id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2003-1392
CryptoBuddy 1.0 and 1.2 does not use the user-supplied passphrase to encrypt data, which could allow local users to use their own passphrase to decrypt the data.
[ "cpe:2.3:a:research_triangle_software:cryptobuddy:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:research_triangle_software:cryptobuddy:1.2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*" ]
null
null
null
6.6
CVE-2025-31488
Plain Craft Launcher's custom homepage can use Internet Explorer to load web pages with the help of controls such as WebBrowser
Plain Craft Launcher (PCL) is a launcher for Minecraft. PCL allows users to use homepages provided by third parties. If controls such as WebBrowser are used in the homepage, WPF will use Internet Explorer to load the specified webpage. If the user uses a malicious homepage, the attacker can use IE background to access the specified webpage without knowing it. This vulnerability is fixed in 2.9.3.
[]
4.9
null
null
null
CVE-2024-39667
WordPress Element Pack Elementor Addons plugin <= 5.6.11 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BdThemes Element Pack Elementor Addons allows Stored XSS.This issue affects Element Pack Elementor Addons: from n/a through 5.6.11.
[]
null
6.5
null
null
CVE-2018-13346
The mpatch_apply function in mpatch.c in Mercurial before 4.6.1 incorrectly proceeds in cases where the fragment start is past the end of the original data, aka OVE-20180430-0004.
[ "cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-f9rg-9f28-2cxr
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A Buffer overflow in the built-in web server allows remote attackers to initiate DoS, and probably to execute arbitrary code (issue 1 of 2).
[]
null
null
null
null
CVE-2015-8793
Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937.
[ "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "cpe:2.3:a:roundcube:webmail:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:roundcube:webmail:1.1.1:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2022-21877
Storage Spaces Controller Information Disclosure Vulnerability
Storage Spaces Controller Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-97mp-43rr-5rcx
Dell Unity prior to 5.3 contains an XML External Entity injection vulnerability. An XXE attack could potentially exploit this vulnerability disclosing local files in the file system.
[]
null
4.9
null
null
CVE-2020-21989
HomeAutomation 3.3.2 is affected by Cross Site Request Forgery (CSRF). The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
[ "cpe:2.3:a:homeautomation_project:homeautomation:3.3.2:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
CVE-2021-26899
Windows UPnP Device Host Elevation of Privilege Vulnerability
Windows UPnP Device Host Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:-:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:-:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:-:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:-:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:-:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:-:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:x86:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:x86:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:-:*:-:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*" ]
null
7.8
null
null
CVE-2020-6316
SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check.
[ "cpe:2.3:a:sap:erp:600:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp:602:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp:603:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp:604:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp:605:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp:606:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp:616:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp:617:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp:618:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4hana:100:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4hana:101:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4hana:102:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4hana:103:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s\\/4hana:104:*:*:*:*:*:*:*" ]
null
null
4.3
null
GHSA-4whx-q4g9-v3mj
Multiple cross-site scripting (XSS) vulnerabilities in ClipBucket 2.6 allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter to channels.php, (2) collections.php, (3) groups.php, or (4) videos.php; (5) query parameter to search_result.php; or (6) type parameter to view_collection.php or (7) view_item.php.
[]
null
null
null
null
CVE-2017-2977
Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*" ]
null
null
7.5
5
PYSEC-2018-113
null
Ajenti version 2 contains an Information Disclosure vulnerability in Line 176 of the code source that can result in user and system enumeration as well as data from the /etc/ajenti/config.yml file. This attack appears to be exploitable via network connectivity to the web application.
[]
null
null
null
null
CVE-2009-2727
Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15.
[ "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:6.1.2:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-m5mh-rmcg-x9pm
Missing Authorization vulnerability in Prasad Kirpekar WP Meta and Date Remover allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Meta and Date Remover: from n/a through 2.3.0.
[]
null
5.4
null
null
CVE-2017-9128
The quicktime_video_width function in lqt_quicktime.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted mp4 file.
[ "cpe:2.3:a:libquicktime:libquicktime:1.2.4:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2024-26306
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
[]
null
5.9
null
null
CVE-2025-37869
drm/xe: Use local fence in error path of xe_migrate_clear
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Use local fence in error path of xe_migrate_clear The intent of the error path in xe_migrate_clear is to wait on locally generated fence and then return. The code is waiting on m->fence which could be the local fence but this is only stable under the job mutex leading to a possible UAF. Fix code to wait on local fence. (cherry picked from commit 762b7e95362170b3e13a8704f38d5e47eca4ba74)
[]
null
null
null
null
CVE-2017-12671
In ImageMagick 7.0.6-3, a missing NULL assignment was found in coders/png.c, leading to an invalid free in the function RelinquishMagickMemory in MagickCore/memory.c, which allows attackers to cause a denial of service.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.6-3:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2013-3703
No write permission check in change_role command
The controller of the Open Build Service API prior to version 2.4.4 is missing a write permission check, allowing an authenticated attacker to add or remove user roles from packages and/or project meta data.
[ "cpe:2.3:a:opensuse:open_build_service:*:*:*:*:*:*:*:*" ]
null
null
8.8
null
CVE-2022-4275
House Rental System POST Request search-property.php sql injection
A vulnerability has been found in House Rental System and classified as critical. Affected by this vulnerability is an unknown functionality of the file search-property.php of the component POST Request Handler. The manipulation of the argument search_property leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214771.
[ "cpe:2.3:a:house_rental_system_project:house_rental_system:-:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-576m-4rvh-6rff
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-11925.
[]
null
null
null
null
GHSA-2qph-qpvm-2qf7
tls-listener affected by the slow loris vulnerability with default configuration
SummaryWith the default configuration of tls-listener, a malicious user can open 6.4 `TcpStream`s a second, sending 0 bytes, and can trigger a DoS.DetailsThe default configuration options make any public service using `TlsListener::new()` vulnerable to a slow-loris DoS attack.PoCRunning the HTTP TLS server example: https://github.com/tmccombs/tls-listener/blob/6c57dea2d9beb1577ae4d80f6eaf03aad4ef3857/examples/http.rs, then running the following script will prevent new connections to the server.ImpactThis is an instance of a [slow-loris attack](https://en.wikipedia.org/wiki/Slowloris_(computer_security)). This impacts any publically accessible service using the default configuration of `tls-listener`MitigationPrevious versions can mitigate this by passing a large value, such as `usize::MAX` as the parameter to `Builder::max_handshakes`.
[]
null
7.5
null
null
CVE-2025-46714
Sandboxie has Pool Buffer Overflow in SbieDrv.sys API (API_GET_SECURE_PARAM)
Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to 1.15.12, API_GET_SECURE_PARAM has an arithmetic overflow leading to a small memory allocation and then a extremely large copy into the small allocation. Version 1.15.12 fixes the issue.
[]
null
7.8
null
null
CVE-2017-7429
Fix for NetIQ shell code upload
The certificate upload in NetIQ eDirectory PKI plugin before 8.8.8 Patch 10 Hotfix 1 could be abused to upload JSP code which could be used by authenticated attackers to execute JSP applets on the iManager server.
[ "cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*", "cpe:2.3:a:netiq:edirectory:8.8.8:patch10:*:*:*:*:*:*", "cpe:2.3:a:netiq:edirectory:8.8.8:patch5:*:*:*:*:*:*", "cpe:2.3:a:netiq:edirectory:8.8.8:patch6:*:*:*:*:*:*", "cpe:2.3:a:netiq:edirectory:8.8.8:patch7:*:*:*:*:*:*", "cpe:2.3:a:netiq:edirectory:8.8.8:patch8:*:*:*:*:*:*", "cpe:2.3:a:netiq:edirectory:8.8.8:patch9:*:*:*:*:*:*" ]
null
null
8.8
null
CVE-2018-6394
SQL Injection exists in the InviteX 3.0.5 component for Joomla! via the invite_type parameter in a view=invites action.
[ "cpe:2.3:a:techjoomla:invitex:3.0.5:*:*:*:*:joomla\\!:*:*" ]
null
null
9.8
7.5
GHSA-g56r-vrhv-7536
Windows Media Photo Codec Information Disclosure Vulnerability
[]
null
5.7
null
null
CVE-2016-2531
Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.
[ "cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
CVE-2010-3832
Heap-based buffer overflow in the GSM mobility management implementation in Telephony in Apple iOS before 4.2 on the iPhone and iPad allows remote attackers to execute arbitrary code on the baseband processor via a crafted Temporary Mobile Subscriber Identity (TMSI) field.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:h:apple:ipad:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2007-3976
SQL injection vulnerability in index.php in bwired allows remote attackers to execute arbitrary SQL commands via the newsID parameter.
[ "cpe:2.3:a:bwired:bwired:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-9895
Smart Online Order for Clover <= 1.5.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via moo_receipt_link Shortcode
The Smart Online Order for Clover plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's moo_receipt_link shortcode in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:zaytech:smart_online_order_for_clover:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
ICSA-22-284-03
Sensormatic Electronics C-CURE 9000
Sensormatic Electronics C•CURE 9000, version 2.90 and prior, provides responses to incoming requests that could reveal internal state information to an unauthorized user.CVE-2021-36201 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
4.3
null
CVE-2014-7739
The Anahi A Adopter FR (aka com.wAnahiAAdopterFR) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:deceiver:anahi_a_adopter_fr:0.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-c5g2-f738-9q44
An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version 7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.
[]
null
4.3
null
null
CVE-2025-23474
WordPress Live Dashboard plugin <= 0.3.3 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mike Martel Live Dashboard allows Reflected XSS. This issue affects Live Dashboard: from n/a through 0.3.3.
[]
null
7.1
null
null
CVE-2017-7081
An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-j86v-4vf3-rfmv
Acrobat Reader DC versions 2020.013.20066 (and earlier), 2020.001.30010 (and earlier) and 2017.011.30180 (and earlier) are affected by an information exposure vulnerability, that could enable an attacker to get a DNS interaction and track if the user has opened or closed a PDF file when loaded from the filesystem without a prompt. User interaction is required to exploit this vulnerability.
[]
null
null
null
null
CVE-2010-2091
Microsoft Outlook Web Access (OWA) 8.2.254.0, when Internet Explorer 7 on Windows Server 2003 is used, does not properly handle the id parameter in a Folder IPF.Note action to the default URI, which might allow remote attackers to obtain sensitive information or conduct cross-site scripting (XSS) attacks via an invalid value.
[ "cpe:2.3:a:microsoft:exchange_server:2007:sp2_update_rollup_4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2022-48659
mm/slub: fix to return errno if kmalloc() fails
In the Linux kernel, the following vulnerability has been resolved: mm/slub: fix to return errno if kmalloc() fails In create_unique_id(), kmalloc(, GFP_KERNEL) can fail due to out-of-memory, if it fails, return errno correctly rather than triggering panic via BUG_ON(); kernel BUG at mm/slub.c:5893! Internal error: Oops - BUG: 0 [#1] PREEMPT SMP Call trace: sysfs_slab_add+0x258/0x260 mm/slub.c:5973 __kmem_cache_create+0x60/0x118 mm/slub.c:4899 create_cache mm/slab_common.c:229 [inline] kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335 kmem_cache_create+0x1c/0x28 mm/slab_common.c:390 f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline] f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808 f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149 mount_bdev+0x1b8/0x210 fs/super.c:1400 f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512 legacy_get_tree+0x30/0x74 fs/fs_context.c:610 vfs_get_tree+0x40/0x140 fs/super.c:1530 do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040 path_mount+0x358/0x914 fs/namespace.c:3370 do_mount fs/namespace.c:3383 [inline] __do_sys_mount fs/namespace.c:3591 [inline] __se_sys_mount fs/namespace.c:3568 [inline] __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2022-38935
An issue was discovered in NiterForum version 2.5.0-beta in /src/main/java/cn/niter/forum/api/SsoApi.java and /src/main/java/cn/niter/forum/controller/AdminController.java, allows attackers to gain escalated privileges.
[ "cpe:2.3:a:niter:niterforum:2.5.0:beta:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2005-2723
SQL injection vulnerability in auth.php in PaFileDB 3.1, when authmethod is set to cookies, allows remote attackers to execute arbitrary SQL commands via the username value in the pafiledbcookie cookie.
[ "cpe:2.3:a:php_arena:pafiledb:3.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2012-1567
LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate.
[ "cpe:2.3:o:linuxmint:linuxmint:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-g276-jg34-q58g
A post-authentication command injection vulnerability in the “account_operator.cgi” CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote authenticated attacker to modify device configuration data, resulting in denial-of-service (DoS) conditions on an affected device.
[]
null
8.1
null
null
GHSA-v4fx-vr9m-2x7v
Dell EMC SupportAssist Enterprise version 1.1 creates a local Windows user account named "OMEAdapterUser" with a default password as part of the installation process. This unnecessary user account also remains even after an upgrade from v1.1 to v1.2. Access to the management console can be achieved by someone with knowledge of the default password. If SupportAssist Enterprise is installed on a server running OpenManage Essentials (OME), the OmeAdapterUser user account is added as a member of the OmeAdministrators group for the OME. An unauthorized person with knowledge of the default password and access to the OME web console could potentially use this account to gain access to the affected installation of OME with OmeAdministrators privileges. This is fixed in version 1.2.1.
[]
null
null
7
null
CVE-2024-7770
Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress <= 6.5.5 - Authenticated (Subscriber+) Arbitrary File Upload
The Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload' function in all versions up to, and including, 6.5.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted upload permissions by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible.
[ "cpe:2.3:a:bitpressadmin:bit_file_manager_wordpress:*:*:*:*:*:*:*:*", "cpe:2.3:a:bitapps:file_manager:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
CVE-2019-25022
An issue was discovered in Scytl sVote 2.1. An attacker can inject code that gets executed by creating an election-event and injecting a payload over an event alias, because the application calls Runtime.getRuntime().exec() without validation.
[ "cpe:2.3:a:scytl:secure_vote:2.1:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2015-1593
The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*" ]
null
null
null
5
CVE-2016-3342
The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka "Windows Common Log File System Driver Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3334, CVE-2016-3335, CVE-2016-3338, CVE-2016-3340, CVE-2016-3343, and CVE-2016-7184.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*" ]
null
null
7.8
9.3
GHSA-w674-fffm-2frx
Google Chrome before 7.0.517.41 does not properly handle animated GIF images, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted image.
[]
null
7.8
null
null
GHSA-r858-gg25-px8p
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function Gfx::opSetFillColorN() located in Gfx.cc. It allows an attacker to cause code Execution.
[]
null
null
null
null
CVE-2022-37988
Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2021-37541
In JetBrains Hub before 2021.1.13402, HTML injection in the password reset email was possible.
[ "cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2023-48727
NULL pointer dereference in some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable information disclosure via local access.
[ "cpe:2.3:a:intel:media_sdk:-:*:*:*:*:*:*:*", "cpe:2.3:a:intel:onevpl_gpu_runtime:*:*:*:*:*:*:*:*" ]
null
3.3
null
null
CVE-2022-32781
This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5, Security Update 2022-005 Catalina, macOS Big Sur 11.6.8. An app with root privileges may be able to access private information.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*" ]
null
4.4
null
null
CVE-2019-8841
An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.3 and iPadOS 13.3. An application may be able to execute arbitrary code with kernel privileges.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2024-50695
SunGrow WiNet-SV200.001.00.P027 and earlier versions is vulnerable to stack-based buffer overflow when parsing MQTT messages, due to missing MQTT topic bounds checks.
[]
null
9.8
null
null
GHSA-594j-mv6x-7qw2
The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6.
[]
null
null
null
null
CVE-2010-2703
Stack-based buffer overflow in the execvp_nc function in the ov.dll module in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53, when running on Windows, allows remote attackers to execute arbitrary code via a long HTTP request to webappmon.exe.
[ "cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*", "cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2024-33800
A SQL injection vulnerability in /model/get_student1.php in campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the index parameter.
[ "cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-rfmr-h435-xpqx
Use after free in media in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: High)
[]
null
8.8
null
null
CVE-2018-17401
The PhonePe wallet (aka com.PhonePe.app) application 3.0.6 through 3.3.26 for Android might allow attackers to perform Account Takeover attacks by exploiting its Forgot Password feature. NOTE: the vendor says that, to exploit this, the user has to explicitly install a malicious app and provide accessibility permission to the malicious app, that the Android platform provides fair warnings to the users before turning on accessibility for any application, and that it believes it is similar to installing malicious keyboards, or malicious apps taking screenshots
[ "cpe:2.3:a:phonepe:phonepe:*:*:*:*:*:android:*:*" ]
null
null
8.8
4.3
GHSA-322g-44wj-2m39
An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can cause a denial of service by sending a cleartext encryption pause request.
[]
null
6.5
null
null
CVE-2008-2645
Multiple PHP remote file inclusion vulnerabilities in Brim (formerly Booby) 1.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the renderer parameter to template.tpl.php in (1) barrel/, (2) barry/, (3) mylook/, (4) oerdec/, (5) penguin/, (6) sidebar/, (7) slashdot/, and (8) text-only/ in templates/. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences.
[ "cpe:2.3:a:brim-project:brim:1.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-6qvp-39mm-95v8
com.xwiki.confluencepro:application-confluence-migrator-pro-ui Remote Code Execution via unescaped translations
ImpactA user that doesn't have programming rights can execute arbitrary code when creating a page using the Migration Page template. A possible attack vector is the following:Create a page and add the following content:Use the object editor to add an object of type `XWiki.TranslationDocumentClass` with scope `USER`.Access an unexisting page using the `MigrationTemplate`It is expected that `{{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("hello from groovy!"){{/groovy}}{{/async}}` will be present on the page, however, `hello from groovy` will be printed.PatchesThe issue will be fixed as part of v1.2. The fix was added with commit [35cef22](https://github.com/xwikisas/application-confluence-migrator-pro/commit/36cef2271bd429773698ca3a21e47b6d51d6377d)WorkaroundsThere are no known workarounds besides upgrading.ReferencesNo references.
[]
null
9.1
null
null
CVE-2017-16128
The module npm-script-demo opened a connection to a command and control server. It has been removed from the npm registry.
[ "cpe:2.3:a:npm-script-demo_project:npm-script-demo:0.0.1:*:*:*:*:node.js:*:*" ]
null
null
9.8
10
CVE-2010-4365
SQL injection vulnerability in JE Ajax Event Calendar (com_jeajaxeventcalendar) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the event_id parameter in an alleventlist_more action to index.php.
[ "cpe:2.3:a:harmistechnology:com_jeajaxeventcalendar:*:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2017:0183
Red Hat Security Advisory: squid34 security update
squid: Information disclosure in HTTP request processing
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
5.3
null
GHSA-v482-hq83-hpfg
InDesign Desktop versions ID18.5.3, ID19.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
GHSA-7fmq-qw39-x2x2
In the Linux kernel, the following vulnerability has been resolved:drm/drv: Fix potential memory leak in drm_dev_init()drm_dev_init() will add drm_dev_init_release() as a callback. When drmm_add_action() failed, the release function won't be added. As the result, the ref cnt added by device_get() in drm_dev_init() won't be put by drm_dev_init_release(), which leads to the memleak. Use drmm_add_action_or_reset() instead of drmm_add_action() to prevent memleak.unreferenced object 0xffff88810bc0c800 (size 2048): comm "modprobe", pid 8322, jiffies 4305809845 (age 15.292s) hex dump (first 32 bytes): e8 cc c0 0b 81 88 ff ff ff ff ff ff 00 00 00 00 ................ 20 24 3c 0c 81 88 ff ff 18 c8 c0 0b 81 88 ff ff $<............. backtrace: [<000000007251f72d>] __kmalloc+0x4b/0x1c0 [<0000000045f21f26>] platform_device_alloc+0x2d/0xe0 [<000000004452a479>] platform_device_register_full+0x24/0x1c0 [<0000000089f4ea61>] 0xffffffffa0736051 [<00000000235b2441>] do_one_initcall+0x7a/0x380 [<0000000001a4a177>] do_init_module+0x5c/0x230 [<000000002bf8a8e2>] load_module+0x227d/0x2420 [<00000000637d6d0a>] __do_sys_finit_module+0xd5/0x140 [<00000000c99fc324>] do_syscall_64+0x3f/0x90 [<000000004d85aa77>] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[]
null
null
null
null
CVE-2014-7497
The Portfolium (aka com.wPortfolium) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:portfolium_project:portfolium:0.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-xq9j-rj57-v855
Research Artisan Lite before 1.18 does not ensure that a user has authenticated, which allows remote attackers to perform unspecified actions via unknown vectors.
[]
null
null
null
null
GHSA-j494-7x2v-vvvp
mx-chain-go's relayed transactions always increment nonce
ImpactWhen executing a relayed transaction, if the inner transaction failed, it would have increased the inner transaction's sender account nonce. This could have contributed to a limited DoS attack on a targeted account. The fix is a breaking change so a new flag `RelayedNonceFixEnableEpoch` was needed. This was a strict processing issue while validating blocks on a chain.Patchesv1.4.17 and later versions contain the fix for this issueWorkaroundsthere were no workarounds for this issue. The affected account could only wait for the DoS attack to finish as the attack was not free or to attempt to send transactions in a very fast manner so as to compete on the same nonce with the attacker.ReferencesFor the future understanding of this issue, on v1.4.17 and onwards versions, we have this integration test that addresses the issue and tests the fix. https://github.com/multiversx/mx-chain-go/blob/babdb144f1316ab6176bf3dbd7d4621120414d43/integrationTests/vm/txsFee/relayedMoveBalance_test.go#LL165C14-L165C14
[]
null
7.1
null
null
GHSA-hrww-g57w-hvr9
rConfig 3.9.5 could allow a remote authenticated attacker to execute arbitrary code on the system, because of an error in the search.crud.php script. An attacker could exploit this vulnerability using the nodeId parameter.
[]
null
null
null
null
GHSA-2cg8-626m-7pjv
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
null
null
7.5
null
GHSA-48c6-w667-vv6w
An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
[]
null
7.8
null
null
CVE-2020-5347
Dell EMC Isilon OneFS versions 8.2.2 and earlier contain a denial of service vulnerability. SmartConnect had an error condition that may be triggered to loop, using CPU and potentially preventing other SmartConnect DNS responses.
[ "cpe:2.3:a:dell:emc_isilon_onefs:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
GHSA-56mf-wc59-ghx4
axTLS version 1.5.3 has a coding error in the ASN.1 parser resulting in the year (19)50 of UTCTime being misinterpreted as 2050.
[]
null
null
5.3
null
CVE-2018-16156
In PaperStream IP (TWAIN) 1.42.0.5685 (Service Update 7), the FJTWSVIC service running with SYSTEM privilege processes unauthenticated messages received over the FjtwMkic_Fjicube_32 named pipe. One of these message processing functions attempts to dynamically load the UninOldIS.dll library and executes an exported function named ChangeUninstallString. The default install does not contain this library and therefore if any DLL with that name exists in any directory listed in the PATH variable, it can be used to escalate to SYSTEM level privilege.
[ "cpe:2.3:a:fujitsu:paperstream_ip_\\(twain\\):1.42.0.5685:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
RHSA-2022:1463
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 8
log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern
[ "cpe:/a:redhat:red_hat_single_sign_on:7.5::el8" ]
null
5.9
null
null
CVE-2021-42092
An issue was discovered in Zammad before 4.1.1. Stored XSS may occur via an Article during addition of an attachment to a Ticket.
[ "cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
GHSA-j269-qhvq-9q42
A vulnerability was found in Album Lock 4.0 and classified as critical. Affected by this issue is some unknown functionality of the file /getImage. The manipulation of the argument filePaht leads to path traversal. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
[]
null
5.5
null
null
CVE-2008-4988
pscal in xcal 4.1 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/pscal##### temporary file.
[ "cpe:2.3:a:lars_bahner:xcal:4.1:*:*:*:*:*:*:*" ]
null
null
null
6.9
GHSA-m5gq-rxm3-279g
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ProfilePress Membership Team Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin <= 4.5.3 versions.
[]
null
6.1
null
null
CVE-2025-2531
Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of dae files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23704.
[]
null
null
7.8
null
CVE-2013-4559
lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached.
[ "cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" ]
null
null
null
7.6
GHSA-xw4g-gmmj-5g3m
Improper Authorization vulnerability in Drupal Open Social allows Collect Data from Common Resource Locations.This issue affects Open Social: from 0.0.0 before 12.0.5.
[]
null
9.1
null
null
CVE-2009-0570
Directory traversal vulnerability in send.php in Ninja Designs Mailist 3.0, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the load parameter. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:ninjadesigns:mailist:3.0:*:*:*:*:*:*:*" ]
null
null
null
5.1
GHSA-h5wf-5g96-9fxx
In aoc_service_set_read_blocked of aoc.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-270148537References: N/A
[]
null
6.7
null
null
GHSA-8p5w-j26w-7656
The specific function in ASUS BMC’s firmware Web management page (ActiveX configuration-2 acquisition) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
[]
null
null
null
null
GHSA-wq96-x226-v8pj
The Netscape Directory Server installation procedure leaves sensitive information in a file that is accessible to local users.
[]
null
null
null
null
GHSA-779h-xx5r-h8f3
Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Improper input validation vulnerability. Successful exploitation could lead to local privilege escalation.
[]
null
null
7.8
null
GHSA-6q2p-jv44-v825
Direct static code injection vulnerability in admin/settings.php in MyBlog 0.9.8 and earlier allows remote authenticated admin users to inject arbitrary PHP code via the content parameter, which can be executed by accessing index.php. NOTE: a separate vulnerability could be leveraged to make this issue exploitable by remote unauthenticated attackers.
[]
null
null
null
null
GHSA-r9ww-rg22-c2wc
The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL.
[]
null
null
null
null
PYSEC-2021-104
null
Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. The problem has been fixed in Zope 5.21 and 4.6.1. The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
[]
null
null
null
null
RHSA-2012:1366
Red Hat Security Advisory: kernel security and bug fix update
kernel: sfc: potential remote denial of service through TCP MSS option
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2011-5272
SQL injection vulnerability in Domain Technologie Control (DTC) before 0.34.1 allows remote authenticated users to execute arbitrary SQL commands via the vps_note parameter to dtcadmin/logPushlet.php. NOTE: this issue was originally part of CVE-2011-3197, but that ID was SPLIT due to different researchers.
[ "cpe:2.3:a:gplhost:domain_technologie_control:*:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.24.6:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.25.1:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.25.2:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.25.3:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.26.7:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.26.8:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.26.9:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.27.3:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.28.2:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.28.3:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.28.4:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.28.6:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.28.9:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.28.10:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.29.1:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.29.6:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.29.8:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.29.10:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.29.14:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.29.15:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.29.16:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.29.17:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.30.6:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.30.8:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.30.10:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.30.18:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.30.20:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.32.1:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.32.2:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.32.3:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.32.4:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.32.5:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.32.6:*:*:*:*:*:*:*", "cpe:2.3:a:gplhost:domain_technologie_control:0.32.7:*:*:*:*:*:*:*" ]
null
null
null
6.5
GHSA-gc6m-q9f7-723r
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
CVE-2022-3745
A potential vulnerability was discovered in LCFC BIOS for some Lenovo consumer notebook models that could allow a local attacker with elevated privileges to view incoming and returned data from SMI.
[ "cpe:2.3:o:lenovo:ideapad_1_14iau7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_1_14iau7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_1_14igl7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_1_14igl7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_1_15iau7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_1_15iau7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_1_15igl7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_1_15igl7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_1-14ijl7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_1-14ijl7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_1-15ijl7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_1-15ijl7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3_14iau7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3_14iau7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3_15iau7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3_15iau7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3_17iau7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3_17iau7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15igl05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15igl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-17iil05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-17iil05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-17itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-17itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_5_15ial7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_5_15ial7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_5-15itl05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_5-15itl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l3-15iml05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l3-15iml05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:l3-15itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:l3-15itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5_15iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5_15iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5_15iah7h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5_15iah7h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5_pro_16iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5_pro_16iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5_pro_16iah7h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5_pro_16iah7h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5_pro-16ith6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5_pro-16ith6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5_pro-16ith6h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5_pro-16ith6h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-15imh05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-15imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-15imh05h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-15imh05h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-15imh6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-15imh6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-15ith6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-15ith6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-15ith6h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-15ith6h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-17imh05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-17imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-17imh05h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-17imh05h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-17ith6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-17ith6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5-17ith6h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5-17ith6h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5p-15imh05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5p-15imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_5p-15imh05h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_5p-15imh05h:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_7_16iax7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_7_16iax7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:legion_7-16ithg6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:legion_7-16ithg6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s14_g2_itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s14_g2_itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s14_g3_iap_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s14_g3_iap:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_7_14iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_7_14iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_7_carbon_13iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_7_carbon_13iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_7_prox_14iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_7_prox_14iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_9_14iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_9_14iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkbook_15p_imh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkbook_15p_imh:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14_g2_ijl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14_g2_ijl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14_g3_iap_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14_g3_iap:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v15_g2_ijl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v15_g2_ijl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v15_g3_iap_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v15_g3_iap:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v17_g3_iap_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v17_g3_iap:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:s540-13itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:s540-13itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_7_pro-14ihu5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_7_pro-14ihu5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:slim_9-14itl05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:slim_9-14itl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkbook_15p_g2_ith_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkbook_15p_g2_ith:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14_g1-iml_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14_g1-iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14_g2-itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14_g2-itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v14-igl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v14-igl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v15_g1-iml_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v15_g1-iml:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v15_g2-itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v15_g2-itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v15-igl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v15-igl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v17_g2-itl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v17_g2-itl:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:v17-iil_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:v17-iil:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_7_14ial7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_7_14ial7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_7_16iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_7_16iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_7_16iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_7_16iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_7-14itl5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_7-14itl5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_7-15itl5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_7-15itl5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_9_14iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_9_14iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7_carbon_13iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7_carbon_13iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7_pro_14iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7_pro_14iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7_pro_14iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7_pro_14iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7_pro-14ihu5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7_pro-14ihu5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7_pro-14ihu5_o_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7_pro-14ihu5_o:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7_pro-14itl5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7_pro-14itl5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_7_prox_14iah7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_7_prox_14iah7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_9_14iap7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_9_14iap7:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:yoga_slim_9-14itl05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:yoga_slim_9-14itl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14igl05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14igl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14iil05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14iil05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14iml05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14iml05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14itl05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14itl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-14itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-14itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15iil05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15iil05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15iml05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15iml05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15itl05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15itl05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-15itl6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-15itl6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_3-17iml05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_3-17iml05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_5-15iil05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_5-15iil05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_creator_5-15imh05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_creator_5-15imh05:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:ideapad_gaming_3-15imh05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:ideapad_gaming_3-15imh05:-:*:*:*:*:*:*:*" ]
null
4.4
null
null
GHSA-fcgj-qg8m-28wx
Use after free in Tab Strip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
[]
null
null
null
null