id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2003-1392 | CryptoBuddy 1.0 and 1.2 does not use the user-supplied passphrase to encrypt data, which could allow local users to use their own passphrase to decrypt the data. | [
"cpe:2.3:a:research_triangle_software:cryptobuddy:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:research_triangle_software:cryptobuddy:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*"
] | null | null | null | 6.6 |
|
CVE-2025-31488 | Plain Craft Launcher's custom homepage can use Internet Explorer to load web pages with the help of controls such as WebBrowser | Plain Craft Launcher (PCL) is a launcher for Minecraft. PCL allows users to use homepages provided by third parties. If controls such as WebBrowser are used in the homepage, WPF will use Internet Explorer to load the specified webpage. If the user uses a malicious homepage, the attacker can use IE background to access the specified webpage without knowing it. This vulnerability is fixed in 2.9.3. | [] | 4.9 | null | null | null |
CVE-2024-39667 | WordPress Element Pack Elementor Addons plugin <= 5.6.11 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BdThemes Element Pack Elementor Addons allows Stored XSS.This issue affects Element Pack Elementor Addons: from n/a through 5.6.11. | [] | null | 6.5 | null | null |
CVE-2018-13346 | The mpatch_apply function in mpatch.c in Mercurial before 4.6.1 incorrectly proceeds in cases where the fragment start is past the end of the original data, aka OVE-20180430-0004. | [
"cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-f9rg-9f28-2cxr | An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A Buffer overflow in the built-in web server allows remote attackers to initiate DoS, and probably to execute arbitrary code (issue 1 of 2). | [] | null | null | null | null |
|
CVE-2015-8793 | Cross-site scripting (XSS) vulnerability in program/include/rcmail.php in Roundcube before 1.0.6 and 1.1.x before 1.1.2 allows remote attackers to inject arbitrary web script or HTML via the _mbox parameter in a mail task to the default URL, a different vulnerability than CVE-2011-2937. | [
"cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:roundcube:webmail:1.1.1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2022-21877 | Storage Spaces Controller Information Disclosure Vulnerability | Storage Spaces Controller Information Disclosure Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-97mp-43rr-5rcx | Dell Unity prior to 5.3 contains an XML External Entity injection vulnerability. An XXE attack could potentially exploit this vulnerability disclosing local files in the file system. | [] | null | 4.9 | null | null |
|
CVE-2020-21989 | HomeAutomation 3.3.2 is affected by Cross Site Request Forgery (CSRF). The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. | [
"cpe:2.3:a:homeautomation_project:homeautomation:3.3.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2021-26899 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Windows UPnP Device Host Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:-:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:-:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:-:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:-:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:-:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:-:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:x86:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:-:*:-:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null |
CVE-2020-6316 | SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check. | [
"cpe:2.3:a:sap:erp:600:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp:602:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp:603:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp:604:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp:605:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp:606:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp:616:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp:617:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp:618:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s\\/4hana:100:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s\\/4hana:101:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s\\/4hana:102:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s\\/4hana:103:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s\\/4hana:104:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
GHSA-4whx-q4g9-v3mj | Multiple cross-site scripting (XSS) vulnerabilities in ClipBucket 2.6 allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter to channels.php, (2) collections.php, (3) groups.php, or (4) videos.php; (5) query parameter to search_result.php; or (6) type parameter to view_collection.php or (7) view_item.php. | [] | null | null | null | null |
|
CVE-2017-2977 | Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
PYSEC-2018-113 | null | Ajenti version 2 contains an Information Disclosure vulnerability in Line 176 of the code source that can result in user and system enumeration as well as data from the /etc/ajenti/config.yml file. This attack appears to be exploitable via network connectivity to the web application. | [] | null | null | null | null |
CVE-2009-2727 | Stack-based buffer overflow in the _tt_internal_realpath function in the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10, and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf, allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII string to remote procedure 15. | [
"cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:6.1.2:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-m5mh-rmcg-x9pm | Missing Authorization vulnerability in Prasad Kirpekar WP Meta and Date Remover allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Meta and Date Remover: from n/a through 2.3.0. | [] | null | 5.4 | null | null |
|
CVE-2017-9128 | The quicktime_video_width function in lqt_quicktime.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted mp4 file. | [
"cpe:2.3:a:libquicktime:libquicktime:1.2.4:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2024-26306 | iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. | [] | null | 5.9 | null | null |
|
CVE-2025-37869 | drm/xe: Use local fence in error path of xe_migrate_clear | In the Linux kernel, the following vulnerability has been resolved:
drm/xe: Use local fence in error path of xe_migrate_clear
The intent of the error path in xe_migrate_clear is to wait on locally
generated fence and then return. The code is waiting on m->fence which
could be the local fence but this is only stable under the job mutex
leading to a possible UAF. Fix code to wait on local fence.
(cherry picked from commit 762b7e95362170b3e13a8704f38d5e47eca4ba74) | [] | null | null | null | null |
CVE-2017-12671 | In ImageMagick 7.0.6-3, a missing NULL assignment was found in coders/png.c, leading to an invalid free in the function RelinquishMagickMemory in MagickCore/memory.c, which allows attackers to cause a denial of service. | [
"cpe:2.3:a:imagemagick:imagemagick:7.0.6-3:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2013-3703 | No write permission check in change_role command | The controller of the Open Build Service API prior to version 2.4.4 is missing a write permission check, allowing an authenticated attacker to add or remove user roles from packages and/or project meta data. | [
"cpe:2.3:a:opensuse:open_build_service:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
CVE-2022-4275 | House Rental System POST Request search-property.php sql injection | A vulnerability has been found in House Rental System and classified as critical. Affected by this vulnerability is an unknown functionality of the file search-property.php of the component POST Request Handler. The manipulation of the argument search_property leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214771. | [
"cpe:2.3:a:house_rental_system_project:house_rental_system:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-576m-4rvh-6rff | This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vulnerability.The specific flaw exists within the Toolgate component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the hypervisor. Was ZDI-CAN-11925. | [] | null | null | null | null |
|
GHSA-2qph-qpvm-2qf7 | tls-listener affected by the slow loris vulnerability with default configuration | SummaryWith the default configuration of tls-listener, a malicious user can open 6.4 `TcpStream`s a second, sending 0 bytes, and can trigger a DoS.DetailsThe default configuration options make any public service using `TlsListener::new()` vulnerable to a slow-loris DoS attack.PoCRunning the HTTP TLS server example: https://github.com/tmccombs/tls-listener/blob/6c57dea2d9beb1577ae4d80f6eaf03aad4ef3857/examples/http.rs, then running the following script will prevent new connections to the server.ImpactThis is an instance of a [slow-loris attack](https://en.wikipedia.org/wiki/Slowloris_(computer_security)). This impacts any publically accessible service using the default configuration of `tls-listener`MitigationPrevious versions can mitigate this by passing a large value, such as `usize::MAX` as the parameter to `Builder::max_handshakes`. | [] | null | 7.5 | null | null |
CVE-2025-46714 | Sandboxie has Pool Buffer Overflow in SbieDrv.sys API (API_GET_SECURE_PARAM) | Sandboxie is a sandbox-based isolation software for 32-bit and 64-bit Windows NT-based operating systems. Starting in version 1.3.0 and prior to 1.15.12, API_GET_SECURE_PARAM has an arithmetic overflow leading to a small memory allocation and then a extremely large copy into the small allocation. Version 1.15.12 fixes the issue. | [] | null | 7.8 | null | null |
CVE-2017-7429 | Fix for NetIQ shell code upload | The certificate upload in NetIQ eDirectory PKI plugin before 8.8.8 Patch 10 Hotfix 1 could be abused to upload JSP code which could be used by authenticated attackers to execute JSP applets on the iManager server. | [
"cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netiq:edirectory:8.8.8:patch10:*:*:*:*:*:*",
"cpe:2.3:a:netiq:edirectory:8.8.8:patch5:*:*:*:*:*:*",
"cpe:2.3:a:netiq:edirectory:8.8.8:patch6:*:*:*:*:*:*",
"cpe:2.3:a:netiq:edirectory:8.8.8:patch7:*:*:*:*:*:*",
"cpe:2.3:a:netiq:edirectory:8.8.8:patch8:*:*:*:*:*:*",
"cpe:2.3:a:netiq:edirectory:8.8.8:patch9:*:*:*:*:*:*"
] | null | null | 8.8 | null |
CVE-2018-6394 | SQL Injection exists in the InviteX 3.0.5 component for Joomla! via the invite_type parameter in a view=invites action. | [
"cpe:2.3:a:techjoomla:invitex:3.0.5:*:*:*:*:joomla\\!:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-g56r-vrhv-7536 | Windows Media Photo Codec Information Disclosure Vulnerability | [] | null | 5.7 | null | null |
|
CVE-2016-2531 | Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530. | [
"cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.12.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2010-3832 | Heap-based buffer overflow in the GSM mobility management implementation in Telephony in Apple iOS before 4.2 on the iPhone and iPad allows remote attackers to execute arbitrary code on the baseband processor via a crafted Temporary Mobile Subscriber Identity (TMSI) field. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:h:apple:ipad:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2007-3976 | SQL injection vulnerability in index.php in bwired allows remote attackers to execute arbitrary SQL commands via the newsID parameter. | [
"cpe:2.3:a:bwired:bwired:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-9895 | Smart Online Order for Clover <= 1.5.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via moo_receipt_link Shortcode | The Smart Online Order for Clover plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's moo_receipt_link shortcode in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:zaytech:smart_online_order_for_clover:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
ICSA-22-284-03 | Sensormatic Electronics C-CURE 9000 | Sensormatic Electronics C•CURE 9000, version 2.90 and prior, provides responses to incoming requests that could reveal internal state information to an unauthorized user.CVE-2021-36201 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | 4.3 | null |
CVE-2014-7739 | The Anahi A Adopter FR (aka com.wAnahiAAdopterFR) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:deceiver:anahi_a_adopter_fr:0.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-c5g2-f738-9q44 | An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version 7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs. | [] | null | 4.3 | null | null |
|
CVE-2025-23474 | WordPress Live Dashboard plugin <= 0.3.3 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mike Martel Live Dashboard allows Reflected XSS. This issue affects Live Dashboard: from n/a through 0.3.3. | [] | null | 7.1 | null | null |
CVE-2017-7081 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-j86v-4vf3-rfmv | Acrobat Reader DC versions 2020.013.20066 (and earlier), 2020.001.30010 (and earlier) and 2017.011.30180 (and earlier) are affected by an information exposure vulnerability, that could enable an attacker to get a DNS interaction and track if the user has opened or closed a PDF file when loaded from the filesystem without a prompt. User interaction is required to exploit this vulnerability. | [] | null | null | null | null |
|
CVE-2010-2091 | Microsoft Outlook Web Access (OWA) 8.2.254.0, when Internet Explorer 7 on Windows Server 2003 is used, does not properly handle the id parameter in a Folder IPF.Note action to the default URI, which might allow remote attackers to obtain sensitive information or conduct cross-site scripting (XSS) attacks via an invalid value. | [
"cpe:2.3:a:microsoft:exchange_server:2007:sp2_update_rollup_4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-48659 | mm/slub: fix to return errno if kmalloc() fails | In the Linux kernel, the following vulnerability has been resolved:
mm/slub: fix to return errno if kmalloc() fails
In create_unique_id(), kmalloc(, GFP_KERNEL) can fail due to
out-of-memory, if it fails, return errno correctly rather than
triggering panic via BUG_ON();
kernel BUG at mm/slub.c:5893!
Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
Call trace:
sysfs_slab_add+0x258/0x260 mm/slub.c:5973
__kmem_cache_create+0x60/0x118 mm/slub.c:4899
create_cache mm/slab_common.c:229 [inline]
kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335
kmem_cache_create+0x1c/0x28 mm/slab_common.c:390
f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline]
f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808
f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149
mount_bdev+0x1b8/0x210 fs/super.c:1400
f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512
legacy_get_tree+0x30/0x74 fs/fs_context.c:610
vfs_get_tree+0x40/0x140 fs/super.c:1530
do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040
path_mount+0x358/0x914 fs/namespace.c:3370
do_mount fs/namespace.c:3383 [inline]
__do_sys_mount fs/namespace.c:3591 [inline]
__se_sys_mount fs/namespace.c:3568 [inline]
__arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2022-38935 | An issue was discovered in NiterForum version 2.5.0-beta in /src/main/java/cn/niter/forum/api/SsoApi.java and /src/main/java/cn/niter/forum/controller/AdminController.java, allows attackers to gain escalated privileges. | [
"cpe:2.3:a:niter:niterforum:2.5.0:beta:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2005-2723 | SQL injection vulnerability in auth.php in PaFileDB 3.1, when authmethod is set to cookies, allows remote attackers to execute arbitrary SQL commands via the username value in the pafiledbcookie cookie. | [
"cpe:2.3:a:php_arena:pafiledb:3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2012-1567 | LinuxMint as of 2012-03-19 has temporary file creation vulnerabilities in mintUpdate. | [
"cpe:2.3:o:linuxmint:linuxmint:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-g276-jg34-q58g | A post-authentication command injection vulnerability in the “account_operator.cgi” CGI program of Zyxel USG FLEX series firmware versions 4.50 through 5.35, and VPN series firmware versions 4.30 through 5.35, which could allow a remote authenticated attacker to modify device configuration data, resulting in denial-of-service (DoS) conditions on an affected device. | [] | null | 8.1 | null | null |
|
GHSA-v4fx-vr9m-2x7v | Dell EMC SupportAssist Enterprise version 1.1 creates a local Windows user account named "OMEAdapterUser" with a default password as part of the installation process. This unnecessary user account also remains even after an upgrade from v1.1 to v1.2. Access to the management console can be achieved by someone with knowledge of the default password. If SupportAssist Enterprise is installed on a server running OpenManage Essentials (OME), the OmeAdapterUser user account is added as a member of the OmeAdministrators group for the OME. An unauthorized person with knowledge of the default password and access to the OME web console could potentially use this account to gain access to the affected installation of OME with OmeAdministrators privileges. This is fixed in version 1.2.1. | [] | null | null | 7 | null |
|
CVE-2024-7770 | Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress <= 6.5.5 - Authenticated (Subscriber+) Arbitrary File Upload | The Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload' function in all versions up to, and including, 6.5.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted upload permissions by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. | [
"cpe:2.3:a:bitpressadmin:bit_file_manager_wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bitapps:file_manager:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
CVE-2019-25022 | An issue was discovered in Scytl sVote 2.1. An attacker can inject code that gets executed by creating an election-event and injecting a payload over an event alias, because the application calls Runtime.getRuntime().exec() without validation. | [
"cpe:2.3:a:scytl:secure_vote:2.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2015-1593 | The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x64:*"
] | null | null | null | 5 |
|
CVE-2016-3342 | The Common Log File System (CLFS) driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka "Windows Common Log File System Driver Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3334, CVE-2016-3335, CVE-2016-3338, CVE-2016-3340, CVE-2016-3343, and CVE-2016-7184. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
GHSA-w674-fffm-2frx | Google Chrome before 7.0.517.41 does not properly handle animated GIF images, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted image. | [] | null | 7.8 | null | null |
|
GHSA-r858-gg25-px8p | An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function Gfx::opSetFillColorN() located in Gfx.cc. It allows an attacker to cause code Execution. | [] | null | null | null | null |
|
CVE-2022-37988 | Windows Kernel Elevation of Privilege Vulnerability | Windows Kernel Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2021-37541 | In JetBrains Hub before 2021.1.13402, HTML injection in the password reset email was possible. | [
"cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2023-48727 | NULL pointer dereference in some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable information disclosure via local access. | [
"cpe:2.3:a:intel:media_sdk:-:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:onevpl_gpu_runtime:*:*:*:*:*:*:*:*"
] | null | 3.3 | null | null |
|
CVE-2022-32781 | This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monterey 12.4, iOS 15.5 and iPadOS 15.5, Security Update 2022-005 Catalina, macOS Big Sur 11.6.8. An app with root privileges may be able to access private information. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
CVE-2019-8841 | An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.3 and iPadOS 13.3. An application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
CVE-2024-50695 | SunGrow WiNet-SV200.001.00.P027 and earlier versions is vulnerable to stack-based buffer overflow when parsing MQTT messages, due to missing MQTT topic bounds checks. | [] | null | 9.8 | null | null |
|
GHSA-594j-mv6x-7qw2 | The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6. | [] | null | null | null | null |
|
CVE-2010-2703 | Stack-based buffer overflow in the execvp_nc function in the ov.dll module in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53, when running on Windows, allows remote attackers to execute arbitrary code via a long HTTP request to webappmon.exe. | [
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2024-33800 | A SQL injection vulnerability in /model/get_student1.php in campcodes Complete Web-Based School Management System 1.0 allows an attacker to execute arbitrary SQL commands via the index parameter. | [
"cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-rfmr-h435-xpqx | Use after free in media in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chrome security severity: High) | [] | null | 8.8 | null | null |
|
CVE-2018-17401 | The PhonePe wallet (aka com.PhonePe.app) application 3.0.6 through 3.3.26 for Android might allow attackers to perform Account Takeover attacks by exploiting its Forgot Password feature. NOTE: the vendor says that, to exploit this, the user has to explicitly install a malicious app and provide accessibility permission to the malicious app, that the Android platform provides fair warnings to the users before turning on accessibility for any application, and that it believes it is similar to installing malicious keyboards, or malicious apps taking screenshots | [
"cpe:2.3:a:phonepe:phonepe:*:*:*:*:*:android:*:*"
] | null | null | 8.8 | 4.3 |
|
GHSA-322g-44wj-2m39 | An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can cause a denial of service by sending a cleartext encryption pause request. | [] | null | 6.5 | null | null |
|
CVE-2008-2645 | Multiple PHP remote file inclusion vulnerabilities in Brim (formerly Booby) 1.0.1 allow remote attackers to execute arbitrary PHP code via a URL in the renderer parameter to template.tpl.php in (1) barrel/, (2) barry/, (3) mylook/, (4) oerdec/, (5) penguin/, (6) sidebar/, (7) slashdot/, and (8) text-only/ in templates/. NOTE: this can also be leveraged to include and execute arbitrary local files via directory traversal sequences. | [
"cpe:2.3:a:brim-project:brim:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-6qvp-39mm-95v8 | com.xwiki.confluencepro:application-confluence-migrator-pro-ui Remote Code Execution via unescaped translations | ImpactA user that doesn't have programming rights can execute arbitrary code when creating a page using the Migration Page template.
A possible attack vector is the following:Create a page and add the following content:Use the object editor to add an object of type `XWiki.TranslationDocumentClass` with scope `USER`.Access an unexisting page using the `MigrationTemplate`It is expected that `{{/html}} {{async async="true" cached="false" context="doc.reference"}}{{groovy}}println("hello from groovy!"){{/groovy}}{{/async}}` will be present on the page, however, `hello from groovy` will be printed.PatchesThe issue will be fixed as part of v1.2. The fix was added with commit [35cef22](https://github.com/xwikisas/application-confluence-migrator-pro/commit/36cef2271bd429773698ca3a21e47b6d51d6377d)WorkaroundsThere are no known workarounds besides upgrading.ReferencesNo references. | [] | null | 9.1 | null | null |
CVE-2017-16128 | The module npm-script-demo opened a connection to a command and control server. It has been removed from the npm registry. | [
"cpe:2.3:a:npm-script-demo_project:npm-script-demo:0.0.1:*:*:*:*:node.js:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2010-4365 | SQL injection vulnerability in JE Ajax Event Calendar (com_jeajaxeventcalendar) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the event_id parameter in an alleventlist_more action to index.php. | [
"cpe:2.3:a:harmistechnology:com_jeajaxeventcalendar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
RHSA-2017:0183 | Red Hat Security Advisory: squid34 security update | squid: Information disclosure in HTTP request processing | [
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 5.3 | null |
GHSA-v482-hq83-hpfg | InDesign Desktop versions ID18.5.3, ID19.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 5.5 | null | null |
|
GHSA-7fmq-qw39-x2x2 | In the Linux kernel, the following vulnerability has been resolved:drm/drv: Fix potential memory leak in drm_dev_init()drm_dev_init() will add drm_dev_init_release() as a callback. When
drmm_add_action() failed, the release function won't be added. As the
result, the ref cnt added by device_get() in drm_dev_init() won't be put
by drm_dev_init_release(), which leads to the memleak. Use
drmm_add_action_or_reset() instead of drmm_add_action() to prevent
memleak.unreferenced object 0xffff88810bc0c800 (size 2048):
comm "modprobe", pid 8322, jiffies 4305809845 (age 15.292s)
hex dump (first 32 bytes):
e8 cc c0 0b 81 88 ff ff ff ff ff ff 00 00 00 00 ................
20 24 3c 0c 81 88 ff ff 18 c8 c0 0b 81 88 ff ff $<.............
backtrace:
[<000000007251f72d>] __kmalloc+0x4b/0x1c0
[<0000000045f21f26>] platform_device_alloc+0x2d/0xe0
[<000000004452a479>] platform_device_register_full+0x24/0x1c0
[<0000000089f4ea61>] 0xffffffffa0736051
[<00000000235b2441>] do_one_initcall+0x7a/0x380
[<0000000001a4a177>] do_init_module+0x5c/0x230
[<000000002bf8a8e2>] load_module+0x227d/0x2420
[<00000000637d6d0a>] __do_sys_finit_module+0xd5/0x140
[<00000000c99fc324>] do_syscall_64+0x3f/0x90
[<000000004d85aa77>] entry_SYSCALL_64_after_hwframe+0x63/0xcd | [] | null | null | null | null |
|
CVE-2014-7497 | The Portfolium (aka com.wPortfolium) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:portfolium_project:portfolium:0.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-xq9j-rj57-v855 | Research Artisan Lite before 1.18 does not ensure that a user has authenticated, which allows remote attackers to perform unspecified actions via unknown vectors. | [] | null | null | null | null |
|
GHSA-j494-7x2v-vvvp | mx-chain-go's relayed transactions always increment nonce | ImpactWhen executing a relayed transaction, if the inner transaction failed, it would have increased the inner transaction's sender account nonce. This could have contributed to a limited DoS attack on a targeted account. The fix is a breaking change so a new flag `RelayedNonceFixEnableEpoch` was needed. This was a strict processing issue while validating blocks on a chain.Patchesv1.4.17 and later versions contain the fix for this issueWorkaroundsthere were no workarounds for this issue. The affected account could only wait for the DoS attack to finish as the attack was not free or to attempt to send transactions in a very fast manner so as to compete on the same nonce with the attacker.ReferencesFor the future understanding of this issue, on v1.4.17 and onwards versions, we have this integration test that addresses the issue and tests the fix.
https://github.com/multiversx/mx-chain-go/blob/babdb144f1316ab6176bf3dbd7d4621120414d43/integrationTests/vm/txsFee/relayedMoveBalance_test.go#LL165C14-L165C14 | [] | null | 7.1 | null | null |
GHSA-hrww-g57w-hvr9 | rConfig 3.9.5 could allow a remote authenticated attacker to execute arbitrary code on the system, because of an error in the search.crud.php script. An attacker could exploit this vulnerability using the nodeId parameter. | [] | null | null | null | null |
|
GHSA-2cg8-626m-7pjv | Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [] | null | null | 7.5 | null |
|
GHSA-48c6-w667-vv6w | An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands. | [] | null | 7.8 | null | null |
|
CVE-2020-5347 | Dell EMC Isilon OneFS versions 8.2.2 and earlier contain a denial of service vulnerability. SmartConnect had an error condition that may be triggered to loop, using CPU and potentially preventing other SmartConnect DNS responses. | [
"cpe:2.3:a:dell:emc_isilon_onefs:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
GHSA-56mf-wc59-ghx4 | axTLS version 1.5.3 has a coding error in the ASN.1 parser resulting in the year (19)50 of UTCTime being misinterpreted as 2050. | [] | null | null | 5.3 | null |
|
CVE-2018-16156 | In PaperStream IP (TWAIN) 1.42.0.5685 (Service Update 7), the FJTWSVIC service running with SYSTEM privilege processes unauthenticated messages received over the FjtwMkic_Fjicube_32 named pipe. One of these message processing functions attempts to dynamically load the UninOldIS.dll library and executes an exported function named ChangeUninstallString. The default install does not contain this library and therefore if any DLL with that name exists in any directory listed in the PATH variable, it can be used to escalate to SYSTEM level privilege. | [
"cpe:2.3:a:fujitsu:paperstream_ip_\\(twain\\):1.42.0.5685:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 |
|
RHSA-2022:1463 | Red Hat Security Advisory: Red Hat Single Sign-On 7.5.2 security update on RHEL 8 | log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern | [
"cpe:/a:redhat:red_hat_single_sign_on:7.5::el8"
] | null | 5.9 | null | null |
CVE-2021-42092 | An issue was discovered in Zammad before 4.1.1. Stored XSS may occur via an Article during addition of an attachment to a Ticket. | [
"cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-j269-qhvq-9q42 | A vulnerability was found in Album Lock 4.0 and classified as critical. Affected by this issue is some unknown functionality of the file /getImage. The manipulation of the argument filePaht leads to path traversal. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. | [] | null | 5.5 | null | null |
|
CVE-2008-4988 | pscal in xcal 4.1 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/pscal##### temporary file. | [
"cpe:2.3:a:lars_bahner:xcal:4.1:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
GHSA-m5gq-rxm3-279g | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ProfilePress Membership Team Paid Membership Plugin, Ecommerce, Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin <= 4.5.3 versions. | [] | null | 6.1 | null | null |
|
CVE-2025-2531 | Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability | Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of dae files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23704. | [] | null | null | 7.8 | null |
CVE-2013-4559 | lighttpd before 1.4.33 does not check the return value of the (1) setuid, (2) setgid, or (3) setgroups functions, which might cause lighttpd to run as root if it is restarted and allows remote attackers to gain privileges, as demonstrated by multiple calls to the clone function that cause setuid to fail when the user process limit is reached. | [
"cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
] | null | null | null | 7.6 |
|
GHSA-xw4g-gmmj-5g3m | Improper Authorization vulnerability in Drupal Open Social allows Collect Data from Common Resource Locations.This issue affects Open Social: from 0.0.0 before 12.0.5. | [] | null | 9.1 | null | null |
|
CVE-2009-0570 | Directory traversal vulnerability in send.php in Ninja Designs Mailist 3.0, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the load parameter. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:ninjadesigns:mailist:3.0:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
GHSA-h5wf-5g96-9fxx | In aoc_service_set_read_blocked of aoc.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-270148537References: N/A | [] | null | 6.7 | null | null |
|
GHSA-8p5w-j26w-7656 | The specific function in ASUS BMC’s firmware Web management page (ActiveX configuration-2 acquisition) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. | [] | null | null | null | null |
|
GHSA-wq96-x226-v8pj | The Netscape Directory Server installation procedure leaves sensitive information in a file that is accessible to local users. | [] | null | null | null | null |
|
GHSA-779h-xx5r-h8f3 | Adobe Creative Cloud Desktop Application versions 4.4.1.298 and earlier have an exploitable Improper input validation vulnerability. Successful exploitation could lead to local privilege escalation. | [] | null | null | 7.8 | null |
|
GHSA-6q2p-jv44-v825 | Direct static code injection vulnerability in admin/settings.php in MyBlog 0.9.8 and earlier allows remote authenticated admin users to inject arbitrary PHP code via the content parameter, which can be executed by accessing index.php. NOTE: a separate vulnerability could be leveraged to make this issue exploitable by remote unauthenticated attackers. | [] | null | null | null | null |
|
GHSA-r9ww-rg22-c2wc | The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structure with invalid addresses in the 0x80052110 IOCTL. | [] | null | null | null | null |
|
PYSEC-2021-104 | null | Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. The problem has been fixed in Zope 5.21 and 4.6.1. The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. | [] | null | null | null | null |
RHSA-2012:1366 | Red Hat Security Advisory: kernel security and bug fix update | kernel: sfc: potential remote denial of service through TCP MSS option | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2011-5272 | SQL injection vulnerability in Domain Technologie Control (DTC) before 0.34.1 allows remote authenticated users to execute arbitrary SQL commands via the vps_note parameter to dtcadmin/logPushlet.php. NOTE: this issue was originally part of CVE-2011-3197, but that ID was SPLIT due to different researchers. | [
"cpe:2.3:a:gplhost:domain_technologie_control:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.24.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.25.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.25.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.25.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.26.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.26.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.26.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.27.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.28.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.29.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.30.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.30.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.30.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.30.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.30.20:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gplhost:domain_technologie_control:0.32.7:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
GHSA-gc6m-q9f7-723r | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] | null | 5.4 | null | null |
|
CVE-2022-3745 | A potential vulnerability was discovered in LCFC BIOS for some Lenovo consumer notebook models that could allow a local attacker with elevated privileges to view incoming and returned data from SMI. | [
"cpe:2.3:o:lenovo:ideapad_1_14iau7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1_14iau7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_1_14igl7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1_14igl7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_1_15iau7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1_15iau7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_1_15igl7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1_15igl7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_1-14ijl7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1-14ijl7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_1-15ijl7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1-15ijl7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3_14iau7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3_14iau7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3_15iau7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3_15iau7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3_17iau7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3_17iau7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15igl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15igl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5_15ial7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5_15ial7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5-15itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5-15itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l3-15iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l3-15iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l3-15itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l3-15itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_15iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_15iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_15iah7h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_15iah7h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro_16iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro_16iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro_16iah7h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro_16iah7h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15imh05h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15imh05h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15imh6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15imh6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17imh05h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17imh05h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5p-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5p-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5p-15imh05h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5p-15imh05h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_7_16iax7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_7_16iax7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_7-16ithg6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_7-16ithg6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s14_g2_itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s14_g2_itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s14_g3_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s14_g3_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7_14iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7_14iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7_carbon_13iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7_carbon_13iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7_prox_14iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7_prox_14iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_9_14iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_9_14iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15p_imh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15p_imh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g2_ijl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g2_ijl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g3_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g3_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g2_ijl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g2_ijl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g3_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g3_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v17_g3_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v17_g3_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s540-13itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s540-13itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7_pro-14ihu5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7_pro-14ihu5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_9-14itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_9-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15p_g2_ith_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15p_g2_ith:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g1-iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g1-iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g2-itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g2-itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-igl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-igl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g1-iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g1-iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g2-itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g2-itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15-igl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15-igl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v17_g2-itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v17_g2-itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v17-iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v17-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7_14ial7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7_14ial7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7_16iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7_16iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7_16iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7_16iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7-14itl5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7-14itl5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7-15itl5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7-15itl5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_9_14iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_9_14iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_carbon_13iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_carbon_13iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro_14iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro_14iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro_14iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro_14iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ihu5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ihu5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ihu5_o_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ihu5_o:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14itl5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14itl5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_prox_14iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_prox_14iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_9_14iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_9_14iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_9-14itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_9-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14igl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14igl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5-15iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_creator_5-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_creator_5-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_gaming_3-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_gaming_3-15imh05:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | null |
|
GHSA-fcgj-qg8m-28wx | Use after free in Tab Strip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.