id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2019-14400
|
cPanel before 78.0.18 allows local users to escalate to root access because of userdata cache misparsing (SEC-479).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2020-9977
|
A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.0 and iPadOS 14.0. A malicious application may be able to determine a user's open tabs in Safari.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-m9f8-wwhq-rgp2
|
An issue was discovered on Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges on the device via poor credential management.
|
[] | null | 9.8 | null | null | null |
|
CVE-2006-3727
|
Multiple SQL injection vulnerabilities in Eskolar CMS 0.9.0.0 allow remote attackers to execute arbitrary SQL commands via the (1) gr_1_id, (2) gr_2_id, (3) gr_3_id, and (4) doc_id parameters in (a) index.php; the (5) uid and (6) pwd parameters in (b) php/esa.php; and possibly other vectors related to files in php/lib/ including (c) del.php, (d) download_backup.php, (e) navig.php, (f) restore.php, (g) set_12.php, (h) set_14.php, and (i) upd_doc.php.
|
[
"cpe:2.3:a:eskolar_cms:eskolar_cms:0.9.0.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
cisco-sa-amp-redirect-rQ2Bu7dU
|
Cisco Orbital Open Redirect Vulnerability
|
A vulnerability in the web-based management interface of Cisco Orbital could allow an unauthenticated, remote attacker to redirect users to a malicious webpage.
This vulnerability is due to improper validation of URL paths in the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted URL. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability, known as an open redirect attack, is used in phishing attacks to persuade users to visit malicious sites.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU"]
|
[] | null | 4.7 | null | null | null |
GHSA-pv82-pww5-29fv
|
The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
|
[] | null | null | 4.6 | null | null |
|
GHSA-r5wv-5gpc-84mq
|
Zimbra Collaboration before 8.6.0 patch5 has XSS.
|
[] | null | null | null | null | null |
|
ICSA-20-182-02
|
Mitsubishi Electric Factory Automation Engineering Software Products
|
The vulnerability could allow a malicious attacker to send a file on the computer running the product to the outside.CVE-2020-5602 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The vulnerability could allow a malicious attacker to cause the product to enter a denial-of-service condition.CVE-2020-5603 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | null | 7.5 | null | null |
GHSA-6jhq-gx6q-28qv
|
An array index error in the fig2dev program in Xfig 3.2.6a allows remote attackers to cause a denial-of-service attack or information disclosure with a maliciously crafted Fig format file, related to a negative font value in dev/gentikz.c, and the read_textobject functions in read.c and read1_3.c.
|
[] | null | null | 7.1 | null | null |
|
CVE-2023-52439
|
uio: Fix use-after-free in uio_open
|
In the Linux kernel, the following vulnerability has been resolved:
uio: Fix use-after-free in uio_open
core-1 core-2
-------------------------------------------------------
uio_unregister_device uio_open
idev = idr_find()
device_unregister(&idev->dev)
put_device(&idev->dev)
uio_device_release
get_device(&idev->dev)
kfree(idev)
uio_free_minor(minor)
uio_release
put_device(&idev->dev)
kfree(idev)
-------------------------------------------------------
In the core-1 uio_unregister_device(), the device_unregister will kfree
idev when the idev->dev kobject ref is 1. But after core-1
device_unregister, put_device and before doing kfree, the core-2 may
get_device. Then:
1. After core-1 kfree idev, the core-2 will do use-after-free for idev.
2. When core-2 do uio_release and put_device, the idev will be double
freed.
To address this issue, we can get idev atomic & inc idev reference with
minor_lock.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-qpvh-wpmg-5vw6
|
Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program.
|
[] | null | null | null | null | null |
|
GHSA-339p-fqmm-2qfx
|
A vulnerability was found in xxyopen Novel-Plus 5.1.0. It has been classified as critical. This affects the function searchByPage of the file /book/searchByPage. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 6.3 | null | null | null |
|
GHSA-5fwx-p6xh-vjrh
|
Mattermost allows reading arbitrary files related to importing boards
|
Mattermost versions 10.4.x <= 10.4.1, 9.11.x <= 9.11.7, 10.3.x <= 10.3.2, 10.2.x <= 10.2.2 fail to properly validate board blocks when importing boards which allows an attacker could read any arbitrary file on the system via importing and exporting a specially crafted import archive in Boards.
|
[] | null | 9.9 | null | null | null |
CVE-2023-24140
|
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingNum parameter in the setNetworkDiag function.
|
[
"cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-6pgm-h8pf-fjp8
|
ZipTorrent 1.3.7.3 stores sensitive information in plaintext in the pref.txt file, which allows local users to obtain sensitive information such as proxy server information and passwords.
|
[] | null | null | null | null | null |
|
CVE-2025-1509
|
Show Me The Cookies <= 1.0 - Unauthenticated Arbitrary Shortcode Execution
|
The The Show Me The Cookies plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
|
[] | null | 7.3 | null | null | null |
CVE-2013-1742
|
Multiple cross-site scripting (XSS) vulnerabilities in editflagtypes.cgi in Bugzilla 2.x, 3.x, and 4.0.x before 4.0.11; 4.1.x and 4.2.x before 4.2.7; and 4.3.x and 4.4.x before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id or (2) sortkey parameter.
|
[
"cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.6\\+:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.18.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.21.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-ccmr-7m45-27wf
|
Stack-based buffer overflow in the DebugPrint function in MultiXTpm Application Server before 4.0.2d allows remote attackers to execute arbitrary code via a long string argument.
|
[] | null | null | null | null | null |
|
CVE-2012-1683
|
Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to gssd.
|
[
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*"
] | null | null | null | 5.9 | null |
|
CVE-2022-1869
|
Type Confusion in V8 in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-vj6h-9583-2qx2
|
Cross Site Scripting vulnerability in Leantime 3.0.6 allows a remote attacker to execute arbitrary code via the to-do title parameter.
|
[] | null | 5.4 | null | null | null |
|
GHSA-g6rf-7www-ggmp
|
Insecure permissions in measure-cold-start v1.4.1 allows attackers to escalate privileges and compromise the customer cloud account.
|
[] | null | 8.8 | null | null | null |
|
CVE-2019-11601
|
Path traversal in the backup & restore functionality of ProSyst mBS SDK and Bosch IoT Gateway Software
|
A directory traversal vulnerability in remote access to backup & restore in earlier versions than ProSyst mBS SDK 8.2.6 and Bosch IoT Gateway Software 9.2.0 allows remote attackers to write or delete files at any location.
|
[
"cpe:2.3:a:bosch:iot_gateway_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bosch:prosyst_mbs_sdk:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | null | null |
GHSA-rrc6-3p6m-fxc6
|
The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.
|
[] | null | null | null | null | null |
|
GHSA-wvgq-5h76-hrgf
|
The ArielBrailovsky-ViralAd plugin for WordPress is vulnerable to SQL Injection via the 'text' and 'id' parameters of the limpia() function in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only appears to be exploitable on very old versions of WordPress.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-1450
|
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 contains a vulnerability that could allow a local user to overwrite arbitrary files owned by the DB2 instance owner. IBM X-Force ID: 140045.
|
[
"cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 3.6 | null |
|
CVE-2023-30944
|
Moodle: minor sql injection risk in external wiki method for listing pages
|
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 5.6 | null | null | null |
CVE-2023-3460
|
Ultimate Member < 2.6.7 - Unauthenticated Privilege Escalation
|
The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild.
|
[
"cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null | null |
GHSA-mfvw-r6f7-mjcf
|
A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
|
[] | null | null | null | null | null |
|
GHSA-cmgf-649f-vw86
|
A cross-site request forgery vulnerability exists in Sola Testimonials versions prior to 3.0.0. If this vulnerability is exploited, an attacker allows a user who logs in to the WordPress site where the affected plugin is enabled to access a malicious page. As a result, the user may perform unintended operations on the WordPress site.
|
[] | null | 8.1 | null | null | null |
|
CVE-2019-5304
|
Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.
|
[
"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3600_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r003c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r008c50:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
GHSA-gr2q-rxqg-mrrq
|
An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information.When another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information.
This issue affects:Junos OS:All versions before 22.1R2-S2,22.1R3 and later versions,22.2 versions before 22.2R2-S1, 22.2R3,22.3 versions before 22.3R1-S2, 22.3R2;Junos OS Evolved:All versions before before 22.1R3-EVO,22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO,22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO.
|
[] | 4.2 | 6.3 | null | null | null |
|
GHSA-q7ff-8r5v-7hm4
|
Multiple directory traversal vulnerabilities in GuppY 4.5.9 and earlier allow remote attackers to read and include arbitrary files via (1) the meskin parameter to admin/editorTypetool.php, or the lng parameter to the in admin/inc scripts (2) archbatch.php, (3) dbbatch.php, and (4) nwlmail.php.
|
[] | null | null | null | null | null |
|
CVE-2023-27554
|
IBM WebSphere Application Server XML external entity injection
|
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 249185.
|
[
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null | null |
cisco-sa-stealthsmc-rce-sfNBPjcS
|
Cisco Secure Network Analytics Remote Code Execution Vulnerability
|
A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system.
This vulnerability is due to insufficient sanitization of user-provided data that is parsed into system memory. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the administrator user.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 8.8 | null | null | null |
CVE-2007-2314
|
Multiple SQL injection vulnerabilities in Crea-Book 1.0, and possibly earlier, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) pseudo or (2) passe parameter to (a) configurer.php, (b) connect.php, (c) delete.php, (d) delete2.php, (e) index.php, (f) infos.php, (g) membres.php, (h) modif-infos.php, (i) modif-message.php, (j) modif.php, (k) uninstall.php, or (l) uninstall_table.php in admin/, different vectors than CVE-2007-2000. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:crea-book:crea-book:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-w8gf-vcmf-6ww6
|
fusermount in FUSE before 2.4.1, if installed setuid root, allows local users to corrupt /etc/mtab and possibly modify mount options by performing a mount over a directory whose name contains certain special characters.
|
[] | null | null | null | null | null |
|
RHSA-2002:146
|
Red Hat Security Advisory: mod_ssl security update for Stronghold
|
security flaw
|
[
"cpe:/a:redhat:rhel_stronghold:4"
] | null | null | null | null | null |
GHSA-j65p-mxc9-p293
|
Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename.
|
[] | null | null | null | null | null |
|
GHSA-f29x-jxpj-xpfj
|
Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module.
|
[] | null | 8.8 | null | null | null |
|
GHSA-2wgh-rqx2-f94c
|
Pega Platform before 8.4.0 has a XSS issue via stream rule parameters used in the request header.
|
[] | null | null | null | null | null |
|
RHSA-2023:3292
|
Red Hat Security Advisory: httpd24-httpd security update
|
httpd: HTTP request splitting with mod_rewrite and mod_proxy
|
[
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 9.8 | null | null | null |
GHSA-f7qv-v8h9-5244
|
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
|
[] | null | 5.5 | null | null | null |
|
GHSA-792w-295c-v45g
|
The WordPress Button Plugin MaxButtons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 9.7.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Administrators can give button creation privileges to users with lower levels (contributor+) which would allow those lower-privileged users to carry out attacks.
|
[] | null | 4.4 | null | null | null |
|
RHSA-2014:0406
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: method handle call hierachy bypass (Libraries, 8032686) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
GHSA-mfqv-qjxh-rprm
|
A CWE-15 "External Control of System or Configuration Setting" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by authenticated users by restoring a tampered configuration backup.
|
[] | null | 7.2 | null | null | null |
|
GHSA-wp58-rvx4-98wm
|
Buffer overflow in Oreans Themida 2.1.8.0 allows remote attackers to execute arbitrary code via a crafted .TMD file.
|
[] | null | null | null | null | null |
|
CVE-2023-28210
|
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-j9j7-vrc8-64wq
|
A vulnerability was discovered in the firmware builds after 8.0.2.3267 and prior to 8.1.3.1301 in CCX devices. A flaw in the firmware build process did not properly restrict access to a resource from an unauthorized actor.
|
[] | null | 8.8 | null | null | null |
|
GHSA-pmv9-3xqp-8w42
|
Mesop has a local file Inclusion via static file serving functionality
|
A vulnerability has been discovered and fixed in Mesop that could potentially allow unauthorized access to files on the server hosting the Mesop application. The vulnerability was related to insufficient input validation in a specific endpoint. This could have allowed an attacker to access files not intended to be served.Users are strongly advised to update to the latest version of Mesop immediately. The latest version includes a fix for this vulnerability.We would like to thank @Letm3through for reporting this issue and proposing mitigations to address this issue.
|
[] | 8.7 | 7.5 | null | null | null |
RHSA-2019:2037
|
Red Hat Security Advisory: fence-agents security, bug fix, and enhancement update
|
fence-agents: mis-handling of non-ASCII characters in guest comment fields
|
[
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5 | null | null |
GHSA-g9v2-vqj8-j8cx
|
Improper Privilege Management vulnerability in Pandora FMS on all allows Privilege Escalation. This vulnerability allows an unauthorised user to escalate and read sensitive files as if they were root. This issue affects Pandora FMS: from 700 through 773.
|
[] | null | 8.5 | null | null | null |
|
GHSA-x5pq-ph4c-8g27
|
The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setactdir_func function.
|
[] | null | null | null | null | null |
|
RHSA-2024:1864
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 for OpenShift image enhancement and security update
|
keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
|
[
"cpe:/a:redhat:rhosemc:1.0::el8"
] | null | 7.5 | null | null | null |
RHSA-2024:4211
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack kernel: PCI interrupt mapping cause oops kernel: ovl: fix leaked dentry kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios kernel: net: cdc_eem: fix tx fixup skb leak kernel: net: ti: fix UAF in tlan_remove_one kernel: net: qcom/emac: fix UAF in emac_remove kernel: udf: Fix NULL pointer dereference in udf_symlink function kernel: mISDN: fix possible use-after-free in HFC_cleanup() kernel: can: peak_pci: peak_pci_remove(): fix UAF kernel: usbnet: sanity check for maxpacket kernel: block: null_blk: end timed out poll request kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: crypto: s390/aes - Fix buffer overread in CTR mode kernel: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() kernel: powerpc/powernv: Add a null pointer check in opal_event_init() kernel: tipc: fix kernel warning when sending SYN message kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path kernel: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET kernel: perf/core: Bail out early if the request AUX area is out of bound kernel: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: drm/amdgpu: use-after-free vulnerability kernel: ppp_async: limit MRU to 64K kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref kernel: mm/swap: fix race when skipping swapcache kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset kernel: net: ip_tunnel: prevent perpetual headroom growth kernel: mptcp: fix data re-injection from stale subflow kernel: net/bnx2x: Prevent access to a freed page in page_pool kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment kernel: crypto: qat - resolve race condition during AER recovery kernel: Squashfs: check the inode number is not the invalid value of zero kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: wifi: nl80211: reject iftype change with mesh ID change kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes kernel: net/mlx5e: fix a double-free in arfs_create_groups kernel: wifi: mac80211: fix potential sta-link leak kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update kernel: erspan: make sure erspan_base_hdr is present in skb->head kernel: gro: fix ownership transfer kernel: net: ena: Fix incorrect descriptor free behavior kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow kernel: net/mlx5: Properly link new fs rules into the tree kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue kernel: mlxsw: spectrum_acl_tcam: Fix warning during rehash kernel: scsi: mpi3mr: Sanitise num_phys
|
[
"cpe:/a:redhat:enterprise_linux:8::crb",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.3 | null | null | null |
CVE-2025-0063
|
SQL Injection vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
|
SAP NetWeaver AS ABAP and ABAP Platform does not check for authorization when a user executes some RFC function modules. This could lead to an attacker with basic user privileges to gain control over the data in Informix database, leading to complete compromise of confidentiality, integrity and availability.
|
[] | null | 8.8 | null | null | null |
GHSA-fpx2-fc33-q8qp
|
Huawei smart phones with earlier versions than ELLE-AL00B 9.1.0.222(C00E220R2P1) have a buffer overflow vulnerability. An attacker may intercept and tamper with the packet in the local area network (LAN) to exploit this vulnerability. Successful exploitation may cause the affected phone abnormal.
|
[] | null | null | null | null | null |
|
CVE-2018-20629
|
PHP Scripts Mall Charity Donation Script readymadeb2bscript has directory traversal via a direct request for a listing of an uploads directory such as the wp-content/uploads/2018/12 directory.
|
[
"cpe:2.3:a:charity_donation_script_project:charity_donation_script:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
CVE-2020-8878
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9625.
|
[
"cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null | null |
|
GHSA-3qg7-2p3j-xrqp
|
Product: AndroidVersions: Android SoCAndroid ID: A-278156680
|
[] | null | 9.8 | null | null | null |
|
GHSA-hqrm-74p3-w275
|
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
|
[] | null | 6.5 | null | null | null |
|
GHSA-fqv9-jjgw-rj7w
|
HCL Connections is vulnerable to a broken access control vulnerability that may allow an unauthorized user to update data in certain scenarios.
|
[] | null | 3.7 | null | null | null |
|
CVE-2023-3688
|
Bylancer QuickJob GET Parameter sql injection
|
A vulnerability classified as critical has been found in Bylancer QuickJob 6.1. Affected is an unknown function of the component GET Parameter Handler. The manipulation of the argument keywords/gender leads to sql injection. It is possible to launch the attack remotely. VDB-234234 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:bylancer:quickjob:6.1:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 | null |
GHSA-xpmv-q85x-8hh8
|
On the D-Link DIR-615 before v20.12PTb04, once authenticated, this device identifies the user based on the IP address of his machine. By spoofing the IP address belonging to the victim's host, an attacker might be able to take over the administrative session without being prompted for authentication credentials. An attacker can get the victim's and router's IP addresses by simply sniffing the network traffic. Moreover, if the victim has web access enabled on his router and is accessing the web interface from a different network that is behind the NAT/Proxy, an attacker can sniff the network traffic to know the public IP address of the victim's router and take over his session as he won't be prompted for credentials.
|
[] | null | 9.8 | null | null | null |
|
GHSA-9jrh-hch8-rr5c
|
Jenkins Copy To Slave Plugin allows access to arbitrary files on the Jenkins controller file system
|
An exposure of sensitive information vulnerability exists in Jenkins Copy To Slave Plugin version 1.4.4 and older in CopyToSlaveBuildWrapper.java that allows attackers with permission to configure jobs to read arbitrary files from the Jenkins master file system.
|
[] | null | null | 6.5 | null | null |
CVE-2020-3512
|
Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability
|
A vulnerability in the PROFINET handler for Link Layer Discovery Protocol (LLDP) messages of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a crash on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of LLDP messages in the PROFINET LLDP message handler. An attacker could exploit this vulnerability by sending a malicious LLDP message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload.
|
[
"cpe:2.3:o:cisco:ios_xe:15.2\\(7\\)e:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-2y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48pxg-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9200l-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:connected_grid_switch_2520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ess_2020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ess_3300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-2000u-16tc-g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-2000u-16tc-g-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-2000u-16tc-gp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-2000u-4s-g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-2000u-4t-gs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-2000u-4ts-g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-2000u-8tc-g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3200-8p2s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3200-8t2s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3300-8p2s-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3300-8p2s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3300-8t2s-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3300-8t2s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3300-8t2x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3300-8t2x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3300-8u2x-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3300-8u2x-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3400-8p2s-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3400-8p2s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3400-8t2s-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-3400-8t2s-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-16gt4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-16t4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-4s8p4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-4t4p4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-4tc4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-8gs4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-8gt4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-8s4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4000-8t4g-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-5000-12s12p-10g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie-5000-16s12p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3300-14t2s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3300-16p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3300-16t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3300-4mu-2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3300-6t2s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3300-8p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3300-8s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3300-8t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3400-8p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3400-8s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:iem-3400-8t:-:*:*:*:*:*:*:*"
] | null | null | 7.4 | null | null |
GHSA-mfqw-4fff-fg2r
|
An issue was discovered in Roche Accu-Chek Inform II Base Unit / Base Unit Hub before 03.01.04 and CoaguChek / cobas h232 Handheld Base Unit before 03.01.04. Insecure permissions in a service interface may allow authenticated attackers in the adjacent network to execute arbitrary commands on the operating system.
|
[] | null | null | 8 | null | null |
|
CVE-2024-26989
|
arm64: hibernate: Fix level3 translation fault in swsusp_save()
|
In the Linux kernel, the following vulnerability has been resolved:
arm64: hibernate: Fix level3 translation fault in swsusp_save()
On arm64 machines, swsusp_save() faults if it attempts to access
MEMBLOCK_NOMAP memory ranges. This can be reproduced in QEMU using UEFI
when booting with rodata=off debug_pagealloc=off and CONFIG_KFENCE=n:
Unable to handle kernel paging request at virtual address ffffff8000000000
Mem abort info:
ESR = 0x0000000096000007
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x07: level 3 translation fault
Data abort info:
ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000
CM = 0, WnR = 0, TnD = 0, TagAccess = 0
GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
swapper pgtable: 4k pages, 39-bit VAs, pgdp=00000000eeb0b000
[ffffff8000000000] pgd=180000217fff9803, p4d=180000217fff9803, pud=180000217fff9803, pmd=180000217fff8803, pte=0000000000000000
Internal error: Oops: 0000000096000007 [#1] SMP
Internal error: Oops: 0000000096000007 [#1] SMP
Modules linked in: xt_multiport ipt_REJECT nf_reject_ipv4 xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_filter bpfilter rfkill at803x snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg dwmac_generic stmmac_platform snd_hda_codec stmmac joydev pcs_xpcs snd_hda_core phylink ppdev lp parport ramoops reed_solomon ip_tables x_tables nls_iso8859_1 vfat multipath linear amdgpu amdxcp drm_exec gpu_sched drm_buddy hid_generic usbhid hid radeon video drm_suballoc_helper drm_ttm_helper ttm i2c_algo_bit drm_display_helper cec drm_kms_helper drm
CPU: 0 PID: 3663 Comm: systemd-sleep Not tainted 6.6.2+ #76
Source Version: 4e22ed63a0a48e7a7cff9b98b7806d8d4add7dc0
Hardware name: Greatwall GW-XXXXXX-XXX/GW-XXXXXX-XXX, BIOS KunLun BIOS V4.0 01/19/2021
pstate: 600003c5 (nZCv DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : swsusp_save+0x280/0x538
lr : swsusp_save+0x280/0x538
sp : ffffffa034a3fa40
x29: ffffffa034a3fa40 x28: ffffff8000001000 x27: 0000000000000000
x26: ffffff8001400000 x25: ffffffc08113e248 x24: 0000000000000000
x23: 0000000000080000 x22: ffffffc08113e280 x21: 00000000000c69f2
x20: ffffff8000000000 x19: ffffffc081ae2500 x18: 0000000000000000
x17: 6666662074736420 x16: 3030303030303030 x15: 3038666666666666
x14: 0000000000000b69 x13: ffffff9f89088530 x12: 00000000ffffffea
x11: 00000000ffff7fff x10: 00000000ffff7fff x9 : ffffffc08193f0d0
x8 : 00000000000bffe8 x7 : c0000000ffff7fff x6 : 0000000000000001
x5 : ffffffa0fff09dc8 x4 : 0000000000000000 x3 : 0000000000000027
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 000000000000004e
Call trace:
swsusp_save+0x280/0x538
swsusp_arch_suspend+0x148/0x190
hibernation_snapshot+0x240/0x39c
hibernate+0xc4/0x378
state_store+0xf0/0x10c
kobj_attr_store+0x14/0x24
The reason is swsusp_save() -> copy_data_pages() -> page_is_saveable()
-> kernel_page_present() assuming that a page is always present when
can_set_direct_map() is false (all of rodata_full,
debug_pagealloc_enabled() and arm64_kfence_can_set_direct_map() false),
irrespective of the MEMBLOCK_NOMAP ranges. Such MEMBLOCK_NOMAP regions
should not be saved during hibernation.
This problem was introduced by changes to the pfn_valid() logic in
commit a7d9f306ba70 ("arm64: drop pfn_valid_within() and simplify
pfn_valid()").
Similar to other architectures, drop the !can_set_direct_map() check in
kernel_page_present() so that page_is_savable() skips such pages.
[[email protected]: rework commit message]
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2021-31505
|
This vulnerability allows attackers with physical access to escalate privileges on affected installations of Arlo Q Plus 1.9.0.3_278. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SSH service. The device can be booted into a special operation mode where hard-coded credentials are accepted for SSH authentication. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-12890.
|
[
"cpe:2.3:o:arlo:q_plus_firmware:1.9.0.3_278:*:*:*:*:*:*:*",
"cpe:2.3:h:arlo:q_plus:-:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
|
GHSA-j38r-mq7j-wgvr
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Syed Balkhi WP Lightbox 2 plugin <= 3.0.6.5 versions.
|
[] | null | 5.9 | null | null | null |
|
CVE-2022-22612
|
A memory consumption issue was addressed with improved memory handling. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, iTunes 12.12.3 for Windows, watchOS 8.5, macOS Monterey 12.3. Processing a maliciously crafted image may lead to heap corruption.
|
[
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
CVE-2018-3590
|
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, SD 845, a Use After Free condition can occur in RIL while handling requests from Android.
|
[
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-6mjh-qj4v-3982
|
Cross-site scripting (XSS) vulnerability in index.php in Warcraft III Replay Parser for PHP 1.8c allows remote attackers to inject arbitrary web script or HTML via the page parameter. NOTE: post-disclosure analysis by CVE suggests that the "page" parameter is not used in this product, and "id" might be the affected parameter.
|
[] | null | null | null | null | null |
|
CVE-2015-9045
|
In all Qualcomm products with Android releases from CAF using the Linux kernel, a vulnerability exists in GERAN where a buffer can be overflown while taking power measurements.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
CVE-2018-16173
|
Cross-site scripting vulnerability in LearnPress prior to version 3.1.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2021-34741
|
Cisco Email Security Appliance Denial of Service Vulnerability
|
A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition.
|
[
"cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:13.5.3-010:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:asyncos:13.7.0-093:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:m170:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:m190:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:m380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:m390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:m390x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:m680:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:m690:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:m690x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
CVE-2018-18939
|
An issue was discovered in WUZHI CMS 4.1.0. There is stored XSS in index.php?m=core&f=index via a seventh input field.
|
[
"cpe:2.3:a:wuzhi_cms_project:wuzhi_cms:4.1.0:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
GHSA-fc65-rmq4-2hch
|
Adobe Flash Player 30.0.0.134 and earlier have a "use of a component with a known vulnerability" vulnerability. Successful exploitation could lead to privilege escalation.
|
[] | null | null | 9.8 | null | null |
|
GHSA-3ww9-jwr8-mpg3
|
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_booking.php.
|
[] | null | 7.2 | null | null | null |
|
GHSA-qj3h-8h86-6xvf
|
Vulnerability in the PeopleSoft Enterprise SCM eProcurement product of Oracle PeopleSoft (component: eProcurement). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM eProcurement. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise SCM eProcurement accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | null | null | null | null |
|
CVE-2025-21776
|
USB: hub: Ignore non-compliant devices with too many configs or interfaces
|
In the Linux kernel, the following vulnerability has been resolved:
USB: hub: Ignore non-compliant devices with too many configs or interfaces
Robert Morris created a test program which can cause
usb_hub_to_struct_hub() to dereference a NULL or inappropriate
pointer:
Oops: general protection fault, probably for non-canonical address
0xcccccccccccccccc: 0000 [#1] SMP DEBUG_PAGEALLOC PTI
CPU: 7 UID: 0 PID: 117 Comm: kworker/7:1 Not tainted 6.13.0-rc3-00017-gf44d154d6e3d #14
Hardware name: FreeBSD BHYVE/BHYVE, BIOS 14.0 10/17/2021
Workqueue: usb_hub_wq hub_event
RIP: 0010:usb_hub_adjust_deviceremovable+0x78/0x110
...
Call Trace:
<TASK>
? die_addr+0x31/0x80
? exc_general_protection+0x1b4/0x3c0
? asm_exc_general_protection+0x26/0x30
? usb_hub_adjust_deviceremovable+0x78/0x110
hub_probe+0x7c7/0xab0
usb_probe_interface+0x14b/0x350
really_probe+0xd0/0x2d0
? __pfx___device_attach_driver+0x10/0x10
__driver_probe_device+0x6e/0x110
driver_probe_device+0x1a/0x90
__device_attach_driver+0x7e/0xc0
bus_for_each_drv+0x7f/0xd0
__device_attach+0xaa/0x1a0
bus_probe_device+0x8b/0xa0
device_add+0x62e/0x810
usb_set_configuration+0x65d/0x990
usb_generic_driver_probe+0x4b/0x70
usb_probe_device+0x36/0xd0
The cause of this error is that the device has two interfaces, and the
hub driver binds to interface 1 instead of interface 0, which is where
usb_hub_to_struct_hub() looks.
We can prevent the problem from occurring by refusing to accept hub
devices that violate the USB spec by having more than one
configuration or interface.
|
[] | null | 5.5 | null | null | null |
CVE-2019-10144
|
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
|
[
"cpe:2.3:a:redhat:rkt:*:*:*:*:*:*:*:*"
] | null | null | 7 | null | null |
|
GHSA-7xxv-9538-jg8x
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RichardHarrison Carousel-of-post-images allows DOM-Based XSS. This issue affects Carousel-of-post-images: from n/a through 1.07.
|
[] | null | 6.5 | null | null | null |
|
GHSA-3hpx-5vcc-5jw2
|
A vulnerability, which was classified as critical, has been found in Campcodes Complete Online DJ Booking System 1.0. This issue affects some unknown processing of the file /admin/user-search.php. The manipulation of the argument searchdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257465 was assigned to this vulnerability.
|
[] | null | 6.3 | null | null | null |
|
RHSA-2023:4516
|
Red Hat Security Advisory: kpatch-patch security update
|
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null | null |
GHSA-q6x4-wf9q-6g23
|
WeeChat (aka Wee Enhanced Environment for Chat) 3.2 to 3.4 before 3.4.1 does not properly verify the TLS certificate of the server, after certain GnuTLS options are changed, which allows man-in-the-middle attackers to spoof a TLS chat server via an arbitrary certificate. NOTE: this only affects situations where weechat.network.gnutls_ca_system or weechat.network.gnutls_ca_user is changed without a WeeChat restart.
|
[] | null | 4.8 | null | null | null |
|
GHSA-q38j-h243-5f97
|
EZPhotoSales 1.9.3 and earlier has a default "admin" account for galleries, which allows remote attackers to access arbitrary galleries by specifying this username.
|
[] | null | null | null | null | null |
|
CVE-2016-3455
|
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters.
|
[
"cpe:2.3:a:oracle:outside_in_technology:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:outside_in_technology:8.5.2:*:*:*:*:*:*:*"
] | null | null | 8.6 | 9 | null |
|
GHSA-7rx8-fqcc-2mqg
|
Cross-site scripting (XSS) vulnerability in display_renderers/panels_renderer_editor.class.php in the admin view in the Panels module 6.x-2.x before 6.x-3.10 and 7.x-3.x before 7.x-3.0 for Drupal allows remote authenticated users with certain privileges to inject arbitrary web script or HTML via the Region title.
|
[] | null | null | null | null | null |
|
GHSA-vfj7-wc6m-2f4v
|
Active debug code vulnerability exists in Mesh Wi-Fi router RP562B firmware version v1.0.2 and earlier. If this vulnerability is exploited, a network-adjacent authenticated attacker may obtain or alter the settings of the device .
|
[] | null | 4.6 | null | null | null |
|
GHSA-j3v8-frhv-jj69
|
A vulnerability classified as problematic has been found in Campcodes Complete Online DJ Booking System 1.0. Affected is an unknown function of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257472.
|
[] | null | 3.5 | null | null | null |
|
CVE-2025-47063
|
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
CVE-2019-19246
|
Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c.
|
[
"cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2024-39342
|
Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from "WebAPI.cfg.xml" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host.
|
[
"cpe:2.3:a:entrust_instant_financial_issuance:entrust_instant_financial_issuance:*:*:*:*:*:*:*:*"
] | null | 6.6 | null | null | null |
|
GHSA-p4rg-78qv-f5g4
|
In Tidy 5.5.31, the IsURLCodePoint function in attrs.c allows attackers to cause a denial of service (Segmentation Fault), as demonstrated by an invalid ISALNUM argument.
|
[] | null | null | 7.5 | null | null |
|
CVE-2023-36554
|
A improper access control in Fortinet FortiManager version 7.4.0, version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.10, version 6.4.0 through 6.4.13, 6.2 all versions allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
|
[
"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*"
] | null | 7.7 | null | null | null |
|
GHSA-c5xx-5q9j-76qv
|
The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.
|
[] | null | null | 7.8 | null | null |
|
GHSA-ffxf-wqw7-4589
|
An issue was discovered in Open-Xchange OX AppSuite before 7.8.0-rev27. The aria-label parameter of tiles at the Portal can be used to inject script code. Those labels use the name of the file (e.g. an image) which gets displayed at the portal application. Using script code at the file name leads to script execution. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.). Users actively need to add a file to the portal to enable this attack. In case of shared files however, a internal attacker may modify a previously embedded file to carry a malicious file name. Furthermore this vulnerability can be used to persistently execute code that got injected by a temporary script execution vulnerability.
|
[] | null | null | 5.4 | null | null |
|
GHSA-gmhj-xjfh-cf6m
|
Caddy-SSH vulnerable to Authorization Bypass due to incorrect usage of PAM library
|
Not invoking a call to `pam_acct_mgmt` after a call to `pam_authenticate` to check the validity of a login can lead to an authorization bypass.ImpactExploitabilityThe attack can be carried over the network. A complex non-standard configuration or a specialized condition is required for the attack to be successfully conducted. The attacker also requires access to a users credentials, be it expired, for an attack to be successful. There is no user interaction required for successful execution. The attack can affect components outside the scope of the target module.ImpactUsing this attack vector, an attacker may access otherwise restricted parts of the system. The attack can be used to gain access to confidential files like passwords, login credentials and other secrets. Hence, it has a high impact on confidentiality. It may also be directly used to affect a change on a system resource. Hence has a medium to high impact on integrity. This attack may not be used to affect the availability of the system. Taking this account an appropriate CVSS v3.1 vector would be
[AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L&version=3.1)Root Cause AnalysisIn this case, in the following PAM transaction, only a call to `pam.Authenticate` is used to login a user.https://github.com/mohammed90/caddy-ssh/blob/1d980ceea6e67765daf19b5e644c7a0773fdaa13/internal/authentication/os/pam.go#L60This implies that a user with expired credentials can still login.The bug can be verified easily by creating a new user account, expiring it with `chage -E0 <username>` and then trying to log in with the expired credentials.PatchesThis can be fixed by invoking a call to `pam.AcctMgmt` after a successful call to `pam.Authenticate`References[Man Page for pam_acct_mgmt](https://man7.org/linux/man-pages/man3/pam_acct_mgmt.3.html)[CWE-863](http://cwe.mitre.org/data/definitions/863.html)[CWE-285](http://cwe.mitre.org/data/definitions/285.html)
|
[] | null | 7.7 | null | null | null |
CVE-2021-37524
|
Cross Site Scripting (XSS) vulnerability in FusionPBX 4.5.26 allows remote unauthenticated users to inject arbitrary web script or HTML via an unsanitized "path" parameter in resources/login.php.
|
[
"cpe:2.3:a:fusionpbx:fusionpbx:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.