id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-53086 | drm/xe: Drop VM dma-resv lock on xe_sync_in_fence_get failure in exec IOCTL | In the Linux kernel, the following vulnerability has been resolved:
drm/xe: Drop VM dma-resv lock on xe_sync_in_fence_get failure in exec IOCTL
Upon failure all locks need to be dropped before returning to the user.
(cherry picked from commit 7d1a4258e602ffdce529f56686925034c1b3b095) | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
GHSA-gmxg-c36j-9c9p | Vulnerability of trust relationships being inaccurate in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality. | []
| null | 7.5 | null | null |
|
GHSA-wprv-93r4-jj2p | OpenZeppelin Contracts using MerkleProof multiproofs may allow proving arbitrary leaves for specific trees | ImpactWhen the `verifyMultiProof`, `verifyMultiProofCalldata`, `processMultiProof`, or `processMultiProofCalldata` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves.A contract may be vulnerable if it uses multiproofs for verification and the merkle tree that is processed includes a node with value 0 at depth 1 (just under the root). This could happen inadvertently for balanced trees with 3 leaves or less, if the leaves are not hashed. This could happen deliberately if a malicious tree builder includes such a node in the tree.A contract is not vulnerable if it uses single-leaf proving (`verify`, `verifyCalldata`, `processProof`, or `processProofCalldata`), or if it uses multiproofs with a known tree that has hashed leaves. Standard merkle trees produced or validated with the [@openzeppelin/merkle-tree](https://github.com/OpenZeppelin/merkle-tree) library are safe.PatchesThe problem has been patched in 4.9.2.WorkaroundsIf you are using multiproofs: When constructing merkle trees hash the leaves and do not insert empty nodes in your trees. Using the [@openzeppelin/merkle-tree](https://www.npmjs.com/package/@openzeppelin/merkle-tree) package eliminates this issue. Do not accept user-provided merkle roots without reconstructing at least the first level of the tree. Verify the merkle tree structure by reconstructing it from the leaves. | []
| null | 5.3 | null | null |
GHSA-cqfv-6frg-v5c7 | Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991. | []
| null | null | null | null |
|
GHSA-vgj5-pm4f-q6gv | An exploit is possible where an actor with physical access can manipulate SPI flash without being detected. | []
| 5.2 | 4.3 | null | null |
|
GHSA-87c9-j59r-8rwf | M2SOFT Report Designer Viewer 5.0 allows a Buffer Overflow with Extended Instruction Pointer (EIP) control via a crafted MRD file. | []
| null | null | 7.8 | null |
|
CVE-2010-2707 | Unspecified vulnerability on the HP ProCurve 2626 and 2650 switches before H.10.80 allows remote attackers to obtain sensitive information, modify data, and cause a denial of service via unknown vectors. | [
"cpe:2.3:o:hp:procurve_switch_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.02:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.03:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.31:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.32:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.41:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.45:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.46:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.50:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.53:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.54:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.55:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.07.56:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.53:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.55:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.56:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.57:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.58:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.59:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.60:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.61:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.62:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.64:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.65:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.67:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.69:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.70:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.71:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.72:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.73:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.74:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.75:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.76:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.77:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.78:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.79:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.80:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.81:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.82:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.83:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.84:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.85:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.86:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.87:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.88:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.89:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.90:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.91:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.92:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.93:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.94:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.95:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.96:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.97:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.98:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.99:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.100:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.101:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.102:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.103:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.104:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.105:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.106:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.107:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.108:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.08.109:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.21:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.22:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.23:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.25:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.26:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.27:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.28:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.29:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.30:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.31:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.32:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.33:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.35:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.36:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.37:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.38:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.39:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.40:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.41:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.42:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.43:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.44:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.45:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.46:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.47:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.48:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.49:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.50:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.51:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.52:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.53:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.54:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.55:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.56:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.57:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.58:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.59:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.60:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.61:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.62:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.63:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.64:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.65:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.66:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.67:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.68:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.69:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.70:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.71:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.72:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:procurve_switch_software:h.10.73:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch_2626:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch_2626-pwr:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch_2650:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:procurve_switch_2650-pwr:*:*:*:*:*:*:*:*"
]
| null | null | null | 8.3 |
|
GHSA-2w3r-gxq2-m4qc | ** DISPUTED ** PHP remote file inclusion vulnerability in adminips.php in Develooping Flash Chat allows remote attackers to execute arbitrary PHP code via a URL in the banned_file parameter. NOTE: CVE disputes this vulnerability because banned_file is set to a constant value. | []
| null | null | null | null |
|
GHSA-7vmr-3f3w-fc3w | libmedia in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 has certain incorrect declarations, which allows remote attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference or memory corruption) via a crafted media file, aka internal bug 28166152. | []
| null | null | 9.8 | null |
|
RHSA-2018:2373 | Red Hat Security Advisory: redhat-certification security update | redhat-certification: resource consumption in DocumentBase:loadFiltered redhat-certification: /download allows to download any file redhat-certification: rhcertStore.py: __saveResultsFile allows to write any file | [
"cpe:/a:redhat:certifications:1::el7"
]
| null | null | 9.8 | null |
CVE-2006-1762 | Directory traversal vulnerability in index.php in blur6ex 0.3.452 allows remote attackers to include arbitrary files via the shard parameter. NOTE: this issue can be exploited to produce resultant XSS when the parameter has XSS manipulations, and path disclosure with other invalid values. | [
"cpe:2.3:a:blursoft:blur6ex:0.3.462:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2009-1621 | Directory traversal vulnerability in index.php in OpenCart 1.1.8 allows remote attackers to read arbitrary files via a .. (dot dot) in the route parameter. | [
"cpe:2.3:a:opencart:opencart:1.1.8:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-cgr8-5587-cqhj | In the FPC TrustZone fingerprint App, there is a possible invalid command handler due to an exposed test feature. This could lead to local escalation of privilege in the TEE, with System execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-131252923 | []
| null | null | null | null |
|
CVE-2024-13317 | ShipWorks Connector for Woocommerce <= 5.2.5 - Cross-Site Request Forgery to Service Password/Username Update | The ShipWorks Connector for Woocommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.2.5. This is due to missing or incorrect nonce validation on the 'shipworks-wordpress' page. This makes it possible for unauthenticated attackers to update the services username and password via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | []
| null | 4.3 | null | null |
GHSA-m3x5-x584-4rhh | SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database. | []
| null | 9.8 | null | null |
|
GHSA-gc6f-j8xw-pvc6 | Insecure inherited permissions in some Intel(R) oneMKL software before version 2022.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | []
| null | 6.7 | null | null |
|
GHSA-x8xv-v8v3-jc5h | IBM Spectrum Scale 5.0.0.0 through 5.0.4.4 could allow a privileged authenticated user to perform unauthorized actions using a specially crated HTTP POST command. IBM X-Force ID: 179157. | []
| null | null | null | null |
|
GHSA-ff55-4qfm-2hmv | SQL injection vulnerability in the SYS.DBMS_METADATA_UTIL package in Oracle Database 10g, and possibly earlier versions, might allow remote attackers to execute arbitrary SQL commands via unknown vectors. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is being created since it cannot be conclusively proven that this issue has been addressed by Oracle. It is possible that this is the same issue as Oracle Vuln# DB05 from the January 2006 CPU, in which case this would be subsumed by CVE-2006-0260. However, there are some inconsistencies that make this unclear, and there is also a possibility that this is related to DB06, which is subsumed by CVE-2006-0259. | []
| null | null | null | null |
|
GHSA-8cwc-g9gg-qp9w | Valor Apps Easy Folder Listing Pro has a deserialization vulnerability that allows an unauthenticated, remote attacker to execute arbitrary code with the privileges of the Joomla! application. Fixed in versions 3.8 and 4.5. | []
| 9.3 | 9.8 | null | null |
|
GHSA-7wxw-cqg4-pq3v | Windows Mobile Broadband Driver Denial of Service Vulnerability | []
| null | 6.5 | null | null |
|
GHSA-wjfc-pgfp-pv9c | Improper Input Validation in nyholm/psr7 | ImpactImproper header parsing. An attacker could sneak in a newline (`\n`) into both the header names and values. While the specification states that `\r\n\r\n` is used to terminate the header list, many servers in the wild will also accept `\n\n`.PatchesThe issue is patched in 1.6.1.WorkaroundsThere are no known workarounds.Referenceshttps://www.rfc-editor.org/rfc/rfc7230#section-3.2.4 | []
| null | 5.3 | null | null |
GHSA-j9rq-gcmr-fp62 | A vulnerability was found in Bdtask Hospital AutoManager up to 20240227 and classified as problematic. This issue affects some unknown processing of the file /prescription/prescription/delete/ of the component Prescription Page. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | []
| null | 3.8 | null | null |
|
GHSA-mf6m-m52m-43jc | Password recovery vulnerability in SICK SIM1004 Partnumber 1098148 with firmware version < 2.0.0 allows an unprivileged remote attacker to gain access to the userlevel defined as RecoverableUserLevel by invocating the password recovery mechanism method. This leads to a increase in their privileges on the system and thereby affecting the confidentiality integrity and availability of the system. An attacker can expect repeatable success by exploiting the vulnerability. The recommended solution is to update the firmware to a version >= 2.0.0 as soon as possible. | []
| null | 9.8 | null | null |
|
CVE-2021-39480 | Bingrep v0.8.5 was discovered to contain a memory allocation failure which can cause a Denial of Service (DoS). | [
"cpe:2.3:a:bingrep_project:bingrep:0.8.5:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2016-10054 | Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
CVE-2006-3990 | Multiple PHP remote file inclusion vulnerabilities in Paul M. Jones Savant2, possibly when used with the com_mtree component for Mambo and Joomla!, allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) Savant2_Plugin_stylesheet.php, (2) Savant2_Compiler_basic.php, (3) Savant2_Error_pear.php, (4) Savant2_Error_stack.php, (5) Savant2_Filter_colorizeCode.php, (6) Savant2_Filter_trimwhitespace.php, (7) Savant2_Plugin_ahref.php, (8) Savant2_Plugin_ahrefcontact.php, (9) Savant2_Plugin_ahreflisting.php, (10) Savant2_Plugin_ahreflistingimage.php, (11) Savant2_Plugin_ahrefmap.php, (12) Savant2_Plugin_ahrefownerlisting.php, (13) Savant2_Plugin_ahrefprint.php, (14) Savant2_Plugin_ahrefrating.php, (15) Savant2_Plugin_ahrefrecommend.php, (16) Savant2_Plugin_ahrefreport.php, (17) Savant2_Plugin_ahrefreview.php, (18) Savant2_Plugin_ahrefvisit.php, (19) Savant2_Plugin_checkbox.php, (20) Savant2_Plugin_cycle.php, (21) Savant2_Plugin_dateformat.php, (22) Savant2_Plugin_editor.php, (23) Savant2_Plugin_form.php, (24) Savant2_Plugin_image.php, (25) Savant2_Plugin_input.php, (26) Savant2_Plugin_javascript.php, (27) Savant2_Plugin_listalpha.php, (28) Savant2_Plugin_listingname.php, (29) Savant2_Plugin_modify.php, (30) Savant2_Plugin_mtpath.php, (31) Savant2_Plugin_options.php, (32) Savant2_Plugin_radios.php, (33) Savant2_Plugin_rating.php, or (34) Savant2_Plugin_textarea.php. | [
"cpe:2.3:a:phpsavant:savant2:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-2j3c-jv49-w6c7 | A large loop in JBIG2Stream::readSymbolDictSeg in xpdf 4.00 allows an attacker to cause denial of service via a specific file due to inappropriate decoding. | []
| null | null | 5.5 | null |
|
RHSA-2021:2778 | Red Hat Security Advisory: OpenJDK 8u302 Security Update for Portable Linux Builds | OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) | [
"cpe:/a:redhat:openjdk:1.8"
]
| null | 7.5 | null | null |
CVE-2023-28122 | A local privilege escalation (LPE) vulnerability in UI Desktop for Windows (Version 0.59.1.71 and earlier) allows a malicious actor with local access to a Windows device running said application to submit arbitrary commands as SYSTEM.This vulnerability is fixed in Version 0.62.3 and later. | [
"cpe:2.3:a:ui:desktop:*:*:*:*:*:windows:*:*"
]
| null | 7.8 | null | null |
|
GHSA-78h4-h9x2-x5x9 | H3C Magic NX18 Plus NX18PV100R003 was discovered to contain a stack overflow via the function SetMacAccessMode. | []
| null | 7.8 | null | null |
|
CVE-2023-48834 | A lack of rate limiting in pjActionAjaxSend in Car Rental v3.0 allows attackers to cause resource exhaustion. | [
"cpe:2.3:a:phpjabbers:car_rental_script:3.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-mmm4-3c29-g9r6 | PHP Scripts Mall Student Profile Management System Script v2.0.6 has XSS via the Name field to list_student.php. | []
| null | null | 5.4 | null |
|
GHSA-w8qw-x88f-f35r | The Symantec Encryption Management Server (SEMS) product, prior to version 3.4.2 MP1, may be susceptible to a denial of service (DoS) exploit. A DoS attack is a type of attack whereby the perpetrator attempts to make a particular machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a specific host within a network. | []
| null | null | 7.5 | null |
|
CVE-2025-46035 | Buffer Overflow vulnerability in Tenda AC6 v.15.03.05.16 allows a remote attacker to cause a denial of service via the oversized schedStartTime and schedEndTime parameters in an unauthenticated HTTP GET request to the /goform/openSchedWifi endpoint | []
| null | 7.5 | null | null |
|
GHSA-wqc4-2cj5-89rj | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK & Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5581, CVE-2015-5584, and CVE-2015-6682. | []
| null | null | null | null |
|
CVE-2022-35484 | OTFCC v0.10.4 was discovered to contain a segmentation violation via /release-x64/otfccdump+0x6b6a8f. | [
"cpe:2.3:a:otfcc_project:otfcc:0.10.4:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
GHSA-hjrc-qggq-2w49 | ping.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping_IPAddr field of an HTTP POST request. | []
| null | null | 9.8 | null |
|
GHSA-cv8p-r9gw-9x34 | In Gxlcms QY v1.0.0713, the update function in Lib\Lib\Action\Admin\TplAction.class.php allows remote attackers to execute arbitrary PHP code by placing this code into a template. | []
| null | null | 9.8 | null |
|
CVE-2021-32095 | U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to delete arbitrary files. | [
"cpe:2.3:a:nsa:emissary:5.9.0:*:*:*:*:*:*:*"
]
| null | 8.1 | null | 5.5 |
|
CVE-2021-33660 | SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated FLI file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | [
"cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*"
]
| null | null | 4.3 | null |
|
cisco-sa-sb-rv34x-rce-8bfG2h6b | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Authenticated Remote Code Execution Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code with elevated privileges equivalent to the web service process on an affected device.
These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
| []
| null | 6.3 | null | null |
CVE-2022-4539 | Web Application Firewall <= 2.1.2 - IP Address Spoofing to Protection Mechanism Bypass | The Web Application Firewall plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.1.2. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in. | [
"cpe:2.3:a:miniorange:web_application_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:miniorange:web_application_firewall:*:*:*:*:*:wordpress:*:*"
]
| null | 5.3 | null | null |
GHSA-gcqp-jx79-4gc5 | Huawei Mate 8 phones with software Versions before NXT-AL10C00B386, Versions before NXT-CL00C92B386, Versions before NXT-DL00C17B386, Versions before NXT-TL00C01B386; Mate S phones with software Versions before CRR-CL00C92B368, Versions before CRR-CL20C92B368, Versions before CRR-TL00C01B368, Versions before CRR-UL00C00B368, Versions before CRR-UL20C00B368; and P8 phones with software Versions before GRA-TL00C01B366, Versions before GRA-CL00C92B366, Versions before GRA-CL10C92B366, Versions before GRA-UL00C00B366, Versions before GRA-UL10C00B366 allow attackers with graphic or Camera privilege to crash the system or escalate privilege. | []
| null | null | 7.1 | null |
|
GHSA-qqpc-gc88-ff86 | LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials. | []
| null | 5.9 | null | null |
|
PYSEC-2021-531 | null | TensorFlow is an end-to-end open source platform for machine learning. A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of `ArgMin`/`ArgMax`(https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59). If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the condition in the `if` is never true, so code writes past the last valid element of `output_dims->data`. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | []
| null | null | null | null |
CVE-2024-36506 | An improper verification of source of a communication channel vulnerability [CWE-940] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, 6.4 all versions may allow a remote attacker to bypass the trusted host feature via session connection. | []
| null | 3.5 | null | null |
|
CVE-2024-4253 | Command Injection in gradio-app/gradio | A command injection vulnerability exists in the gradio-app/gradio repository, specifically within the 'test-functional.yml' workflow. The vulnerability arises due to improper neutralization of special elements used in a command, allowing for unauthorized modification of the base repository or secrets exfiltration. The issue affects versions up to and including '@gradio/[email protected]'. The flaw is present in the workflow's handling of GitHub context information, where it echoes the full name of the head repository, the head branch, and the workflow reference without adequate sanitization. This could potentially lead to the exfiltration of sensitive secrets such as 'GITHUB_TOKEN', 'COMMENT_TOKEN', and 'CHROMATIC_PROJECT_TOKEN'. | [
"cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | null |
PYSEC-2020-223 | null | In the course of work on the open source project it was discovered that authenticated users running queries against Hive and Presto database engines could access information via a number of templated fields including the contents of query description metadata database, the hashed version of the authenticated users’ password, and access to connection information including the plaintext password for the current connection. It would also be possible to run arbitrary methods on the database connection object for the Presto or Hive connection, allowing the user to bypass security controls internal to Superset. This vulnerability is present in every Apache Superset version < 0.37.2. | []
| null | null | null | null |
CVE-2005-2839 | Multiple cross-site scripting (XSS) vulnerabilities in MAXdev MD-Pro 1.0.72 allow remote attackers to inject arbitrary web script or HTML via (1) dl-search.php or (2) wl-search.php. | [
"cpe:2.3:a:maxdev:md-pro:1.0.72:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2005-3158 | SQL injection vulnerability in messages.php in PHP-Fusion 6.00.106 and 6.00.107 allows remote attackers to execute arbitrary SQL commands via the (1) pm_email_notify and (2) pm_save_sent parameters, a different vulnerability than CVE-2005-3157 and CVE-2005-3159. | [
"cpe:2.3:a:php_fusion:php_fusion:6.00.106:*:*:*:*:*:*:*",
"cpe:2.3:a:php_fusion:php_fusion:6.00.107:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-52m2-7hr5-3fp9 | SAP NetWeaver AS for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, allows an unauthenticated attacker to craft a link, which when clicked by an unsuspecting user can be used to redirect a user to a malicious site which could read or modify some sensitive information or expose the victim to a phishing attack. | []
| null | 6.1 | null | null |
|
GHSA-wjp7-rcvr-7wq6 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | []
| null | null | null | null |
|
GHSA-2x8v-355v-69p5 | The TLS Handshake Protocol implementation in Secure Transport in Apple OS X before 10.11 accepts a Certificate Request message within a session in which no Server Key Exchange message has been sent, which allows remote attackers to have an unspecified impact via crafted TLS data. | []
| null | null | null | null |
|
GHSA-fqg8-8594-3gf8 | The which_access variable for Majordomo 2.0 through 1.94.4, and possibly earlier versions, is set to "open" by default, which allows remote attackers to identify the email addresses of members of mailing lists via a "which" command. | []
| null | null | null | null |
|
CVE-2014-2160 | The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745. | [
"cpe:2.3:a:cisco:telepresence_system_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_system_software:f9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_system_software:f9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_system_software:f9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_system_software:f9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_system_software:f9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_system_software:fnc9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:telepresence_system_software:fnc9.3:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:tandberg_2000_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:tandberg_550_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:tandberg_770_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:tandberg_880_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:tandberg_990_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_system_1000_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_system_1700_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_system_codec_3000_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_system_codec_6000_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_system_edge_75_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_system_edge_85_mxp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:telepresence_system_edge_95_mxp:-:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
cisco-sa-broadworks-xss-xbhfr4cD | Cisco BroadWorks Application Delivery Platform Software Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| []
| null | 6.1 | null | null |
CVE-2020-16994 | Azure Sphere Unsigned Code Execution Vulnerability | Azure Sphere Unsigned Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:azure_sphere:*:*:*:*:*:*:*:*"
]
| null | 7.3 | null | null |
GHSA-v6pv-cmg8-x43p | For the NVIDIA Quadro, NVS, and GeForce products, improper sanitization of parameters in the NVAPI support layer causes a denial of service vulnerability (blue screen crash) within the NVIDIA Windows graphics drivers. | []
| null | null | 6.6 | null |
|
RHSA-2014:1009 | Red Hat Security Advisory: samba4 security update | samba: Uninitialized memory exposure samba: nmbd denial of service samba: smbd unicode path names denial of service samba: remote code execution in nmbd | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
CVE-2012-0101 | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102. | [
"cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*",
"cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
GHSA-hcc9-635h-2qg5 | SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c. | []
| null | 8.8 | null | null |
|
CVE-2018-21138 | Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D3600 before 1.0.0.76 and D6000 before 1.0.0.76. | [
"cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*"
]
| null | null | 8.8 | null |
|
GHSA-h2c5-wxjr-xfwc | Vulnerability of parameter type not being verified in the WantAgent module
Impact: Successful exploitation of this vulnerability may affect availability. | []
| null | 6.2 | null | null |
|
CVE-2015-2109 | Unspecified vulnerability in HP Operations Orchestration 10.x allows remote attackers to bypass authentication, and obtain sensitive information or modify data, via unknown vectors. | [
"cpe:2.3:a:hp:operations_orchestration:10.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2023-37002 | Open5GS MME versions <= 2.6.4 contain an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send an `E-RAB Modification Indication` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service. | []
| null | 5.3 | null | null |
|
CVE-2019-14247 | The scan() function in mad.c in mpg321 0.3.2 allows remote attackers to trigger an out-of-bounds write via a zero bitrate in an MP3 file. | [
"cpe:2.3:a:mpg321_project:mpg321:0.3.2:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.3 |
|
CVE-2021-4063 | Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
GHSA-7rq3-6hvw-rrqj | Buffer overflow in the ABWOutputDev::endWord function in poppler/ABWOutputDev.cc in Poppler (aka libpoppler) 0.10.6, 0.12.0, and possibly other versions, as used by the Abiword pdftoabw utility, allows user-assisted remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PDF file. | []
| null | null | null | null |
|
CVE-2023-49794 | The logic of get apk path in KernelSU module can be bypassed | KernelSU is a Kernel-based root solution for Android devices. In versions 0.7.1 and prior, the logic of get apk path in KernelSU kernel module can be bypassed, which causes any malicious apk named `me.weishu.kernelsu` get root permission. If a KernelSU module installed device try to install any not checked apk which package name equal to the official KernelSU Manager, it can take over root privileges on the device. As of time of publication, a patched version is not available. | [
"cpe:2.3:a:kernelsu:kernelsu:*:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
CVE-2002-0247 | Buffer overflows in wmtv 0.6.5 and earlier may allow local users to gain privileges. | [
"cpe:2.3:a:wliang:wmtv:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.2 |
|
CVE-2021-2241 | Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: Shopping Cart). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle iStore. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle iStore accessible data as well as unauthorized access to critical data or complete access to all Oracle iStore accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:istore:*:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null |
|
CVE-2023-40130 | In onBindingDied of CallRedirectionProcessor.java, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege and background activity launch with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0l:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
CVE-2014-9046 | The OC_Util::getUrlContent function in ownCloud Server before 5.0.18, 6.x before 6.0.6, and 7.x before 7.0.3 allows remote attackers to read arbitrary files via a file:// protocol. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.14:a:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:7.0.2:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-7x8x-8m23-mfwj | Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | null | null | null |
|
CVE-2012-0451 | CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote web servers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks via crafted HTTP headers. | [
"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.2:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.5:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.7:beta4:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2021-33439 | An issue was discovered in mjs (mJS: Restricted JavaScript engine), ES6 (JavaScript version 6). There is Integer overflow in gc_compact_strings() in mjs.c. | [
"cpe:2.3:a:cesanta:mjs:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
GHSA-2983-rc95-vrc7 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Valhall GPU Firmware, Arm Ltd Arm 5th Gen GPU Architecture Firmware allows a local non-privileged user to make improper GPU processing operations to access a limited amount outside of buffer bounds. If the operations are carefully prepared, then this in turn could give them access to all system memory. This issue affects Valhall GPU Firmware: from r29p0 through r46p0; Arm 5th Gen GPU Architecture Firmware: from r41p0 through r46p0. | []
| null | 7.8 | null | null |
|
CVE-2017-1498 | IBM Connections 5.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 129020. | [
"cpe:2.3:a:ibm:connections:5.5.0.0:*:*:*:*:*:*:*"
]
| null | null | 5.4 | 3.5 |
|
CVE-2016-9366 | An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication. | [
"cpe:2.3:o:moxa:nport_5100_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_5200_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5230:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5232:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5232i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_5400_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5430i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5450-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5450i:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5450i-t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_5600_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_5100a_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5110a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5130a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5150a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_p5150a_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_p5110a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_5200a_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5210a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5230a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5250a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_5x50a1-m12_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5150a1-m12:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5150a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5150a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5150a1-m12-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5250a1-m12:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5250a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5250a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5250a1-m12-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5450a1-m12:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5450a1-m12-ct:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5450a1-m12-ct-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5450a1-m12-t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5600-8-dtl_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5610-8-dtl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5650-8-dtl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_5650i-8-dtl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:moxa:nport_6100_series_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:nport_6150-t:-:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 5 |
|
cisco-sa-ftd-archive-bypass-z4wQjwcN | Cisco Firepower Threat Defense Software Encrypted Archive File Policy Bypass Vulnerability | A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file.
This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the May 2024 release of the Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2024 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75298"]. | []
| null | 5.8 | null | null |
CVE-2022-2224 | The WordPress plugin Gallery for Social Photo is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.0.0.27 due to failure to properly check for the existence of a nonce in the function gifeed_duplicate_feed. This make it possible for unauthenticated attackers to duplicate existing posts or pages granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:ghozylab:gallery_for_social_photo:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null |
|
GHSA-g4c9-qfvw-fmr4 | TYPO3 Cross-Site Scripting in Backend Modal Component | Failing to properly encode user input, notifications shown in modal windows in the TYPO3 backend are vulnerable to cross-site scripting. A valid backend user account is needed in order to exploit this vulnerability. | []
| null | 6.1 | null | null |
GHSA-cg57-h35j-g58g | getgps data in iTrack Easy can be modified without authentication by setting the data using the parametercmd:setothergps. This vulnerability can be exploited to alter the GPS data of a lost device. | []
| null | null | 7.5 | null |
|
CVE-2022-40695 | WordPress SEO Redirection Plugin plugin <= 8.9 - Multiple Cross-Site Scripting (CSRF) vulnerabilities | Multiple Cross-Site Scripting (CSRF) vulnerabilities in SEO Redirection Plugin plugin <= 8.9 on WordPress. | [
"cpe:2.3:a:clogica:seo_redirection:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null |
GHSA-gjhp-fhfw-fvx3 | The Bluetooth Classic implementation in Silicon Labs iWRAP 6.3.0 and earlier does not properly handle the reception of an oversized LMP packet greater than 17 bytes, allowing attackers in radio range to trigger a crash in WT32i via a crafted LMP packet. | []
| null | null | null | null |
|
GHSA-9q3g-98q9-cpqq | Wireshark 1.8.x before 1.8.4 allows remote attackers to obtain sensitive hostname information by reading pcap-ng files. | []
| null | null | null | null |
|
CVE-2022-28005 | An issue was discovered in the 3CX Phone System Management Console prior to version 18 Update 3 FINAL. An unauthenticated attacker could abuse improperly secured access to arbitrary files on the server (via /Electron/download directory traversal in conjunction with a path component that uses backslash characters), leading to cleartext credential disclosure. Afterwards, the authenticated attacker is able to upload a file that overwrites a 3CX service binary, leading to Remote Code Execution as NT AUTHORITY\SYSTEM on Windows installations. NOTE: this issue exists because of an incomplete fix for CVE-2022-48482. | [
"cpe:2.3:a:3cx:3cx:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 5 |
|
GHSA-gxq8-qw7q-mh32 | In TreasuryXpress 19191105, a logged-in user can discover saved credentials, even though the UI hides them. Using functionality within the application and a malicious host, it is possible to force the application to expose saved SSH/SFTP credentials. This can be done by using the application's editor to change the expected SFTP Host IP to a malicious host, and then using the Check Connectivity option. The application then sends these saved credentials to the malicious host. | []
| null | null | null | null |
|
GHSA-m86c-6g87-95pq | Incorrect Privilege Assignment vulnerability in opentext Fortify ScanCentral DAST. The vulnerability could be exploited to gain elevated privileges.This issue affects Fortify ScanCentral DAST versions 21.1, 21.2, 21.2.1, 22.1, 22.1.1, 22.2, 23.1. | []
| null | 8.2 | null | null |
|
GHSA-j45j-gj3g-pr93 | A vulnerability was found in coderd-repos Eva 1.0.0 and classified as critical. Affected by this issue is some unknown functionality of the file /system/traceLog/page of the component HTTP POST Request Handler. The manipulation of the argument property leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250124. | []
| null | 5.5 | null | null |
|
RHSA-2018:0379 | Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update | Core: Improper processing of XML documents can cause a denial of service | [
"cpe:/a:redhat:rhel_dotnet:1.0::el7",
"cpe:/a:redhat:rhel_dotnet:1.1::el7",
"cpe:/a:redhat:rhel_dotnet:2.0::el7"
]
| null | null | 5.3 | null |
CVE-2024-53702 | Use of cryptographically weak pseudo-random number generator (PRNG) vulnerability in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret. | [
"cpe:2.3:o:sonicwall:sma100_firmware:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
GHSA-hxwf-hgxf-ghjj | Opera does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection." | []
| null | null | null | null |
|
CVE-2014-7898 | The OLE Point of Sale (OPOS) drivers before 1.13.003 on HP Point of Sale Windows PCs allow remote attackers to execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:hp:ole_point_of_sale_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-f235-r39g-2m8r | Firefox 1.0 does not prevent the user from dragging an executable file to the desktop when it has an image/gif content type but has a dangerous extension such as .bat or .exe, which allows remote attackers to bypass the intended restriction and execute arbitrary commands via malformed GIF files that can still be parsed by the Windows batch file parser, aka "firedragging." | []
| null | null | null | null |
|
GHSA-7px9-8jq2-c4vv | The kento-post-view-counter plugin through 2.8 for WordPress has XSS via kento_pvc_geo. | []
| null | null | null | null |
|
CVE-2013-1999 | Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function. | [
"cpe:2.3:a:x:libxvmc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:x:libxvmc:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:x:libxvmc:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:x:libxvmc:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:x:libxvmc:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:x:libxvmc:1.0.6:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2006-7058 | Multiple cross-site scripting (XSS) vulnerabilities in Sphider before 1.3.1c allow remote attackers to inject arbitrary web script or HTML via the catid parameter to (1) templates/standard/search_form.html and (2) templates/dark/search_form.html. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:sphider:sphider:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2024-22426 | Dell RecoverPoint for Virtual Machines 5.3.x, 6.0.SP1 contains an OS Command injection vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to execute arbitrary operating system commands, which will get executed in the context of the root user, resulting in a complete system compromise. | [
"cpe:2.3:a:dell:recoverpoint_for_virtual_machines:*:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
GHSA-mwrq-v3xr-mmc9 | In updateInfo of android_hardware_input_InputApplicationHandle.cpp, there is a possible control of code flow due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174768985 | []
| null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.