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:*:*:*:commerce:*:*:*",
"cpe:2.3:a:magento:magento:2.4.0:*:*:*:open_source:*:*:*"
] |
CVE-2013-1801 | The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156. | [
"cpe:2.3:a:john_nunemaker:httparty:*:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:john_nunemaker:httparty:0.8.3:*:*:*:*:*:*:*"
] |
|
CVE-2022-36867 | Improper access control vulnerability in Editor Lite prior to version 4.0.40.14 allows attackers to access sensitive information. | [
"cpe:2.3:a:samsung:editor_lite:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-0420 | Unspecified vulnerability in the Oracle Forms component in Oracle Fusion Middleware 11.1.1.7 and 11.1.2.2 allows remote attackers to affect confidentiality via unknown vectors related to Forms Services. | [
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.2.2.0:*:*:*:*:*:*:*"
] |
|
GHSA-cg3q-ffg6-3wcg | A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input, aka 'Microsoft Speech API Remote Code Execution Vulnerability'. | [] |
|
GHSA-pxhx-2v5w-x5mg | Multiple SQL injection vulnerabilities in project alumni 1.0.9 and earlier allow remote attackers to execute arbitrary SQL commands via the year parameter to (1) view.page.inc.php, which is reachable through a view action to index.php; or (2) the year parameter to news.page.inc.php, which is reachable through a news action to index.php. | [] |
|
CVE-2009-1463 | Static code injection vulnerability in razorCMS before 0.4 allows remote attackers to inject arbitrary PHP code into any page by saving content as a .php file. | [
"cpe:2.3:a:razorcms:razorcms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:razorcms:razorcms:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:razorcms:razorcms:0.3:rc2:*:*:*:*:*:*"
] |
|
CVE-2023-0091 | A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information. | [
"cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-c3pw-ww68-wpx6 | Multiple unspecified vulnerabilities in HTTP Server in Oracle Database Server 8i up to 10.1.0.4.2 and Application Server 1.0.2.2 up to 10.1.2.0 have unknown impact and attack vectors, aka Oracle Vuln# (1) DB30 and AS03 or (2) DB31 and AS05. | [] |
|
GHSA-h72g-579j-rqrx | There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization. | [] |
|
GHSA-5xr6-mfp2-pfhc | An attacker with basic privileges in SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, can get access to lcmbiar file and further decrypt the file. After this attacker can gain access to BI user’s passwords and depending on the privileges of the BI user, the attacker can perform operations that can completely compromise the application. | [] |
|
GHSA-c88m-wqpr-4q68 | Unspecified vulnerability in System Administration Manager (SAM) in EMS before A.04.20.11.04_01 on HP HP-UX B.11.11, B.11.23, and B.11.31 allows local users to gain privileges via unknown vectors. | [] |
|
CVE-2014-9697 | Huawei USG9560/9520/9580 before V300R001C01SPC300 allows remote attackers to cause a memory leak or denial of service (memory exhaustion, reboot and MPU switchover) via a crafted website. | [
"cpe:2.3:o:huawei:usg9560_firmware:v300r001c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9560_firmware:v300r001c01spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg9560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9520_firmware:v300r001c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9520_firmware:v300r001c01spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg9520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9580_firmware:v300r001c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:usg9580_firmware:v300r001c01spc100:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:usg9580:-:*:*:*:*:*:*:*"
] |
|
GHSA-jg23-5vq6-r245 | Buffer overflow in the meta_read_flac function in meta_decoder.c for Aqualung 0.9beta5 and earlier, and CVS 0.193.2 and earlier, allows user-assisted attackers to execute arbitrary code via a long Vorbis comment in a Free Lossless Audio Codec (FLAC) file. | [] |
|
CVE-2013-0926 | Google Chrome before 26.0.1410.43 does not properly handle active content in an EMBED element during a copy-and-paste operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:26.0.1410.41:*:*:*:*:*:*:*"
] |
|
CVE-2021-42309 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Microsoft SharePoint Server Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*"
] |
GHSA-w6vh-q47r-3xgq | JetBrains TeamCity before 2020.2 was vulnerable to reflected XSS on several pages. | [] |
|
GHSA-2595-5937-8f4h | Domoticz 4.10717 has XSS via item.Name. | [] |
|
GHSA-cv78-f6r2-g223 | Capturix ScanShare 1.06 build 50 stores sensitive information such as the password in cleartext in capturixss_cfg.ini, which is readable by local users. | [] |
|
CVE-2025-26056 | A command injection vulnerability exists in the Infinxt iEdge 100 2.1.32 in the Troubleshoot module "MTR" functionality. The vulnerability is due to improper validation of user-supplied input in the mtrIp parameter. An attacker can exploit this flaw to execute arbitrary operating system commands on the underlying system with the same privileges as the web application process. | [] |
|
GHSA-qvmf-36h5-3f5v | Improper Input Validation in Jenkins Script Security Plugin | Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations. | [] |
CVE-2007-3470 | Multiple unspecified vulnerabilities in the KSSL kernel module in Sun Solaris 10, when configured with the KSSL proxy, allow remote attackers to cause a denial of service (kernel panic) via unspecified vectors related to "memory buffers" of Secure Socket Layer (SSL) records. | [
"cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*"
] |
|
CVE-1999-0028 | root privileges via buffer overflow in login/scheme command on SGI IRIX systems. | [
"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*"
] |
|
GHSA-m8fv-p543-wxqw | SQL injection vulnerability in loadorder.php in NKInFoWeb 2.5 and 5.2.2.0 allows remote attackers to execute arbitrary SQL commands via the id_sp parameter. | [] |
|
GHSA-687j-vcxj-vhqv | The com_rss option (rss.php) in (1) Mambo and (2) Joomla! allows remote attackers to obtain sensitive information via an invalid feed parameter, which reveals the path in an error message. | [] |
|
GHSA-rfp5-46jp-rcjc | A vulnerability was found in Linksys WRT54GL 4.30.18 and classified as problematic. Affected by this issue is some unknown functionality of the file /SysInfo.htm of the component Web Management Interface. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-253328. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-74w7-cr4v-wf2v | Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and modify minor information. Exploitation of this issue does not require user interaction. | [] |
|
CVE-2018-0218 | A vulnerability in the web-based user interface of the Cisco Secure Access Control Server prior to 5.8 patch 9 could allow an unauthenticated, remote attacker to gain read access to certain information in the affected system. The vulnerability is due to improper handling of XML External Entities (XXEs) when parsing an XML file. An attacker could exploit this vulnerability by convincing the administrator of an affected system to import a crafted XML file. Cisco Bug IDs: CSCve70616. | [
"cpe:2.3:a:cisco:secure_access_control_server_solution_engine:5.8\\(0.8\\):*:*:*:*:*:*:*"
] |
|
GHSA-7gc4-r5jr-9hxv | Gin-vue-admin subject to Remote Code Execution via file upload vulnerability | ImpactGin-vue-admin < 2.5.4 has File upload vulnerabilities。
File upload vulnerabilities are when a web server allows users to upload files to its filesystem without sufficiently validating things like their name, type, contents, or size. Failing to properly enforce restrictions on these could mean that even a basic image upload function can be used to upload arbitrary and potentially dangerous files instead. This could even include server-side script files that enable remote code execution.Patcheshttps://github.com/flipped-aurora/gin-vue-admin/pull/1264Workaroundshttps://github.com/flipped-aurora/gin-vue-admin/pull/1264References#1263For more informationThe plugin installation function of Gin-Vue-Admin allows users to download zip packages from the plugin market and upload them for installation. This function has an arbitrary file upload vulnerability. A malicious attacker can upload a constructed zip package to traverse the directory and upload or overwrite arbitrary files on the server side.The affected code https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/service/system/sys_auto_code.go line 880 called the `utils.Unzip` methodThe https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/utils/zip.go code defines the `utils.Unzip` methodIt can be analyzed that after uploading a zip compressed file, the `Unzip` method will be called to decompress the compressed file, and then judge whether the compressed file contains the fixed directory structure of server, web, and plugin.Whether the zip file is correct or not, it will be decompressed first. If the directory does not exist, it will be created automatically. Therefore, malicious zip packages can be constructed, and directory traversal can be performed during automatic decompression to upload or overwrite any file.Use the Zip Slip vulnerability to construct a malicious zip package with `../../../../` filenames, and upload the malicious zip package to trigger the vulnerability.
 | [] |
CVE-2003-0013 | The default .htaccess scripts for Bugzilla 2.14.x before 2.14.5, 2.16.x before 2.16.2, and 2.17.x before 2.17.3 do not include filenames for backup copies of the localconfig file that are made from editors such as vi and Emacs, which could allow remote attackers to obtain a database password by directly accessing the backup file. | [
"cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*"
] |
|
CVE-2009-4457 | Multiple unspecified vulnerabilities in the Vsftpd Webmin module before 1.3b for the Vsftpd server have unknown impact and attack vectors related to "Some security issues." | [
"cpe:2.3:a:provider4u:vsftpd_webmin_module:*:*:*:*:*:*:*:*",
"cpe:2.3:a:provider4u:vsftpd_webmin_module:1.2a:*:*:*:*:*:*:*"
] |
|
GHSA-hf64-x4gq-p99h | Pillow Out-of-bounds Read | In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled. | [] |
GHSA-g7xc-4c2r-qj7r | Cross-site scripting vulnerability in Intel Security McAfee Endpoint Security (ENS) Web Control before 10.2.0.408.10 allows attackers to inject arbitrary web script or HTML via a crafted web site. | [] |
|
CVE-2019-14940 | In Storage Performance Development Kit (SPDK) before 19.07, a user of a vhost can cause a crash if the target is sent invalid input. | [
"cpe:2.3:a:spdk:storage_performance_development_kit:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-0272 | Unspecified vulnerability in the XML Database component of Oracle Database server 9.2.0.7 and 10.1.0.4 has unspecified impact and attack vectors, as identified by Oracle Vuln# DB29. NOTE: based on mutual credits by the relevant sources, it is highly likely that this issue is a buffer overflow in the (a) DBMS_XMLSCHEMA and (b) DBMS_XMLSCHEMA_INT packages, as exploitable via long arguments to (1) XDB.DBMS_XMLSCHEMA.GENERATESCHEMA or (2) XDB.DBMS_XMLSCHEMA.GENERATESCHEMAS. | [
"cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:personal_10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.7:*:*:*:*:*:*:*"
] |
|
GHSA-gr3q-2hph-p758 | XnView Classic 2.48 has a User Mode Write AV starting at xnview+0x000000000032e808. | [] |
|
CVE-2023-2375 | Ubiquiti EdgeRouter X Web Management Interface command injection | A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. This issue affects some unknown processing of the component Web Management Interface. The manipulation of the argument src leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227651. | [
"cpe:2.3:o:ui:er-x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x_firmware:2.0.9:-:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix2:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix3:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix4:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix5:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x_firmware:2.0.9:hotfix6:*:*:*:*:*:*",
"cpe:2.3:h:ui:er-x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x-sfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:-:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix2:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix3:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix4:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix5:*:*:*:*:*:*",
"cpe:2.3:o:ui:er-x-sfp_firmware:2.0.9:hotfix6:*:*:*:*:*:*",
"cpe:2.3:h:ui:er-x-sfp:-:*:*:*:*:*:*:*"
] |
GHSA-mxr5-j46q-jg86 | xterm, including 192-7.el4 in Red Hat Enterprise Linux and 208-3.1 in Debian GNU/Linux, sets the wrong group ownership of tty devices, which allows local users to write data to other users' terminals. | [] |
|
GHSA-7crv-7m84-5mjv | Directory traversal vulnerability in language.php in phpAlbum 0.4.1 Beta 6 and earlier, when magic_quotes_gpc is disabled and register_globals is enabled, allows remote attackers to include and execute arbitrary local files or obtain sensitive information via a .. (dot dot) in the pa_lang[include_file] parameter, as demonstrated by injecting PHP sequences into an Apache HTTP Server log file, which is then included by language.php. | [] |
|
GHSA-8585-x3v3-r54f | The default configuration of Serv-U 2.5d and earlier allows remote attackers to determine the real pathname of the server by requesting a URL for a directory or file that does not exist. | [] |
|
CVE-2024-27254 | IBM Db2 for Linux, UNIX and Windows denial of service | IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 federated server is vulnerable to denial of service with a specially crafted query under certain conditions. IBM X-Force ID: 283813. | [] |
GHSA-27p6-p8xf-5cxf | Vulnerability in the Oracle FLEXCUBE Investor Servicing component of Oracle Financial Services Applications (subcomponent: Infrastructure). Supported versions that are affected are 12.0.1, 12.0.3, 12.0.4, 12.1.0, 12.3.0, 12.4.0, 14.0.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Investor Servicing. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Investor Servicing accessible data. CVSS 3.0 Base Score 5.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N). | [] |
|
GHSA-hjpm-vq95-vrqg | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in weDevs ReCaptcha Integration for WordPress allows Stored XSS.This issue affects ReCaptcha Integration for WordPress: from n/a through 1.2.5. | [] |
|
GHSA-vqh2-672q-h5xp | An exploitable code execution vulnerability exists in the rendering functionality of Nitro Pro 13.13.2.242 and 13.16.2.300. When drawing the contents of a page and selecting the stroke color from an 'ICCBased' colorspace, the application will read a length from the file and use it as a loop sentinel when writing data into the member of an object. Due to the object member being a buffer of a static size allocated on the heap, this can result in a heap-based buffer overflow. A specially crafted document must be loaded by a victim in order to trigger this vulnerability. | [] |
|
CVE-2012-1479 | Unspecified vulnerability in the AContact (com.movester.quickcontact) application 1.8.2 for Android has unknown impact and attack vectors. | [
"cpe:2.3:a:movesti:acontact:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
GHSA-6x63-wxj7-22mm | Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stack-based Buffer Overflow vulnerability, which can be triggered by authenticated users via a crafted POST request. | [] |
|
CVE-2022-39890 | Improper Authorization in Samsung Billing prior to version 5.0.56.0 allows attacker to get sensitive information. | [
"cpe:2.3:a:samsung:billing:*:*:*:*:*:*:*:*"
] |
|
GHSA-jx3h-pqmp-6jqh | The way URIs are handled in admin/header.php in Chadha PHPKB Standard Multi-Language 9 allows Reflected XSS (injecting arbitrary web script or HTML) in admin/import-html.php by adding a question mark (?) followed by the payload. | [] |
|
GHSA-qfcg-vg7r-j9m5 | The Easy Video Downloader (aka com.simon.padillar.EasyVideo) application 4.4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-c3q2-mqcc-5vxq | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Login Watchdog allows Stored XSS. This issue affects Login Watchdog: from n/a through 1.0.4. | [] |
|
GHSA-f3p3-3pq5-xp8x | Product Name and Product Code in the 'Add Product' section of Sourcecodester Product Inventory with Export to Excel 1.0 are vulnerable to XSS attacks. | [] |
|
CVE-2025-31199 | A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.4 and iPadOS 18.4, visionOS 2.4, macOS Sequoia 15.4. An app may be able to access sensitive user data. | [] |
|
GHSA-mgh8-h8qf-wr9q | A denial of service vulnerability in Tremolo/dpen.s in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31647370. | [] |
|
CVE-2020-7730 | Command Injection | The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param. | [
"cpe:2.3:a:bestzip_project:bestzip:*:*:*:*:*:node.js:*:*"
] |
CVE-2019-8004 | Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure . | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-7429 | NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use. | [
"cpe:2.3:a:ntp:ntp:*:p8:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.